子域名收集工具
功能
使用
➜ domainscan ./domainscan -h
Domain Scanner
Usage:
./domainscan [flags]
Flags:
INPUT:
-i, -input string domain input(example: -i 'baidu.com')
-f, -input-file string domains file(example: -f 'xxx.txt')
SUBFINDER:
-provider-config string subfinder provider config file(example: -provider-config 'xxx.yaml') (default "~/.config/subfinder/provider-config.yaml")
KSUBDOMAIN:
-l, -layer int number of domain layer(1|2) (default 1)
-subdomain-file string subdomain file(example: -subdomain-file 'xxx.txt')
-subnext-file string subnext file(example: -subnext-file 'xxx.txt')
OUTPUT:
-o, -output string output file to write found results (default "domainscan.txt")
-nc, -no-color disable colors in output
DEBUG:
-debug show debug output
截图
参考
https://github.com/projectdiscovery/subfinder
https://github.com/boy-hack/ksubdomain
文章来源: https://github.com/niudaii/domainscan
如有侵权请联系:admin#unsafe.sh