Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Switch branches/tags
Nothing to show
Clone or download
Latest commit 54d2400 Oct 16, 2018
Permalink
Failed to load latest commit information.
LICENSE Initial commit Mar 6, 2018
README.md Update README.md Oct 16, 2018
ctfr.py Message changed. Mar 12, 2018
requirements.txt pyfiglet removed, clear_url function added. Mar 11, 2018

README.md

CTFR

Do you miss AXFR technique? This tool allows to get the subdomains from a HTTPS website in a few seconds.
How it works? CTFR does not use neither dictionary attack nor brute-force, it just abuses of Certificate Transparency logs.
For more information about CT logs, check www.certificate-transparency.org and crt.sh.

Getting Started

Please, follow the instructions below for installing and run CTFR.

Pre-requisites

Make sure you have installed the following tools:

Python 3.0 or later.
pip3 (sudo apt-get install python3-pip).

Installing

$ git clone https://github.com/UnaPibaGeek/ctfr.git
$ cd ctfr
$ pip3 install -r requirements.txt

Running

$ python3 ctfr.py --help

Usage

Parameters and examples of use.

Parameters

-d --domain [target_domain] (required)
-o --output [output_file] (optional)

Examples

$ python3 ctfr.py -d starbucks.com
$ python3 ctfr.py -d facebook.com -o /home/shei/subdomains_fb.txt

With Docker

I think it's a little bit crazy to use Docker for running such a little python script, but if you want to do it anyway, you can download this lightweight (97.8MB) Docker image made by John Paulada.

The instructions are there.

Screenshots

Author