2021-02-20 17:47:03 +00:00
< h1 align = "center" >
< img src = "static/subfinder-logo.png" alt = "subfinder" width = "200px" > < / a >
2019-12-05 13:06:56 +00:00
< br >
< / h1 >
2021-02-20 17:47:03 +00:00
< h4 align = "center" > Fast passive subdomain enumeration tool.< / h4 >
2020-08-11 21:27:45 +00:00
2018-06-26 13:38:49 +00:00
2021-02-20 17:47:03 +00:00
< p align = "center" >
< a href = "https://goreportcard.com/report/github.com/projectdiscovery/subfinder" > < img src = "https://goreportcard.com/badge/github.com/projectdiscovery/subfinder" > < / a >
< a href = "https://github.com/projectdiscovery/subfinder/issues" > < img src = "https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" > < / a >
< a href = "https://github.com/projectdiscovery/subfinder/releases" > < img src = "https://img.shields.io/github/release/projectdiscovery/subfinder" > < / a >
2021-02-21 07:59:31 +00:00
< a href = "https://twitter.com/pdiscoveryio" > < img src = "https://img.shields.io/twitter/follow/pdiscoveryio.svg?logo=twitter" > < / a >
2021-02-20 17:47:03 +00:00
< a href = "https://discord.gg/projectdiscovery" > < img src = "https://img.shields.io/discord/695645237418131507.svg?logo=discord" > < / a >
< / p >
< p align = "center" >
< a href = "#features" > Features< / a > •
< a href = "#installation" > Install< / a > •
< a href = "#running-subfinder" > Usage< / a > •
< a href = "#post-installation-instructions" > API Setup< / a > •
2021-04-17 12:09:01 +00:00
< a href = "#subfinder-go-library" > Library< / a > •
2021-02-20 17:47:03 +00:00
< a href = "https://discord.gg/projectdiscovery" > Join Discord< / a >
< / p >
2019-12-05 13:06:56 +00:00
2021-02-20 17:47:03 +00:00
---
2018-06-26 13:38:49 +00:00
2021-02-20 17:47:03 +00:00
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.
2019-12-05 13:06:56 +00:00
2021-02-20 17:47:03 +00:00
We have designed subfinder to comply with all passive sources licenses, and usage restrictions, as well as maintained a consistently passive model to make it useful to both penetration testers and bug bounty hunters alike.
2020-07-12 11:35:25 +00:00
2018-06-26 13:38:49 +00:00
2021-02-20 17:47:03 +00:00
# Features
2018-09-13 03:37:31 +00:00
2019-12-05 13:06:56 +00:00
< h1 align = "left" >
< img src = "static/subfinder-run.png" alt = "subfinder" width = "700px" > < / a >
< br >
< / h1 >
2021-02-20 17:48:52 +00:00
- Fast and powerful resolution and wildcard elimination module
2021-02-20 17:47:03 +00:00
- **Curated** passive sources to maximize results
2019-12-05 11:19:11 +00:00
- Multiple Output formats supported (Json, File, Stdout)
2019-12-05 11:33:37 +00:00
- Optimized for speed, very fast and **lightweight** on resources
2021-02-20 17:47:03 +00:00
- **STDIN/OUT** support for integrating in workflows
2018-06-26 11:33:16 +00:00
2020-05-22 21:42:11 +00:00
2018-04-24 13:14:52 +00:00
# Usage
2018-04-14 07:17:42 +00:00
2020-08-18 01:05:46 +00:00
```sh
2019-12-05 11:19:11 +00:00
subfinder -h
2018-04-24 13:14:52 +00:00
```
This will display help for the tool. Here are all the switches it supports.
