DNSBruter


NameDNSBruter JSON
Version 1.0.4 PyPI version JSON
download
home_pagehttps://github.com/RevoltSecurities/Dnsbruter
Summarydnsbruter is a powerfull tool for asynchronous dns brutforcing and fuzzing with wildcard detection
upload_time2024-05-12 15:35:24
maintainerNone
docs_urlNone
authorD.Sanjai Kumar @RevoltSecurities
requires_pythonNone
licenseNone
keywords
VCS
bugtrack_url
requirements aiodns aiofiles alive_progress art colorama Requests urllib3
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# Dnsbruter - Asynchronous Dns Bruteforcing Tool

Dnsbruter an Asynchronous Dns bruteforcing and Fuzzing  Tool for Penetration Testers and Ethical hackers.
it used to bruteforce and fuzz for domain names in any position of input using BRUT word in it.

![GitHub last commit](https://img.shields.io/github/last-commit/RevoltSecurities/Dnsbruter) ![GitHub release (latest by date)](https://img.shields.io/github/v/release/RevoltSecurities/Dnsbruter) [![GitHub license](https://img.shields.io/github/license/RevoltSecurities/Dnsbruter)](https://github.com/RevoltSecurities/Dnsbruter/blob/main/LICENSE) [![LinkedIn](https://img.shields.io/badge/LinkedIn-Connect-blue)](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/)

### features:
<h1 align="center">
  <img src="https://github.com/RevoltSecurities/Dnsbruter/assets/119435129/51cb47ce-2a9d-49f5-a547-bae184a5c19e" width="700px">
  <br>
</h1>

- Asynchronous and concurrent dns bruteforcing.
- Supports both dns brutforcing and fuzzing.
- Manages high level threads.
- Manages high loads wordlist.
- Enhanced asynchronous performance better than before.
- Wildcard detection for found domain.



## Usage

To start using Dnsbruter, use the following command-line options:

```yaml
dnsbruter -h                                
     __              __               __            
 ___/ /  ___   ___  / /   ____ __ __ / /_ ___   ____
/ _  /  / _ \ (_-< / _ \ / __// // // __// -_) / __/
\_,_/  /_//_//___//_.__//_/   \_,_/ \__/ \__/ /_/   
                                                    

                    @RevoltSecurities


[DESCRIPTION]: dnsbruter is a powerfull tool for asynchronous dns brutforcing and fuzzing with wildcard detection

[Usage]: 

    dnsbruter [options]
    
[OPTIONS]: 

    [INPUT]:
            -d   ,  --domain               string   : domain name for resolving subdomains.
            -w   ,  --wordlist             string   : wordlist path for dnsbruter.
            
    [CONFIG]:
            -rl,    --resolver             string   : filename contains list of resolvers (default: system config)
            -ip,    --ipaddress            command  : shows ip for valid domains that found by dnsbruter
            -v,     --versbose             command  : increase the verbosity of output
            -wd,    --wildcard-detect      command  : enable to detect wildcards for found domains.
            -ov,    --override             command  : enable to skip the domain verification and this is not applies to when used BRUT in domain.
            
    [RATE-LIMIT]: 
            -c   ,  --concurrency            int    : number of concurrency value for dns bruteforcing.             
            -wt  , --wildcard-threds         int    : number of threads values for wildcard detections
            
    [UPDATES]: 
            -up,    --updates              command  : updates the Dnsbruter for latest version (required: pip to be installed) 
            -dc,    --disable-check        command  : disable updates check for dnsbruter
            
    [OUTPUT]: 
            -o,     --output               string   : filename to save the scans outputs. 
            -ws,    --wildcard-output      string   : filename to save the found wildcard domains.
            
    [DEBUG]: 
            -h,     --help                 command  : shows this help message and exits.
            -vr,    --version              command  : shows Version of the dnsbruter and exits:
            -nc,    --no-color             command  : disable the dnsbruter's colorised CLI outputs and info.
            -s,     --silent               command  : only shows essetial outputs and avoid other info.

```

### Uses of Dnsbruter:
Dnsbruter is highly asynchronous and concurrent dns brutforcing and fuzzing tool . Dnsbruter can be used to bruteforce for valid subdomains and also can be used to FUZZ in any position the domain for example the normal bruteforce domain can be passed as
`admin.google.com` and default dnsbruter checks for domain is valid and it have wildcard dns are not to ensure get accurate results and the Fuzz method domain can be passed for example `adminBRUT.google.com` and the BRUT word is used for Fuzz method like we use FUZZ in tools like `ffuf` and when BRUT is passed in domain the Dnsbruter will not checks for valid domain because for fuzzing and this also applies to wildcard records of it. Dnsbruter can run more concurrent and powerfull but its all depends on the users **network speed** and resolvers used. Dnsbruter is runs with ligth weight threads which is a advantage for low end **VPS** users and can handle high loads wordlist without causing any system CPU's loads so Dnsbruter supports well in your low end system and it will try best not crash your network like `puredns` so it will be good alternative tool for you.

