sublist3r
Subdomain enumeration using search engines
TLDR
Enumerate subdomains
SYNOPSIS
sublist3r [-d domain] [-o file] [-e engines] [options]
DESCRIPTION
sublist3r is an OSINT reconnaissance tool that discovers subdomains of a target domain by querying multiple search engines and data sources. It aggregates results from Google, Bing, Yahoo, Baidu, Ask, Netcraft, VirusTotal, and other sources to build a comprehensive list of subdomains.
Beyond passive search engine enumeration, sublist3r can perform active DNS bruteforce using common subdomain wordlists. It also includes port scanning capabilities to identify which discovered subdomains have live services running on specified ports, helping prioritize targets during security assessments.
The tool is designed for authorized penetration testing and bug bounty reconnaissance. Multi-threading support allows faster enumeration, and results can be saved to files for further processing by other security tools.
PARAMETERS
-d, --domain DOMAIN
Target domain.-o, --output FILE
Output file.-e, --engines LIST
Search engines.-b, --bruteforce
Enable bruteforce.-t, --threads N
Thread count.-p, --ports PORTS
Scan ports.-v, --verbose
Verbose output.
CAVEATS
For authorized testing only. Rate limiting may apply. Some engines require API keys.
HISTORY
Sublist3r was created by Ahmed Aboul-Ela for subdomain enumeration. It's widely used in penetration testing and bug bounty hunting.
