Subdomain Finders

Find URLs and subdomains.

7 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Dirsearch 

Open-source    

Command line tool to brute force directories and files

Dnsgen 

Open-source    

This tool generates a combination of domain names from the provided input

Gau 

Open-source    

Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl

JSParser 

Open-source    

A python script to parse relative URLs from JavaScript files

Subfinder 

Open-source    

A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources

Unfurl 

Open-source    

Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack

Waybackurls 

Open-source    

Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout