subscraper
                                
                                 subscraper copied to clipboard
                                
                                    subscraper copied to clipboard
                            
                            
                            
                        Subdomain and target enumeration tool built for offensive security testing
SubScraper
  
    
   
  
      
   
  
      
  
  
    Overview
      :small_blue_diamond:  
    Usage
      :small_blue_diamond:  
    Contribute
  
:boom: v3.0 now available! :boom:
SubScraper is a fast subdomain enumeration tool that uses a variety of techniques to find subdomains of a given target. Subdomain enumeration is especially helpful during penetration testing and bug bounty hunting to uncover an organization's attack surface.
Depending on the CMD arguments applied, SubScraper can resolve DNS names, request HTTP(S) information, and perform CNAME lookups for takeover opportunities during the enumeration process. This can help identify next steps and discover patterns for exploitation.
Key Features
- Modular design makes it easy to add new techniques/sources.
- Various levels of enumeration for additional data gathering.
- Allows for multiple target inputs or read targets from .txtfile.
- Windows CLI compatibility.
- Generate output files in .txtor.csvformat.
 
Install
The following can be used to install SubScraper on Windows, Linux, & MacOs:
git clone https://github.com/m8sec/subscraper
cd subscraper
python3 setup.py install
Usage
Command Line Args
SubScraper Options:
  -T MAX_THREADS        Max threads for enumeration (Default: 55).
  -t TIMEOUT            Timeout [seconds] for search threads (Default: 25).
  -r REPORT             Output to specific file {txt*, csv}.
  target                Target domain.
Module Options:
  -L                    List SubScraper enumeration modules.
  -M MODULES            Execute module(s) by name or group (Default: all).
  -w WORDLIST           Custom wordlist for DNS brute force.
  --censys-id CENSYS_ID             Censys.io API ID.
  --censys-secret CENSYS_SECRET     Censys.io API Secret.
Enumeration Options:
  --dns                 Resolve DNS address for each subdomain identified.
  --http                Probe for active HTTP:80 & HTTPS:443 services.
  --takeover            Perform CNAME lookup & probe for HTTP(s) response.
  --all                 Perform all checks on enumerated subdomains.
Modules
Modules can be executed by name or by module groups:
  Module Name       Description
  archiveorg           - Use archive.org to find subdomains.
  certsh               - Subdomains enumeration using cert.sh.
  dnsbrute             - DNS bruteforce.
  threatcrowd          - Threadcrowd.org subdomain enumeration.
  dnsdumpster          - Use DNS dumpster to enumerate subdomains.
  bufferoverrun        - Bufferover.run passive enumeration.
  search               - Subdomain enumeration via search engine scraping.
  censys               - Gather subdomains through censys.io SSL cert Lookups.
    |_API_ID                   Censys.io API ID               (Required:True)
    |_API_SECRET               Censys.io API Secret           (Required:True)
Module Groups
- all - Execute all modules (Default).
- brute - Only execute DNS brute force techniques.
- scrape - Only execute web scraping techniques.
Example Usage
subscraper example.com
subscraper targets.txt
cat targets.txt | subscraper pipe
subscraper -all -r enumeration.csv example.com
subscraper -M brute -w mywords.txt example.com
subscraper -M censys --censys-id abc123 --censys-secret xyz456 example.com
Execution Notes
- SubScraper only uses PASSIVE enumeration techniques unless all, http, takeoverarguments are applied.
- API keys are required for the censysmodule, register for free at censys.io/register.
- .txtreports will only include subdomains.
- .csvreports, when paired with cmd args- all, http, takeover, will provide additional HTTP data such as page size, title, and Server headers.
Contribute
Contribute to the project by:
- Like and share the tool!
- Create an issue to report new enumeration techniques or, better yet, develop a module and initiate a PR.