Skip to content

OSINT tool by n0kovo, abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

License

Notifications You must be signed in to change notification settings

orguetta/DomainDouche

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

Use it while it still works 🙃

(Also, hmu on Mastodon: @[email protected])

Demo:

Usage:

usage: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] keyword

Abuses SecurityTrails API to find related domains by keyword.
Go to https://securitytrails.com/dns-trails, solve any CAPTCHA you might encounter,
copy the raw value of your Cookie and User-Agent headers and use them with the -c and -a arguments.

positional arguments:
  keyword               keyword to append brute force string to

options:
  -h, --help            show this help message and exit
  -n N, --num N         number of characters to brute force (default: 2)
  -c COOKIE, --cookie COOKIE
                        raw cookie string
  -a USER_AGENT, --useragent USER_AGENT
                        user-agent string (must match the browser where the cookies are from)
  -w NUM, --workers NUM
                        number of workers (default: 5)
  -o OUTFILE, --output OUTFILE
                        output file path

About

OSINT tool by n0kovo, abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%