2021-08-09 07:08:12 +00:00
| Flag | Description | Example |
| ---------------- | ---------------------------------------------------------- | --------------------------------------------|
| -all | Use all sources (slow) for enumeration | subfinder -d uber.com -all |
| -config | Configuration file for API Keys, etc | subfinder -config config.yaml |
| -d | Domain to find subdomains for | subfinder -d uber.com |
| -dL | File containing list of domains to enumerate | subfinder -dL hackerone-hosts.txt |
| -exclude-sources | List of sources to exclude from enumeration | subfinder -exclude-sources archiveis |
| -max-time | Minutes to wait for enumeration results (default 10) | subfinder -max-time 1 |
| -nC | Don't Use colors in output | subfinder -nC |
| -nW | Remove Wildcard & Dead Subdomains from output | subfinder -nW |
| -ls | List all available sources | subfinder -ls |
| -o | File to write output to (optional) | subfinder -o output.txt |
| -oD | Directory to write enumeration results to (optional) | subfinder -oD ~/outputs |
| -oI | Write output in Host,IP format | subfinder -oI |
| -oJ | Write output in JSON lines Format | subfinder -oJ |
| -r | Comma-separated list of resolvers to use | subfinder -r 1.1.1.1,1.0.0.1 |
| -rL | Text file containing list of resolvers to use | subfinder -rL resolvers.txt |
| -recursive | Enumeration recursive subdomains | subfinder -d news.yahoo.com -recursive |
| -silent | Show only subdomains in output | subfinder -silent |
| -sources | Comma separated list of sources to use | subfinder -sources shodan,censys |
| -t | Number of concurrent goroutines for resolving (default 10) | subfinder -t 100 |
| -timeout | Seconds to wait before timing out (default 30) | subfinder -timeout 30 |
| -http-proxy | Http Proxy | subfinder -http-proxy http://localhost:3128 |
2021-08-11 23:33:18 +00:00
| -rate-limit | Maximum number of HTTP requests to send per second | subfinder -rate-limit 10 |
2021-08-09 07:08:12 +00:00
| -v | Show Verbose output | subfinder -v |
| -version | Show current program version | subfinder -version |
2021-02-20 17:47:03 +00:00
# Installation
Subfinder requires **go1.14+** to install successfully. Run the following command to get the repo -
2019-12-06 08:28:07 +00:00
2020-08-18 01:05:46 +00:00
```sh
2021-02-20 17:47:03 +00:00
▶ GO111MODULE=on go get -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder
2019-12-06 08:28:07 +00:00
```
2018-04-17 06:36:23 +00:00
2018-04-24 13:14:52 +00:00
## Post Installation Instructions
2018-04-23 00:09:34 +00:00
2019-12-05 11:19:11 +00:00
Subfinder will work after using the installation instructions however to configure Subfinder to work with certain services, you will need to have setup API keys. The following services do not work without an API key:
2018-04-23 00:09:34 +00:00
2019-12-05 11:19:11 +00:00
- [Binaryedge ](https://binaryedge.io )
2021-08-09 07:05:05 +00:00
- [C99 ](https://api.c99.nl/ )
2020-09-21 19:53:10 +00:00
- [Certspotter ](https://sslmate.com/certspotter/api/ )
- [Censys ](https://censys.io )
2020-05-22 21:42:11 +00:00
- [Chaos ](https://chaos.projectdiscovery.io )
- [DnsDB ](https://api.dnsdb.info )
2020-07-14 12:08:12 +00:00
- [Github ](https://github.com )
- [Intelx ](https://intelx.io )
2020-09-21 19:53:10 +00:00
- [Passivetotal ](http://passivetotal.org )
- [Recon.dev ](https://recon.dev )
2020-09-21 18:34:42 +00:00
- [Robtex ](https://www.robtex.com/api/ )
2020-09-21 19:53:10 +00:00
- [SecurityTrails ](http://securitytrails.com )
- [Shodan ](https://shodan.io )
- [Spyse ](https://spyse.com )
2020-11-24 10:02:58 +00:00
- [Threatbook ](https://x.threatbook.cn/en )
2020-09-21 19:53:10 +00:00
- [Virustotal ](https://www.virustotal.com )
- [Zoomeye ](https://www.zoomeye.org )
2019-12-05 11:19:11 +00:00
2020-06-08 10:23:59 +00:00
Theses values are stored in the `$HOME/.config/subfinder/config.yaml` file which will be created when you run the tool for the first time. The configuration file uses the YAML format. Multiple API keys can be specified for each of these services from which one of them will be used for enumeration.
2019-12-05 11:19:11 +00:00
For sources that require multiple keys, namely `Censys` , `Passivetotal` , they can be added by separating them via a colon (:).
2020-08-10 15:59:15 +00:00
An example config file -
2019-12-05 11:19:11 +00:00
```yaml
resolvers:
- 1.1.1.1
- 1.0.0.1
sources:
- binaryedge
- bufferover
- censys
- passivetotal
- sitedossier
binaryedge:
- 0bf8919b-aab9-42e4-9574-d3b639324597
- ac244e2f-b635-4581-878a-33f4e79a2c13
censys:
- ac244e2f-b635-4581-878a-33f4e79a2c13:dd510d6e-1b6e-4655-83f6-f347b363def9
certspotter: []
2020-08-10 15:59:15 +00:00
passivetotal:
2020-07-14 12:08:12 +00:00
- sample-email@user.com:sample_password
2019-12-05 11:19:11 +00:00
securitytrails: []
2020-07-14 12:08:12 +00:00
shodan:
- AAAAClP1bJJSRMEYJazgwhJKrggRwKA
2020-07-14 17:12:47 +00:00
github:
- d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
2020-07-18 11:18:26 +00:00
- asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39
2018-04-23 00:09:34 +00:00
```
2018-06-26 13:38:49 +00:00
# Running Subfinder
2018-04-26 15:36:58 +00:00
To run the tool on a target, just use the following command.
