domfind Logo

domfind

0
Free
Updated 11 March 2025
Visit Website

domfind is a Python 3.6.x utility that tests for the existence of domain names under different Top Level Domains (TLDs). This is achieved by making a series of DNS requests for Start of Authority (SOA) records starting at the root servers and working down through the parent domains until the last parent replies with a SOA section or a NXDOMAIN response code indicating the nonexistence of the input domain name. Local or public DNS resolvers are purposefully not used in order to avoid cached records. It should be noted that the number of DNS queries performed grows linearly with the depth of the input domain and the number of TLDs to check for. For instance, sub1.sub2.domain.tld needs a total of three queries per TLD. The first one is directed at a root server, the second one goes to a NS server of domain.tld, and the third, final one to sub2.domain.tld. This utility is useful to find malicious subdomains registered under multiple TLDs that might be used for phishing campaigns. Malicious actors often use the same domain name for related or subsequent campaigns for hosting web servers, which can be proactively found with domfind as a one-off, if a domain name is known, and act

FEATURES

SIMILAR TOOLS

Small script to simplify format string exploitation.

An Android port of the Radamsa fuzzing tool compiled with Android NDK to support Android ABIs for security testing on mobile platforms.

Pentest active directory LAB project for practicing attack techniques.

A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

Local pentest lab using docker compose to spin up victim and attacker services.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved