Sublist3r is a Python tool designed to enumerate subdomains using search engines like Google, Yahoo, Bing, Baidu, and Ask. It also uses Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.
Basic Usage
- sublist3r -d <domain> - Basic subdomain enumeration
- python sublist3r.py -d <domain> - Run directly with Python
Options
- -d, --domain - Domain to enumerate
- -b, --bruteforce - Enable brute force module
- -p, --ports - Scan for open ports (comma separated)
- -v, --verbose - Enable verbose output
- -t, --threads - Number of threads (default 30)
- -e, --engines - Specify search engines (comma separated)
- -o, --output - Save results to file
- -h, --help - Show help message
Search Engines
Available engines for -e option:
- yahoo
- bing
- baidu
- ask
- netcraft
- dnsdumpster
- virustotal
- threatcrowd
- ssl
- passivedns
Common Examples
Basic Enumeration
sublist3r -d example.com
Find subdomains using all sources.
Save to File
sublist3r -d example.com -o subdomains.txt
Save discovered subdomains to file.
Verbose with Threads
sublist3r -d example.com -v -t 50
Verbose output with 50 threads.
Specific Engines
sublist3r -d example.com -e google,bing,virustotal
Use only specific search engines.
With Port Scanning
sublist3r -d example.com -p 80,443,8080
Enumerate and scan for open ports.
Brute Force
sublist3r -d example.com -b
Enable brute force subdomain guessing.
Full Scan
sublist3r -d example.com -b -p 80,443 -v -o results.txt
Comprehensive scan with all features.
Installation
# Clone the repository
git clone https://github.com/aboul3la/Sublist3r.git
# Install requirements
cd Sublist3r
pip install -r requirements.txt
# Run
python sublist3r.py -d example.com
Tips
- Use multiple engines for comprehensive coverage
- Some engines may block you - rotate sources if needed
- Combine with other tools like amass and subfinder
- Use -v to see real-time progress
- Port scanning adds time but reveals more info
- Brute force can find subdomains not indexed by search engines
- Results can be piped to other tools for further analysis
- Always get authorization before scanning targets you don't own