#subdomain #brute-force #dns #hacking

bin+lib subrut

The super fast tool for brute forcing subdomains

2 releases

0.1.1 Aug 22, 2022
0.1.0 Aug 22, 2022

#6 in #subdomain

MIT license

2.5MB
308 lines

Latest Version | Documentation

Subrut is the super fast tool for brute forcing subdomains. From arg2u with ♥

Requirments

To use Subrut you need to install Cargo and Rust. Just paste into your terminal window:

curl https://sh.rustup.rs -sSf | sh
cargo install subrut

Usage

subrut [OPTIONS] -d <domain>

Flags

-h, --help       Prints help information
-V, --version    Prints version information

Options

-d <domain>           Domain to scan
-f <file>             Output filepath. If not provided will print results to console [default: ""]
-o <output>           Output format (txt ,json, csv) [default: txt]
-r <resolver>         Resolver (google, quad9, cloudflare) [default: google]
-w <wordslist>        Wordslist file [default: wordslist.txt]

In-Code Example

use subrut::models::error::Error;
#[tokio:main]
async fn main() ->  Result<(), Error> {
    let scan = subrut::run("admin\nips\n".to_string(),"google.com".to_string(), "google".to_string(), None)?;
    println!("JSON = {}", &scan.to_json()?);
    println!("CSV = {}", &scan.to_csv());
    println!("Pure string = {}", &scan.to_string());
    Ok(())
}

Library Dependecies

trust-dns-resolver = "0.21.2"
tokio = { version = "1", features = ["full"] }
serde = {version = "1.0.143", features = ["derive"]}
serde_json = "1.0"

Donation

BTC: 1BXuTySFfiamKSa2GeC7vjDPBE4uxtz3a6

License

MIT

Dependencies

~10–21MB
~293K SLoC