<h1 align="center">
  <img src="https://github.com/RevoltSecurities/Dnsbruter/assets/119435129/a260df97-17fb-4cd5-8017-687697fcd030" width="2000px">
  <br>
</h1>

### Installation:
Dnsbruter can be installed easily with tools using `pip` & `pipx` to install the tool easily and follow the below method of installation.

#### pip 
requires pip need to be installed with latest python version
```code
pip install --no-deps --force-reinstall --break-system-packages git+https://github.com/RevoltSecurities/Dnsbruter.git
```

#### pipx
requires pipx to be installed with latest python version
```pipx
pipx install git+https://github.com/RevoltSecurities/Dnsbruter.git --break-system-packages
```

### About:
The Dnsbruter is a open source tool for all Security Researchers and CyberSecurity people to use in their security assesments and information gathering process which helps them lot and We encourage open source contributor to help for Dnsbruter
updates and We hope this tools helps everyone if this tool helps please show you support by giving ⭐ to Dnsbruter ⚡.


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/RevoltSecurities/Dnsbruter",
    "name": "DNSBruter",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": null,
    "author": "D.Sanjai Kumar @RevoltSecurities",
    "author_email": "bughunterz0047@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/54/55/ecb4ca7310bd4c86176de169fa25f5286eff6046c353c73fb51b7f33ddb1/DNSBruter-1.0.4.tar.gz",
    "platform": null,
    "description": "\n# Dnsbruter - Asynchronous Dns Bruteforcing Tool\n\nDnsbruter an Asynchronous Dns bruteforcing and Fuzzing  Tool for Penetration Testers and Ethical hackers.\nit used to bruteforce and fuzz for domain names in any position of input using BRUT word in it.\n\n![GitHub last commit](https://img.shields.io/github/last-commit/RevoltSecurities/Dnsbruter) ![GitHub release (latest by date)](https://img.shields.io/github/v/release/RevoltSecurities/Dnsbruter) [![GitHub license](https://img.shields.io/github/license/RevoltSecurities/Dnsbruter)](https://github.com/RevoltSecurities/Dnsbruter/blob/main/LICENSE) [![LinkedIn](https://img.shields.io/badge/LinkedIn-Connect-blue)](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/)\n\n### features:\n<h1 align=\"center\">\n  <img src=\"https://github.com/RevoltSecurities/Dnsbruter/assets/119435129/51cb47ce-2a9d-49f5-a547-bae184a5c19e\" width=\"700px\">\n  <br>\n</h1>\n\n- Asynchronous and concurrent dns bruteforcing.\n- Supports both dns brutforcing and fuzzing.\n- Manages high level threads.\n- Manages high loads wordlist.\n- Enhanced asynchronous performance better than before.\n- Wildcard detection for found domain.\n\n\n\n## Usage\n\nTo start using Dnsbruter, use the following command-line options:\n\n```yaml\ndnsbruter -h                                \n     __              __               __            \n ___/ /  ___   ___  / /   ____ __ __ / /_ ___   ____\n/ _  /  / _ \\ (_-< / _ \\ / __// // // __// -_) / __/\n\\_,_/  /_//_//___//_.__//_/   \\_,_/ \\__/ \\__/ /_/   \n                                                    \n\n                    @RevoltSecurities\n\n\n[DESCRIPTION]: dnsbruter is a powerfull tool for asynchronous dns brutforcing and fuzzing with wildcard detection\n\n[Usage]: \n\n    dnsbruter [options]\n    \n[OPTIONS]: \n\n    [INPUT]:\n            -d   ,  --domain               string   : domain name for resolving subdomains.\n            -w   ,  --wordlist             string   : wordlist path for dnsbruter.\n            \n    [CONFIG]:\n            -rl,    --resolver             string   : filename contains list of resolvers (default: system config)\n            -ip,    --ipaddress            command  : shows ip for valid domains that found by dnsbruter\n            -v,     --versbose             command  : increase the verbosity of output\n            -wd,    --wildcard-detect      command  : enable to detect wildcards for found domains.\n            -ov,    --override             command  : enable to skip the domain verification and this is not applies to when used BRUT in domain.\n            \n    [RATE-LIMIT]: \n            -c   ,  --concurrency            int    : number of concurrency value for dns bruteforcing.             \n            -wt  , --wildcard-threds         int    : number of threads values for wildcard detections\n            \n    [UPDATES]: \n            -up,    --updates              command  : updates the Dnsbruter for latest version (required: pip to be installed) \n            -dc,    --disable-check        command  : disable updates check for dnsbruter\n            \n    [OUTPUT]: \n            -o,     --output               string   : filename to save the scans outputs. \n            -ws,    --wildcard-output      string   : filename to save the found wildcard domains.\n            \n    [DEBUG]: \n            -h,     --help                 command  : shows this help message and exits.\n            -vr,    --version              command  : shows Version of the dnsbruter and exits:\n            -nc,    --no-color             command  : disable the dnsbruter's colorised CLI outputs and info.