You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Good morning, I would like to try to implement my tool.
It's called Lrod and is used to help bug hunters and pentesters during reconnaissance.
Characteristics:
☑ Enumeration of subdomains using passive techniques (such as "subfinder")
☑ Lots of extra queries to enumerate DNS
☑ Domain Zone Transfer Attack
☑ WAF type detection
☑ Common enumeration (CMSs, reverse proxies, jquery...)
☑ Target domain "Whois"
☑ Subdomain Acquisition Checker
☑ Check common open ports
☑ Checks active subdomains (like "httprobe")
☑ Wayback machine support for enumerating endpoints (like "waybackurls")
☑ Email Collection
Pendency:
Compare the results with other tools like subfinder, gau, httprobe...
Improve existing code and functions
Third part:
The tool uses different services to obtain subdomains in different ways
The WAF detector has been modified and adapted from the CRLFSuite concept <3
All DNS queries use dns-python 100%, no digging or any extra tools required
Email collection functions are done using Hunter.io API with personal token (free registration)
Good morning, I would like to try to implement my tool.
It's called Lrod and is used to help bug hunters and pentesters during reconnaissance.
Characteristics:
☑ Enumeration of subdomains using passive techniques (such as "subfinder")
☑ Lots of extra queries to enumerate DNS
☑ Domain Zone Transfer Attack
☑ WAF type detection
☑ Common enumeration (CMSs, reverse proxies, jquery...)
☑ Target domain "Whois"
☑ Subdomain Acquisition Checker
☑ Check common open ports
☑ Checks active subdomains (like "httprobe")
☑ Wayback machine support for enumerating endpoints (like "waybackurls")
☑ Email Collection
Pendency:
Compare the results with other tools like subfinder, gau, httprobe...
Improve existing code and functions
Third part:
The tool uses different services to obtain subdomains in different ways
The WAF detector has been modified and adapted from the CRLFSuite concept <3
All DNS queries use dns-python 100%, no digging or any extra tools required
Email collection functions are done using Hunter.io API with personal token (free registration)
Abs, Eduardo Barbosa
https://gitlab.com/Edu0x01/Lrod
The text was updated successfully, but these errors were encountered: