Sublist3r is a Python-based designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.

Sublist3r - Fast Python Subdomain Enumeration Tool

It also integrates with subbrute for subdomain brute-forcing with word lists.

Features of Sublist3r Tool

It enumerates subdomains using many search engines such as:

  • Google
  • Yahoo
  • Bing
  • Baidu
  • Ask

The tool also enumerates subdomains using:

  • Netcraft
  • Virustotal
  • ThreatCrowd
  • DNSdumpster
  • ReverseDNS

Requirements of Sublist3r Subdomain Search

It currently supports Python 2 and Python 3.

– The recommended version for Python 2 is 2.7.x
– The recommended version for Python 3 is 3.4.x

The tool depends on the requests, dnspython, and argparse Python modules.

Usage of Sublist3r Subdomain Brute Force Tool


To list all the basic options and switches use -h switch:

To enumerate subdomains of specific domain:

To enumerate subdomains of specific domain and show only subdomains which have open ports 80 and 443 :

To enumerate subdomains of specific domain and show the results in realtime:

To enumerate subdomains and enable the bruteforce module:

To enumerate subdomains and use specific engines such Google, Yahoo and Virustotal engines

It’s also possible to use Sublist3r as a Python module in your own scripts.

Other tools to check out are:

SubBrute – Subdomain Brute-forcing Tool
Knock v1.3b – Subdomain Enumeration/Brute-Forcing Tool
DNSRecon – DNS Enumeration Script
InstaRecon – Automated Subdomain Discovery Tool

You can download Sublist3r here:

Or read more here.

Source link


Please enter your comment!
Please enter your name here