{
	"id": "1bbcc6ae-c050-4794-9872-4abe2c910749",
	"created_at": "2026-04-06T00:18:24.072938Z",
	"updated_at": "2026-04-10T03:22:13.640965Z",
	"deleted_at": null,
	"sha1_hash": "7d7582413f00ef51cb5b000a0c9523ed5e2e73f1",
	"title": "GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 71067,
	"plain_text": "GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool\r\nfor penetration testers\r\nBy aboul3la\r\nArchived: 2026-04-05 13:05:09 UTC\r\nAbout Sublist3r\r\nSublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers\r\nand bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates\r\nsubdomains using many search engines such as Google, Yahoo, Bing, Baidu and Ask. Sublist3r also enumerates\r\nsubdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster and ReverseDNS.\r\nsubbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce\r\nwith an improved wordlist. The credit goes to TheRook who is the author of subbrute.\r\nScreenshots\r\nSublist3r\r\nInstallation\r\ngit clone https://github.com/aboul3la/Sublist3r.git\r\nRecommended Python Version:\r\nSublist3r currently supports Python 2 and Python 3.\r\nThe recommended version for Python 2 is 2.7.x\r\nThe recommended version for Python 3 is 3.4.x\r\nDependencies:\r\nSublist3r depends on the requests , dnspython and argparse python modules.\r\nThese dependencies can be installed using the requirements file:\r\nInstallation on Windows:\r\nc:\\python27\\python.exe -m pip install -r requirements.txt\r\nhttps://github.com/aboul3la/Sublist3r\r\nPage 1 of 5\n\nInstallation on Linux\r\nsudo pip install -r requirements.txt\r\nAlternatively, each module can be installed independently as shown below.\r\nRequests Module (http://docs.python-requests.org/en/latest/)\r\nInstall for Windows:\r\nc:\\python27\\python.exe -m pip install requests\r\nInstall for Ubuntu/Debian:\r\nsudo apt-get install python-requests\r\nInstall for Centos/Redhat:\r\nsudo yum install python-requests\r\nInstall using pip on Linux:\r\nsudo pip install requests\r\ndnspython Module (http://www.dnspython.org/)\r\nInstall for Windows:\r\nc:\\python27\\python.exe -m pip install dnspython\r\nInstall for Ubuntu/Debian:\r\nsudo apt-get install python-dnspython\r\nInstall using pip:\r\nsudo pip install dnspython\r\nargparse Module\r\nInstall for Ubuntu/Debian:\r\nhttps://github.com/aboul3la/Sublist3r\r\nPage 2 of 5\n\nsudo apt-get install python-argparse\r\nInstall for Centos/Redhat:\r\nsudo yum install python-argparse\r\nInstall using pip:\r\nsudo pip install argparse\r\nfor coloring in windows install the following libraries\r\nc:\\python27\\python.exe -m pip install win_unicode_console colorama\r\nUsage\r\nShort Form Long Form Description\r\n-d --domain Domain name to enumerate subdomains of\r\n-b --bruteforce Enable the subbrute bruteforce module\r\n-p --ports Scan the found subdomains against specific tcp ports\r\n-v --verbose Enable the verbose mode and display results in realtime\r\n-t --threads Number of threads to use for subbrute bruteforce\r\n-e --engines Specify a comma-separated list of search engines\r\n-o --output Save the results to text file\r\n-h --help show the help message and exit\r\nExamples\r\nTo list all the basic options and switches use -h switch:\r\npython sublist3r.py -h\r\nTo enumerate subdomains of specific domain:\r\npython sublist3r.py -d example.com\r\nTo enumerate subdomains of specific domain and show only subdomains which have open ports 80 and\r\n443 :\r\nhttps://github.com/aboul3la/Sublist3r\r\nPage 3 of 5\n\npython sublist3r.py -d example.com -p 80,443\r\nTo enumerate subdomains of specific domain and show the results in realtime:\r\npython sublist3r.py -v -d example.com\r\nTo enumerate subdomains and enable the bruteforce module:\r\npython sublist3r.py -b -d example.com\r\nTo enumerate subdomains and use specific engines such Google, Yahoo and Virustotal engines\r\npython sublist3r.py -e google,yahoo,virustotal -d example.com\r\nUsing Sublist3r as a module in your python scripts\r\nExample\r\nimport sublist3r\r\nsubdomains = sublist3r.main(domain, no_threads, savefile, ports, silent, verbose, enable_bruteforce,\r\nThe main function will return a set of unique subdomains found by Sublist3r\r\nFunction Usage:\r\ndomain: The domain you want to enumerate subdomains of.\r\nsavefile: save the output into text file.\r\nports: specify a comma-sperated list of the tcp ports to scan.\r\nsilent: set sublist3r to work in silent mode during the execution (helpful when you don't need a lot of\r\nnoise).\r\nverbose: display the found subdomains in real time.\r\nenable_bruteforce: enable the bruteforce module.\r\nengines: (Optional) to choose specific engines.\r\nExample to enumerate subdomains of Yahoo.com:\r\nimport sublist3r\r\nsubdomains = sublist3r.main('yahoo.com', 40, 'yahoo_subdomains.txt', ports= None, silent=False, verbo\r\nLicense\r\nSublist3r is licensed under the GNU GPL license. take a look at the LICENSE for more information.\r\nCredits\r\nTheRook - The bruteforce module was based on his script subbrute.\r\nhttps://github.com/aboul3la/Sublist3r\r\nPage 4 of 5\n\nBitquark - The Subbrute's wordlist was based on his research dnspop.\r\nThanks\r\nSpecial Thanks to Ibrahim Mosaad for his great contributions that helped in improving the tool.\r\nVersion\r\nCurrent version is 1.0\r\nSource: https://github.com/aboul3la/Sublist3r\r\nhttps://github.com/aboul3la/Sublist3r\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://github.com/aboul3la/Sublist3r"
	],
	"report_names": [
		"Sublist3r"
	],
	"threat_actors": [],
	"ts_created_at": 1775434704,
	"ts_updated_at": 1775791333,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7d7582413f00ef51cb5b000a0c9523ed5e2e73f1.pdf",
		"text": "https://archive.orkl.eu/7d7582413f00ef51cb5b000a0c9523ed5e2e73f1.txt",
		"img": "https://archive.orkl.eu/7d7582413f00ef51cb5b000a0c9523ed5e2e73f1.jpg"
	}
}