Abusing SecurityTrails area suggestion API to search out doubtlessly associated domains by key phrase and brute power.
Use it whereas it nonetheless works
(Additionally, hmu on Mastodon: @[email protected])
Utilization:
utilization: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] key phraseAbuses SecurityTrails API to search out associated domains by key phrase.
Go to https://securitytrails.com/dns-trails, remedy any CAPTCHA you may encounter,
copy the uncooked worth of your Cookie and Consumer-Agent headers and use them with the -c and -a arguments.
positional arguments:
key phrase key phrase to append brute power string to
choices:
-h, --help present this assist message and exit
-n N, --num N variety of characters to brute power (default: 2)
-c COOKIE, --cookie COOKIE
uncooked cookie string
-a USER_AGENT, --useragent USER_AGENT
user-agent string (should match the browser the place the cookies are from)
-w NUM, --workers NUM
variety of staff (default: 5)
-o OUTFILE, --output OUTFILE
output file path