Recon Subdomains like a PRO
Consider this one of the better cheat sheets for subdomain reconnaissance that you will be able to use to get everything you can get on your juicy targets.
Project Discovery Tools - AIO
subfinder -d redacted.com -all | anew subs.txt; shuffledns -d redacted.com -r resolvers.txt -w n0kovo_subdomains_huge.txt | anew subs.txt; dnsx -l subs.txt -r resolvers.txt | anew resolved.txt; naabu -l resolved.txt -nmap -rate 5000 | anew ports.txt; httpx -l ports .txt | anew alive.txt; katana -list alive.txt -kf all -jc | anew urls.txt; nuclei -l urls.txt -es info, unknown -ept ssl -ss template-spray | anew nuclei.txtSubdomain Enumeration
subfinder -d target.com -silent | dnsx -silent | cut -d ' ' -f1 | grep --color 'api|dev|stg|test|admin|demo|stage|pre|vpn'1. bufferover.run - enumeration
curl -s https://dns.bufferover.run/dns?q=.target.com | jq -r .FDNS_A[] | cut -d',' -f2 | sort -u 2. Riddler.io - enumeration
curl -s "https://riddler.io/search/exportcsv?q=pld:target.com" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u 3. RedHunt Labs Recon API
curl --request GET --url 'https://reconapi.redhuntlabs.com/community/v1/domains/subdomains?domain=<target.com>&page_size=1000' --header 'X-BLOBR-KEY: API_KEY' | jq '.subdomains[]' -r4. Archive.org - enumeration
5. Certspotter - enumeration
6. Nmap - enumeration
7. JLDC
8. CRT.sh - enumeration
9. Threatminer Enumeration
10. Anubis Enumeration
11. ThreatCrowd Enumeration
12. HackerTarget
13. AlienVault
14. Censys
Last updated