V1.0.5
Dnsbruter - Asynchronous DNS Bruteforcing Tool
Dnsbruter is a lightweight, fast, and smooth asynchronous DNS brute-forcing and fuzzing tool designed for penetration testers, ethical hackers, and anyone conducting active attack surface reconnaissance. This tool helps you discover subdomains and identify vulnerabilities in it.
V1.0.5 Features:
- Improved Speed & Efficiency: Significantly faster and smoother DNS brute-forcing with lightweight resource usage.
- Memory & Resource Management: Optimized to handle large-scale DNS scans without consuming excessive system resources.
- Flexible Input: Supports both stdin and file-based domain lists for DNS brute-forcing.
- Concurrency Control: Rate limiting and concurrency management to ensure stable performance under heavy loads.
- JSON Output: Option to save scan results in a structured JSON format for easy integration with other tools.
Installation:
Dnsbruter can be installed quickly using various methods, including pip
, pipx
, and Docker
. Choose the method that best suits your environment.
pip Installation
Ensure you have pip
installed with the latest version of Python:
pip install --break-system-packages git+https://github.com/RevoltSecurities/Dnsbruter.git
pipx Installation
For isolated Python environments, you can use pipx
:
pipx install git+https://github.com/RevoltSecurities/Dnsbruter.git
Docker Installation
For Docker-based environments, build the Docker image using:
git clone https://github.com/RevoltSecurities/Dnsbruter.git && cd Dnsbruter
sudo docker build -t dnsbruter .
Docker Usage:
sudo docker run --rm -it -v /path/to/wordlist.txt:/opt/wordlist.txt -v $(pwd):/output dnsbruter -d google.com -w /opt/wordlist.txt --output /output/test.txt