findomain
The complete solution for domain recognition. Supports screenshotting, port scan, HTTP check, data import from other tools, subdomain monitoring.
Name:findomain
Category:Recon
Publisher:trickest-mhmdiaa
Created:2/5/2022
Container:
quay.io/trickest/findomain:5.1.1
Output Type:
License:Unknown
Source:View Source
Parameters
--pscan
Enable port scanner.--quiet
Remove informative messages but show fatal errors or subdomains not found message.--aempty
Send alert to webhooks still when no new subdomains have been found.--filter
Filter subdomains containing specifics strings.--jobname
Use an database identifier for jobs. It is useful when you want to relate different targets into a same job name. To extract the data by job name identifier, use the query-jobname option.--resolved
Show/write only resolved subdomains.--wordlist
Wordlist file to use in the bruteforce process. Using it option automatically enables bruteforce mode.--ipv6-only
Perform a IPv6 lookup only--lport
Last port to scan. Default 1000.--randomize
Enable randomization when reading targets from files.--resolvers
Path to a file containing a list of DNS IP address. If no specified then Google, Cloudflare and Quad9 DNS servers are used.--enable-dot
Enable DNS over TLS for resolving subdomains IPs.--no-monitor
Disable monitoring mode while saving data to database.--no-resolve
Disable pre-screenshotting jobs (http check and ip discover) when used as resolver to take screenshots.--rate-limit
Set the rate limit in seconds for each target during enumeration.--file
Use a list of subdomains writen in a file as input.--as-resolver
Use Findomain as resolver for a list of domains in a file.--config
Use a configuration file. The default configuration file is findomain and the format can be toml, json, hjson, ini or yml.--http-status
Check the HTTP status of subdomains.--target
Target host.--ua
Path to file containing user agents strings.--http-timeout
Value in seconds for the HTTP Status check of subdomains. Default 5--iport
Initial port to scan. Default 0.--no-wildcards
Disable wilcard detection when resolving subdomains.--verbose
Enable verbose mode (useful to debug problems).--postgres-host
Postgresql host.--postgres-port
Postgresql port.--postgres-user
Postgresql username.--query-jobname
Extract all the subdomains from the database where the job name is the specified using the jobname option.--sandbox
Enable Chrome/Chromium sandbox. It is disabled by default because a big number of users run the tool using the root user by default. Make sure you are not running the program as root user before using this option.--monitoring-flag
Activate Findomain monitoring mode--query-database
Query the findomain database to search subdomains that have already been discovered.--exclude-sources
Exclude sources from searching subdomains in. [possible values: certspotter, crtsh, virustotal, sublist3r, facebook, spyse, bufferover, threatcrowd, virustotalapikey, anubis, urlscan, securitytrails, threatminer,archiveorg, c99, ctsearch]--ip
Show/write the ip address of resolved subdomains.--import-subdomains
Import subdomains from one or multiple files. Subdomains need to be one per line in the file to import.--postgres-database
Postgresql database.--postgres-password
Postgresql password.--external-subdomains
Get external subdomains with amass and subfinder--exclude
Exclude subdomains containing specifics strings.