This bash script is designed to gather subdomain data from various reputable sources and merge them together to create multiple wordlists, each organized by different subdomain levels, and make a master subdomains wordlist merging all different levels subdomains wordlists. This makes a very effective and massive wordlist consisting of 66 million +
subdomains, that can be further used in the subdomain brute-forcing process by security researchers and bug hunters.
wget https://raw.githubusercontent.com/InfoSecWarrior/Offensive-Pentesting-Scripts/main/Subdomains-Wordlists/oswc.sh
chmod +x oswc.sh
./oswc.sh
Saving results in specific directory, by default it saves results in present working directory
./oswc.sh --output /opt/wordlists
first_level_subdomains_wordlist.txt
-----------------------------------
sub1
sub2
sub3
second_level_subdomains_wordlist.txt
-----------------------------------
sub1.sub
sub2.sub
sub3.sub
Until ninth_and_above_level_subdomains_wordlist.txt...
This script serves the same purpose as the above script, but uses different tools such as dsieve
and unfurl
instead of awk
and duplicut
to achieve the same result. There is no difference in the output produced by both scripts. The above script, which uses awk
and duplicut
, is more suitable for systems with low RAM compared to this script.
wget https://raw.githubusercontent.com/InfoSecWarrior/Offensive-Pentesting-Scripts/main/Subdomains-Wordlists/oswc_dsieve.sh
chmod +x oswc_dsieve.sh
./oswc_dsieve.sh
Saving results in specific directory, by default it saves results in present working directory
./oswc_dsieve.sh --output /opt/wordlists
first_level_subdomains_wordlist.txt
-----------------------------------
sub1
sub2
sub3
second_level_subdomains_wordlist.txt
-----------------------------------
sub1.sub
sub2.sub
sub3.sub
Until ninth_and_above_level_subdomains_wordlist.txt...