Multi-threaded DNS hijacking via dead records automation tool
1) Dig provided subdomains file for dead DNS records.
2) Dig the found dead DNS records for any interesting CNAME's.
3) Show which dead record points to the given CNAME.
- Multi-threading
- Completely Automated
- Takes list from file
One line installation:
$ git clone https://github.com/DreyAnd/DeadDNS.git && cd DeadDNS && pip3 install -r requirements.txt
Simple and quick installation:
$ git clone https://github.com/DreyAnd/DeadDNS.git
$ cd DeadDNS
$ pip3 install -r requirements.txt
Example usage:
$ python3 dead_records.py -w subdomains.txt -o1 dead.txt -o2 cname.txt
This will return all output to stdout without saving it.
Help: $ python3 dead_records.py -h
To check progress do tail -f dead-temp.txt
and tail -f cname-temp.txt