Skip to content

V1.0.5

Compare
Choose a tag to compare
@RevoltSecurities RevoltSecurities released this 15 Dec 12:53
· 4 commits to main since this release
4c2ceae

Dnsbruter - Asynchronous DNS Bruteforcing Tool

Dnsbruter is a lightweight, fast, and smooth asynchronous DNS brute-forcing and fuzzing tool designed for penetration testers, ethical hackers, and anyone conducting active attack surface reconnaissance. This tool helps you discover subdomains and identify vulnerabilities in it.

GitHub last commit GitHub release (latest by date) GitHub license LinkedIn

V1.0.5 Features:


  • Improved Speed & Efficiency: Significantly faster and smoother DNS brute-forcing with lightweight resource usage.
  • Memory & Resource Management: Optimized to handle large-scale DNS scans without consuming excessive system resources.
  • Flexible Input: Supports both stdin and file-based domain lists for DNS brute-forcing.
  • Concurrency Control: Rate limiting and concurrency management to ensure stable performance under heavy loads.
  • JSON Output: Option to save scan results in a structured JSON format for easy integration with other tools.

Installation:

Dnsbruter can be installed quickly using various methods, including pip, pipx, and Docker. Choose the method that best suits your environment.

pip Installation

Ensure you have pip installed with the latest version of Python:

pip install --break-system-packages git+https://github.com/RevoltSecurities/Dnsbruter.git

pipx Installation

For isolated Python environments, you can use pipx:

pipx install git+https://github.com/RevoltSecurities/Dnsbruter.git

Docker Installation

For Docker-based environments, build the Docker image using:

git clone https://github.com/RevoltSecurities/Dnsbruter.git && cd Dnsbruter
sudo docker build -t dnsbruter .

Docker Usage:

sudo docker run --rm -it -v /path/to/wordlist.txt:/opt/wordlist.txt -v $(pwd):/output dnsbruter -d google.com -w /opt/wordlist.txt --output /output/test.txt