\n            -s,     --silent               command  : only shows essetial outputs and avoid other info.\n\n```\n\n### Uses of Dnsbruter:\nDnsbruter is highly asynchronous and concurrent dns brutforcing and fuzzing tool . Dnsbruter can be used to bruteforce for valid subdomains and also can be used to FUZZ in any position the domain for example the normal bruteforce domain can be passed as\n`admin.google.com` and default dnsbruter checks for domain is valid and it have wildcard dns are not to ensure get accurate results and the Fuzz method domain can be passed for example `adminBRUT.google.com` and the BRUT word is used for Fuzz method like we use FUZZ in tools like `ffuf` and when BRUT is passed in domain the Dnsbruter will not checks for valid domain because for fuzzing and this also applies to wildcard records of it. Dnsbruter can run more concurrent and powerfull but its all depends on the users **network speed** and resolvers used. Dnsbruter is runs with ligth weight threads which is a advantage for low end **VPS** users and can handle high loads wordlist without causing any system CPU's loads so Dnsbruter supports well in your low end system and it will try best not crash your network like `puredns` so it will be good alternative tool for you.\n\n<h1 align=\"center\">\n  <img src=\"https://github.com/RevoltSecurities/Dnsbruter/assets/119435129/a260df97-17fb-4cd5-8017-687697fcd030\" width=\"2000px\">\n  <br>\n</h1>\n\n### Installation:\nDnsbruter can be installed easily with tools using `pip` & `pipx` to install the tool easily and follow the below method of installation.\n\n#### pip \nrequires pip need to be installed with latest python version\n```code\npip install --no-deps --force-reinstall --break-system-packages git+https://github.com/RevoltSecurities/Dnsbruter.git\n```\n\n#### pipx\nrequires pipx to be installed with latest python version\n```pipx\npipx install git+https://github.com/RevoltSecurities/Dnsbruter.git --break-system-packages\n```\n\n### About:\nThe Dnsbruter is a open source tool for all Security Researchers and CyberSecurity people to use in their security assesments and information gathering process which helps them lot and We encourage open source contributor to help for Dnsbruter\nupdates and We hope this tools helps everyone if this tool helps please show you support by giving \u2b50 to Dnsbruter \u26a1.\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "dnsbruter is a powerfull tool for asynchronous dns brutforcing and fuzzing with wildcard detection",
    "version": "1.0.4",
    "project_urls": {
        "Homepage": "https://github.com/RevoltSecurities/Dnsbruter"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "5455ecb4ca7310bd4c86176de169fa25f5286eff6046c353c73fb51b7f33ddb1",
                "md5": "92451ee0cb676d581de939795cf2a30c",
                "sha256": "97fa7c2f9be0ba3bd496aac2eb89b64f3e6b866482801cd2fed4cdaba361f008"
            },
            "downloads": -1,
            "filename": "DNSBruter-1.0.4.tar.gz",
            "has_sig": false,
            "md5_digest": "92451ee0cb676d581de939795cf2a30c",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 13961,
            "upload_time": "2024-05-12T15:35:24",
            "upload_time_iso_8601": "2024-05-12T15:35:24.743166Z",
            "url": "https://files.pythonhosted.org/packages/54/55/ecb4ca7310bd4c86176de169fa25f5286eff6046c353c73fb51b7f33ddb1/DNSBruter-1.0.4.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-05-12 15:35:24",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "RevoltSecurities",
    "github_project": "Dnsbruter",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "aiodns",
            "specs": [
                [
                    ">=",
                    "3.2.0"
                ]
            ]
        },
        {
            "name": "aiofiles",
            "specs": [
                [
                    ">=",
                    "23.2.1"
                ]
            ]
        },
        {
            "name": "alive_progress",
            "specs": [
                [
                    ">=",
                    "3.1.4"
                ]
            ]
        },
        {
            "name": "art",
            "specs": [
                [
                    ">=",
                    "6.1"
                ]
            ]
        },
        {
            "name": "colorama",
            "specs": [
                [
                    ">=",
                    "0.4.6"
                ]
            ]
        },
        {
            "name": "Requests",
            "specs": [
                [
                    ">=",
                    "2.31.0"
                ]
            ]
        },
        {
            "name": "urllib3",
            "specs": [
                [
                    ">=",
                    "1.26.18"
                ]
            ]
        }
    ],
    "lcname": "dnsbruter"
}
        
Elapsed time: 0.21308s