LinuxCommandLibrary

sublist3r

Subdomain enumeration using search engines

TLDR

Enumerate subdomains

$ sublist3r -d [example.com]
copy
Save to file
$ sublist3r -d [example.com] -o [subdomains.txt]
copy
Use specific engines
$ sublist3r -d [example.com] -e [google,bing,virustotal]
copy
Set threads
$ sublist3r -d [example.com] -t [10]
copy
Enable bruteforce
$ sublist3r -d [example.com] -b
copy
Verbose output
$ sublist3r -d [example.com] -v
copy
Show ports
$ sublist3r -d [example.com] -p [80,443]
copy

SYNOPSIS

sublist3r [-d domain] [-o file] [-e engines] [options]

DESCRIPTION

sublist3r is an OSINT reconnaissance tool that discovers subdomains of a target domain by querying multiple search engines and data sources. It aggregates results from Google, Bing, Yahoo, Baidu, Ask, Netcraft, VirusTotal, and other sources to build a comprehensive list of subdomains.
Beyond passive search engine enumeration, sublist3r can perform active DNS bruteforce using common subdomain wordlists. It also includes port scanning capabilities to identify which discovered subdomains have live services running on specified ports, helping prioritize targets during security assessments.
The tool is designed for authorized penetration testing and bug bounty reconnaissance. Multi-threading support allows faster enumeration, and results can be saved to files for further processing by other security tools.

PARAMETERS

-d, --domain DOMAIN

Target domain.
-o, --output FILE
Output file.
-e, --engines LIST
Search engines.
-b, --bruteforce
Enable bruteforce.
-t, --threads N
Thread count.
-p, --ports PORTS
Scan ports.
-v, --verbose
Verbose output.

CAVEATS

For authorized testing only. Rate limiting may apply. Some engines require API keys.

HISTORY

Sublist3r was created by Ahmed Aboul-Ela for subdomain enumeration. It's widely used in penetration testing and bug bounty hunting.

SEE ALSO

amass(1), subfinder(1), dnsrecon(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community