2020-08-18 01:05:46 +00:00
```sh
2021-02-20 17:47:03 +00:00
▶ subfinder -d example.com
2018-04-26 15:36:58 +00:00
```
2019-12-05 11:33:37 +00:00
2021-02-20 17:47:03 +00:00
The verbose flag `v` can be used to display verbose information.
2018-04-26 15:36:58 +00:00
2020-08-18 01:05:46 +00:00
```
2021-02-20 17:47:03 +00:00
[bufferover] lutin.dima.example.com
[bufferover] izosimdima.example.com
[bufferover] glazkovdima.example.com
[bufferover] dengshima.example.com
[bufferover] wwwkima.example.com
[bufferover] proxima.example.com
[bufferover] mma.example.com
[bufferover] damidoma.example.com
[bufferover] nomerdoma.example.com
[bufferover] soti.croma.example.com
2018-04-26 15:36:58 +00:00
```
2020-07-12 11:35:25 +00:00
The `-o` command can be used to specify an output file.
2018-04-26 15:36:58 +00:00
2020-08-18 01:05:46 +00:00
```sh
2021-02-20 17:47:03 +00:00
▶ subfinder -d example.com -o output.txt
2019-12-05 11:33:37 +00:00
```
To run the tool on a list of domains, `-dL` option can be used. This requires a directory to write the output files. Subdomains for each domain from the list are written in a text file in the directory specified by the `-oD` flag with their name being the domain name.
2020-08-18 01:05:46 +00:00
```sh
2020-09-21 19:53:10 +00:00
▶ cat domains.txt
2019-12-05 11:33:37 +00:00
hackerone.com
google.com
2019-12-05 11:47:41 +00:00
2020-09-21 19:53:10 +00:00
▶ subfinder -dL domains.txt -oD ~/path/to/output
▶ ls ~/path/to/output
2019-12-05 11:47:41 +00:00
2019-12-05 11:33:37 +00:00
hackerone.com.txt
google.com.txt
2018-04-26 15:36:58 +00:00
```
2020-08-10 15:59:15 +00:00
You can also get output in json format using `-oJ` switch. This switch saves the output in the JSON lines format.
2018-04-26 15:36:58 +00:00
2020-07-12 11:35:25 +00:00
If you use the JSON format, or the `Host:IP` format, then it becomes mandatory for you to use the ** -nW** format as resolving is essential for these output format. By default, resolving the found subdomains is disabled.
2018-05-11 09:09:24 +00:00
2020-08-18 01:05:46 +00:00
```sh
2020-09-21 19:53:10 +00:00
▶ subfinder -d hackerone.com -o output.json -oJ -nW
▶ cat output.json
2019-12-05 11:47:41 +00:00
2019-12-05 11:19:11 +00:00
{"host":"www.hackerone.com","ip":"104.16.99.52"}
{"host":"mta-sts.hackerone.com","ip":"185.199.108.153"}
{"host":"hackerone.com","ip":"104.16.100.52"}
{"host":"mta-sts.managed.hackerone.com","ip":"185.199.110.153"}
2018-05-25 14:22:30 +00:00
```
2020-07-12 11:35:25 +00:00
The subdomains discovered can be piped to other tools too. For example, you can pipe the subdomains discovered by subfinder to httpx [httpx ](https://github.com/projectdiscovery/httpx ) which will then find running http servers on the host.
2019-12-05 11:33:37 +00:00
2020-08-18 01:05:46 +00:00
```sh
2020-09-21 19:53:10 +00:00
▶ echo hackerone.com | subfinder -silent | httpx -silent
2019-12-05 11:47:41 +00:00
2019-12-05 11:33:37 +00:00
http://hackerone.com
http://www.hackerone.com
http://docs.hackerone.com
http://api.hackerone.com
https://docs.hackerone.com
http://mta-sts.managed.hackerone.com
2018-06-26 13:34:36 +00:00
```
2018-07-06 04:05:46 +00:00
2021-02-20 17:47:03 +00:00
< table >
< tr >
< td >
## Subfinder with docker
2020-07-12 11:35:25 +00:00
2020-08-10 15:59:15 +00:00
You can use the official dockerhub image at [subfinder ](https://hub.docker.com/r/projectdiscovery/subfinder ). Simply run -
2020-07-12 11:35:25 +00:00
2020-08-18 01:05:46 +00:00
```sh
2020-09-21 19:53:10 +00:00
▶ docker pull projectdiscovery/subfinder
2020-07-12 11:35:25 +00:00
```
The above command will pull the latest tagged release from the dockerhub repository.
