8000 GitHub - lasinduChathuranga/LSUB: LSUB
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

lasinduChathuranga/LSUB

Repository files navigation

LSUB v1 - Enhanced Subdomain Enumeration Tool

LSUB v1 is a powerful subdomain enumeration tool designed for cybersecurity professionals. It integrates 12 different engines including search engines and specialized data sources like SSL certificate logs. With features like multi-threading, bruteforce support, port scanning, and customizable output formats, LSUB helps in comprehensive discovery of subdomains for vulnerability assessments and penetration testing.

πŸš€ Features

Search Engines Integration (6 Engines)

  • Google - Web search enumeration
  • Bing - Microsoft search engine
  • Yahoo - Yahoo search integration
  • Baidu - Chinese search engine
  • Ask - Ask.com search
  • Netcraft - Domain intelligence

Specialized Engines (6 Engines)

  • SSL Certificates (crt.sh) - Enhanced certificate transparency logs
  • DNSdumpster - DNS reconnaissance
  • VirusTotal - Threat intelligence platform
  • ThreatCrowd - Open source threat intelligence
  • PassiveDNS - Passive DNS data
  • Certificate Transparency - Alternative SSL cert lookup

Advanced Features

  • 🎯 Multi-threaded scanning for faster results
  • πŸ” Bruteforce capability with customizable wordlists
  • 🌐 12 different enumeration engines
  • πŸ“Š Port scanning on discovered subdomains
  • πŸ’Ύ Multiple output formats
  • 🎨 Colorized terminal output
  • ⚑ Enhanced crt.sh integration with JSON and HTML parsing
  • πŸ”§ Flexible engine selection

πŸ“¦ Installation

Prerequisites

# Python 2.7 or 3.x
python --version

# Install required dependencies
pip install -r requirements.txt

Clone Repository

git clone https://github.com/lasinduChathuranga/LSUB.git
cd LSUB
python3 lsub-v1.py -d example.com

πŸ› οΈ Dependencies

requests>=2.25.1
dnspython>=2.1.0

Optional dependencies for enhanced functionality:

subbrute  # For bruteforce functionality

πŸ“‹ Usage

Basic Usage

# Simple subdomain enumeration
python lsub-v1.py -d example.com

# With verbose output
python lsub-v1.py -d example.com -v

# Save results to file
python lsub-v1.py -d example.com -o results.txt

Advanced Usage

# Use specific engines only
python lsub-v1.py -d example.com -e google,ssl,dnsdumpster

# Enable bruteforce with custom threads
python lsub-v1.py -d example.com -b -t 50

# Include port scanning
python lsub-v1.py -d example.com -p 80,443,8080,8443

# Use only search engines
python lsub-v1.py -d example.com -e google,bing,yahoo,baidu,ask,netcraft

# Use only specialized engines
python lsub-v1.py -d example.com -e ssl,dnsdumpster,virustotal,threatcrowd,passivedns

Show Available Engines

python lsub-v1.py --show-engines

πŸŽ›οΈ Command Line Options

Option Description Example
-d, --domain Target domain (required) -d example.com
-e, --engines Comma-separated list of engines -e google,ssl,bing
-t, --threads Number of threads (default: 30) -t 50
-b, --bruteforce Enable bruteforce enumeration -b
-p, --ports Scan ports on discovered subdomains -p 80,443,8080
-o, --output Output file for results -o results.txt
-v, --verbose Enable verbose output -v
--no-color Disable colored output --no-color
--show-engines Display available engines --show-engines

πŸ—οΈ Engine Categories

Search Engines Group

Perfect for discovering subdomains indexed by search engines:

  • Google, Bing, Yahoo, Baidu, Ask, Netcraft

Specialized Engines Group

Advanced discovery through specialized databases:

  • SSL Certificate databases, DNS databases, Threat intelligence platforms

πŸ“ˆ Performance Tips

  1. Adjust thread count based on your system and network:

    python lsub-v1.py -d example.com -t 100  # High-performance systems
    python lsub-v1.py -d example.com -t 20   # Conservative approach
  2. Use specific engines for targeted discovery:

    python lsub-v1.py -d example.com -e ssl,dnsdumpster  # Focus on cert transparency
  3. Combine with bruteforce for comprehensive coverage:

    python lsub-v1.py -d example.com -b -t 50

πŸ“Š Output Examples

Console Output

╔══════════════════════════════════════════════════════════════════════╗
β•‘                           TARGET ANALYSIS                            β•‘
╠══════════════════════════════════════════════════════════════════════╣
β•‘ Enumerating subdomains for: example.com                              β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[+] Using 12 enumeration engines
    Search Engines: 6/6
    Specialized Engines: 6/6

╔══════════════════════════════════════════════════════════════════════╗
β•‘ Searching  now  SSL Certificates (crt.sh)                            β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

[+] www.example.com
[+] mail.example.com
[+] ftp.example.com
[+] api.example.com

[+] Found 45 subdomains
[+] Scan completed in 23.45 seconds

File Output

# LSUB v1 Enhanced Results
# Generated: 2025-06-15 14:30:22
# Total: 45

api.example.com
ftp.example.com
mail.example.com
www.example.com
...

πŸ”§ Configuration

Custom Wordlists (for bruteforce)

Place your custom wordlist in the subbrute/ directory:

subbrute/
β”œβ”€β”€ names.txt        # Default wordlist
β”œβ”€β”€ resolvers.txt    # DNS resolvers
└── custom.txt       # Your custom wordlist

🀝 Contributing

We welcome contributions! Here's how you can help:

  1. Fork the repository
  2. Create a feature branch: git checkout -b feature/amazing-feature
  3. Commit your changes: git commit -m 'Add amazing feature'
  4. Push to the branch: git push origin feature/amazing-feature
  5. Open a Pull Request

Areas for Contribution

  • Additional enumeration engines
  • Performance optimizations
  • New output formats
  • Documentation improvements
  • Bug fixes and testing

πŸ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

⚠️ Disclaimer

This tool is intended for educational purposes and authorized penetration testing only. Users are responsible for complying with applicable laws and regulations. The developers assume no liability for misuse of this tool.

πŸ› Bug Reports & Feature Requests

πŸ“š Documentation

For detailed documentation and advanced usage examples, visit our Wiki.

πŸ™ Acknowledgments

  • Thanks to the certificate transparency community
  • Special thanks to crt.sh for SSL certificate data
  • Inspired by various subdomain enumeration tools in the security community

πŸ“Š Statistics

  • 12 enumeration engines
  • Multi-threaded performance
  • Enhanced SSL certificate integration
  • Cross-platform compatibility

Made with ❀️ for the cybersecurity community

About

LSUB

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0