Skip to content
This repository has been archived by the owner on Mar 10, 2023. It is now read-only.
/ DomainDouche Public archive

OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

License

Notifications You must be signed in to change notification settings

n0kovo/DomainDouche

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

Use it while it still works 🙃 (aaaand it's dead)

(Also, hmu on Mastodon: @n0kovo@infosec.exchange)

Demo:

Usage:

usage: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] keyword

Abuses SecurityTrails API to find related domains by keyword.
Go to https://securitytrails.com/dns-trails, solve any CAPTCHA you might encounter,
copy the raw value of your Cookie and User-Agent headers and use them with the -c and -a arguments.

positional arguments:
  keyword               keyword to append brute force string to

options:
  -h, --help            show this help message and exit
  -n N, --num N         number of characters to brute force (default: 2)
  -c COOKIE, --cookie COOKIE
                        raw cookie string
  -a USER_AGENT, --useragent USER_AGENT
                        user-agent string (must match the browser where the cookies are from)
  -w NUM, --workers NUM
                        number of workers (default: 5)
  -o OUTFILE, --output OUTFILE
                        output file path

About

OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages