Sublist3r
insomnia
Sublist3r | insomnia | |
---|---|---|
12 | 225 | |
9,243 | 33,126 | |
- | 0.7% | |
0.0 | 9.7 | |
3 months ago | 1 day ago | |
Python | JavaScript | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Sublist3r
-
Subdomain.center – discover all subdomains for a domain
You cannot hide anything on the internet anymore, the full IPv4 range is scanned regularly by multiple entities. If you open a port on a public IP it will get found.
If it's a obscure non-standard port it might take longer, but if it's on any of the standard ports it will get probed very quickly and included tools like shodan.io
The reason why I'm repeating this, is that not everyone knows this. People still (albeit less) put up elastic and mongodb instances with no authentication on public IP's.
The second thing which isn't well known is the Certificate Transparency logs. This is the reason why you can't (without a wildcard cert) hide any HTTPS service. When you ask Let's Encrypt (or any CA actually) to generate veryobscure.domain.tld they will send that to the Certificate Transparency logs. You can find every certificate which was minted for a domain on a tool like https://crt.sh
There are many tools like subdomain.center, https://hackertarget.com/find-dns-host-records/ comes to mind. The most impressive one I've seen, which found more much more than expected, is Detectify (which is a paid service, no affiliation), they seem to combine the passive data collection (like subdomain.center) with active brute to find even more subdomains.
But you can probably get 95% there by using CT and a brute-force tool like https://github.com/aboul3la/Sublist3r
-
The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
Sublist3r
-
Tools for subdomain brute forcing
sublist3r = https://github.com/aboul3la/Sublist3r
-
sublist3r error: virustotal is probably now blocking your request can any one help me fixing this 🥺
Try following this step too - click here
- New NFT Subdomain: support.NFT.Gamestop.com
-
New IPFS Subdomain - Possibly for a digital games platform?
For those asking what tool I was using, its called sublist3r (https://github.com/aboul3la/Sublist3r). It uses open source intelligence gathering (public info) as well as brute force to try and enumerate subdomains.
-
Looking for an API like builtwith.com (let's you know what technology is behind website), but one that's opensource, or at least is more startup friendly ....
That said, keep in mind that not everything is going to find its way indexed in Google. If it's subdomains you're after, you can use tools like Sublist3r or Sudomy to pull data from multiple sources (not just DNS).
-
The most important step in hacking - Enumeration
In a real-world scenario. You're likely to come across a target with more than one domain, each having it's own subdomains. There's plenty of tools that you can use to discover these. Again, PyRCON offers some options for this but I like tools such as sublist3r and publicly available records such as security trials.
-
How to find out all the "routes" of a website?
Kali has sublist3r
-
I believe etoro was HACKED yesterday
The downside is, wildcard DNS fills the results with false positives because every subdomain will return an IP address. There was an issue raised for sublister a few years ago (still open) that raised this exact issue: https://github.com/aboul3la/Sublist3r/issues/118
insomnia
-
Building a RESTful API with Node.js and Express
Use tools like Postman or Insomnia to test the API endpoints and ensure they behave as expected.
- Ask HN: Alternatives to Postman?
-
Make your Azure OpenAI apps compliant with RBAC
We will be performing all of the authentication requests manually, however for testing purposes, you might want to use an API testing tool such as Postman or Insomnia.
- The Collaborative API Development Platform – Insomnia
-
Local automation
For a very long time, the go-to tool was curl. Great, always available command line tool. Unfortunately, there is one small issue. It’s hard to keep requests and collect them in collections, it’s great for one-time shots or debugging, but for constant working with API could be painful. To solve it, I started working with tools like Postman/Insomnia. Then eh... strange licensing model, or changes which occurred from Kong side click, definitely push me again for some lookup. After checking different very popular tools and those not such well known I decided to use… Ansible. Sounds strange right? Let me explain this decision. For example, look at this code.
-
Tools that Make Me Productive as a Software Engineer
At first, I used Postman for testing APIs because it had a lot of features. But I switched to Insomnia because it was easier to use and kept everything organized. The big problem with Insomnia was that it deleted all my saved work when it made me create an account to keep using it.
-
Different Levels of Project Documentation
Often used for cases where a project exposes a REST or other type of API service. Open API is a popular method of documenting such API services. It can also be used along side tools such as Swagger Codegen to produce boilerplate code for API interaction / testing purposes. There may also be support files for popular API testing tools such as Postman or Insomnia. This makes it easier at a glance to see what data is coming back from a call so the user knows how to handle parsing the data.
-
Web scraping in 10 mins
Well, there is this website that I have been trying to scrape for a few days now. I had tried everything from scrapy splash on docker to almost giving up because I read somewhere that it was JavaScript rendered. Since the source code from the inspect part of the developer tools was different from the source code from the view-source:https//... on the same developer tools.How could this be possible? Then I kept searching on internet and found this concept; where you can mimic web-browsers requests from a server using an API program,and it worked magically. Some of the API programs are postman and insomnia. I prefer using insomnia for this particular case , feel free to use any other API program of your choice.
- Insomnia REST client updated to require signup to use
- GitHub stars are one of the most inexpensive ways to generate an outsized outcome in the community by leveraging the tailwinds of increased adoption
What are some alternatives?
subbrute - A DNS meta-query spider that enumerates DNS records, and subdomains.
Hoppscotch - Open source API development ecosystem.
Sudomy - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
altair - ✨⚡️ A beautiful feature-rich GraphQL Client for all platforms.
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
bloomrpc - Former GUI client for gRPC services. No longer maintained.
wpscan - WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]
Visual Studio Code - Visual Studio Code
RustScan - 🤖 The Modern Port Scanner 🤖
swagger-ui - Swagger UI is a collection of HTML, JavaScript, and CSS assets that dynamically generate beautiful documentation from a Swagger-compliant API.
BloodHound - Six Degrees of Domain Admin
httpie - 🥧 HTTPie CLI — modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more.