If you want to build the container yourself manually, git clone the repo, then build and run the following commands
- Clone the repo using `git clone https://github.com/projectdiscovery/subfinder.git`
- Build your docker container
2020-08-18 01:05:46 +00:00
```sh
2020-07-12 11:35:25 +00:00
docker build -t projectdiscovery/subfinder .
```
2020-07-12 11:43:48 +00:00
If you are using docker, you need to first create your directory structure holding subfinder configuration file. After modifying the default config.yaml file, you can run:
2020-08-18 01:05:46 +00:00
```sh
2020-09-21 19:53:10 +00:00
▶ mkdir -p $HOME/.config/subfinder
▶ cp config.yaml $HOME/.config/subfinder/config.yaml
▶ nano $HOME/.config/subfinder/config.yaml
2020-07-12 11:43:48 +00:00
```
After that, you can pass it as a volume using the following sample command.
2020-08-18 01:05:46 +00:00
```sh
2021-02-20 17:47:03 +00:00
▶ docker run -v $HOME/.config/subfinder:/root/.config/subfinder -it projectdiscovery/subfinder -d example.com
2020-07-12 11:43:48 +00:00
```
2021-02-20 17:47:03 +00:00
For example, this runs the tool against example.com and output the results to your host file system:
2020-08-18 01:05:46 +00:00
```sh
2021-02-20 17:47:03 +00:00
docker run -v $HOME/.config/subfinder:/root/.config/subfinder -it projectdiscovery/subfinder -d example.com > example.com.txt
2020-07-12 11:35:25 +00:00
```
2021-02-20 17:47:03 +00:00
< / td >
< / tr >
< / table >
2021-04-17 11:53:58 +00:00
< table >
< tr >
< td >
## Subfinder Go library
Usage example:
``` go
package main
import (
"bytes"
"context"
"fmt"
"io"
"io/ioutil"
"log"
"github.com/projectdiscovery/subfinder/v2/pkg/passive"
"github.com/projectdiscovery/subfinder/v2/pkg/resolve"
"github.com/projectdiscovery/subfinder/v2/pkg/runner"
)
func main() {
config := runner.ConfigFile{
// Use the default list of resolvers by marshaling it to the config
Resolvers: resolve.DefaultResolvers,
// Use the default list of passive sources
Sources: passive.DefaultSources,
// Use the default list of all passive sources
AllSources: passive.DefaultAllSources,
// Use the default list of recursive sources
Recursive: passive.DefaultRecursiveSources,
}
runnerInstance, err := runner.NewRunner(& runner.Options{
Threads: 10, // Thread controls the number of threads to use for active enumerations
Timeout: 30, // Timeout is the seconds to wait for sources to respond
MaxEnumerationTime: 10, // MaxEnumerationTime is the maximum amount of time in mins to wait for enumeration
YAMLConfig: config,
})
buf := bytes.Buffer{}
err = runnerInstance.EnumerateSingleDomain(context.Background(), "projectdiscovery.io", []io.Writer{& buf})
if err != nil {
log.Fatal(err)
}
data, err := ioutil.ReadAll(& buf)
if err != nil {
log.Fatal(err)
}
fmt.Printf("%s", data)
}
```
< / td >
< / tr >
< / table >
2021-02-06 08:12:47 +00:00
### Resources
- [Recon with Me !!! ](https://dhiyaneshgeek.github.io/bug/bounty/2020/02/06/recon-with-me/ )
2018-07-06 04:05:46 +00:00
# License
2019-12-05 11:33:37 +00:00
subfinder is made with 🖤 by the [projectdiscovery ](https://projectdiscovery.io ) team. Community contributions have made the project what it is. See the ** [Thanks.md ](https://github.com/projectdiscovery/subfinder/blob/master/THANKS.md )** file for more details.
2019-12-05 13:23:02 +00:00
2020-05-16 12:12:48 +00:00
Read the disclaimer for usage at [DISCLAIMER.md ](https://github.com/projectdiscovery/subfinder/blob/master/DISCLAIMER.md ) and [contact us ](mailto:contact@projectdiscovery.io ) for any API removal.