sublist3r

sublist3r 

sublist3r is a tool designed for discovering subdomains of websites. It uses search engines like Google, Yahoo, Bing, and others to enumerate subdomains, making it a powerful tool for reconnaissance in penetration testing and vulnerability assessment.

Common sublist3r Options:

  • Domain Name: The main domain for which you want to find subdomains.
  • Search Engines: You can specify which search engines to use for the search, such as Google, Yahoo, Bing, or Baidu. Leaving this blank will use the default set of engines.
  • –bruteforce: Uses a bruteforce technique to find subdomains in addition to search engine queries.
  • –verbose: Enables verbose mode to display more detailed output during the process.

Examples of Sublist3r Commands:

  • Discover subdomains for example.com using default search engines:
    > sublist3r -d example.com
  • Use Google and Bing to find subdomains for example.com:
    > sublist3r -d example.com -e google,bing
  • Perform a bruteforce attack to find subdomains for example.com:
    > sublist3r -d example.com --bruteforce
  • Use verbose mode for detailed output while enumerating subdomains:
    > sublist3r -d example.com --verbose