Skip to content

Instantly share code, notes, and snippets.

@th3gundy
Forked from si9int/c99-nl.py
Created April 6, 2020 07:08
Show Gist options
  • Save th3gundy/bc83580cbe04031e9164362b33600962 to your computer and use it in GitHub Desktop.
Save th3gundy/bc83580cbe04031e9164362b33600962 to your computer and use it in GitHub Desktop.

Revisions

  1. @si9int si9int revised this gist Apr 5, 2020. 1 changed file with 25 additions and 63 deletions.
    88 changes: 25 additions & 63 deletions c99-nl.py
    Original file line number Diff line number Diff line change
    @@ -1,78 +1,40 @@
    #!/usr/bin/env python3
    # v.0.2 | twitter.com/si9int
    import requests, sys
    from bs4 import BeautifulSoup as bs

    domain = sys.argv[1]
    subdomains = []

    params = {
    'CSRF102664102' : 'geek100526529',
    'CSRF105639185' : 'espionage103090877',
    'CSRF105425384' : 'malware103726348',
    'CSRF100159316' : 'subnet_ip107692824',
    'CSRF100962167' : 'drudge103629153',
    'CSRF109590103' : 'computer108351989',
    'CSRF103511594' : 'tech106748132',
    'CSRF106630274' : 'malware102238288',
    'CSRF101161561' : 'spammer108513508',
    'CSRF105918489' : 'security100797595',
    'CSRF100737541' : 'thief103449013',
    'CSRF103051531' : 'burglar100417899',
    'CSRF109634325' : 'addict103181028',
    'CSRF107994468' : 'subnet103656850',
    'CSRF100355950' : 'burglar108764382',
    'CSRF101931621' : 'phishing109263812',
    'CSRF105512081' : 'intrusion104705632',
    'CSRF100069713' : 'bogey104684780',
    'CSRF101021677' : 'bot105831137',
    'CSRF109373552' : 'spy105071422',
    'CSRF103106435' : 'programmer102291574',
    'CSRF105010505' : 'security107419238',
    'CSRF108132841' : 'thief109444740',
    'CSRF103389877' : 'infiltrator108716803',
    'CSRF104708794' : 'bot106464179',
    'CSRF102233168' : 'TrojanHorse102832112',
    'CSRF110860003' : 'cyberspace100718494',
    'CSRF105583248' : 'phisher101762356',
    'CSRF105448985' : 'burglar108336158',
    'CSRF109161941' : 'thief105559430',
    'CSRF101550813' : 'CSRF102561258',
    'CSRF108475096' : 'pirating110482989',
    'CSRF108589158' : 'infiltrator103662624',
    'CSRF108679726' : 'phisher106951609',
    'CSRF102643284' : 'CSRF108365228',
    'CSRF88046738' : '39889423',
    'breach' : '34255420',
    '56339944' : 'CSRF81213693',
    'CSRF109310100202048578' : 'intrusion108998403',
    'CSRF104648154' : 'security105090286',
    'domain' : '{}'.format(domain),
    '41559767' : 'CSRF23056260',
    'CSRF76937701' : '80495764',
    'CSRF104966208' : 'subnet100080162',
    'scanner' : '64431067',
    '71563262' : 'CSRF52194957',
    'CSRF11056969020200404' : '86098696',
    'CSRF102874705' : 'cybercrime110476127',
    'CSRF103810429' : 'computer109165745',
    'CSRF25190828' : '43240686',
    'CSRF' : '90393327',
    'security' : '77099357',
    '83365415' : 'CSRF22615523',
    'domain_6' : 'mask106411859',
    'scan_subdomains' : '',
    'privatequery' : 'on'
    }
    def get_csrf_params():
    csrf_params = {}

    data = requests.get('https://subdomainfinder.c99.nl/').text
    html = bs(data, 'html.parser').find('div', {'class' : 'input-group'})

    for c in html.find_all('input'):
    try:
    csrf_params[c.get('name')] = c.get('value')
    except:
    pass

    return csrf_params

    params = get_csrf_params()

    # Additional options
    params['scan_subdomains'] = ''
    params['domain'] = domain
    params['privatequery'] = 'on'

    reqs = requests.post('https://subdomainfinder.c99.nl/', data=params).text
    html = bs(reqs, 'html.parser').find('table', {'id' : 'result_table'})
    data = requests.post('https://subdomainfinder.c99.nl/', data=params).text
    html = bs(data, 'html.parser').find('table', {'id' : 'result_table'})

    for tr in html.find_all('tr'):
    try:
    host = tr.find('a').text
    subdomains.append(host)
    subdomains.append(tr.find('a').text)
    except:
    pass

    for s in subdomains:
    print(s)
    print(s)
  2. @si9int si9int created this gist Apr 4, 2020.
    78 changes: 78 additions & 0 deletions c99-nl.py
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,78 @@
    #!/usr/bin/env python3
    import requests, sys
    from bs4 import BeautifulSoup as bs

    domain = sys.argv[1]
    subdomains = []

    params = {
    'CSRF102664102' : 'geek100526529',
    'CSRF105639185' : 'espionage103090877',
    'CSRF105425384' : 'malware103726348',
    'CSRF100159316' : 'subnet_ip107692824',
    'CSRF100962167' : 'drudge103629153',
    'CSRF109590103' : 'computer108351989',
    'CSRF103511594' : 'tech106748132',
    'CSRF106630274' : 'malware102238288',
    'CSRF101161561' : 'spammer108513508',
    'CSRF105918489' : 'security100797595',
    'CSRF100737541' : 'thief103449013',
    'CSRF103051531' : 'burglar100417899',
    'CSRF109634325' : 'addict103181028',
    'CSRF107994468' : 'subnet103656850',
    'CSRF100355950' : 'burglar108764382',
    'CSRF101931621' : 'phishing109263812',
    'CSRF105512081' : 'intrusion104705632',
    'CSRF100069713' : 'bogey104684780',
    'CSRF101021677' : 'bot105831137',
    'CSRF109373552' : 'spy105071422',
    'CSRF103106435' : 'programmer102291574',
    'CSRF105010505' : 'security107419238',
    'CSRF108132841' : 'thief109444740',
    'CSRF103389877' : 'infiltrator108716803',
    'CSRF104708794' : 'bot106464179',
    'CSRF102233168' : 'TrojanHorse102832112',
    'CSRF110860003' : 'cyberspace100718494',
    'CSRF105583248' : 'phisher101762356',
    'CSRF105448985' : 'burglar108336158',
    'CSRF109161941' : 'thief105559430',
    'CSRF101550813' : 'CSRF102561258',
    'CSRF108475096' : 'pirating110482989',
    'CSRF108589158' : 'infiltrator103662624',
    'CSRF108679726' : 'phisher106951609',
    'CSRF102643284' : 'CSRF108365228',
    'CSRF88046738' : '39889423',
    'breach' : '34255420',
    '56339944' : 'CSRF81213693',
    'CSRF109310100202048578' : 'intrusion108998403',
    'CSRF104648154' : 'security105090286',
    'domain' : '{}'.format(domain),
    '41559767' : 'CSRF23056260',
    'CSRF76937701' : '80495764',
    'CSRF104966208' : 'subnet100080162',
    'scanner' : '64431067',
    '71563262' : 'CSRF52194957',
    'CSRF11056969020200404' : '86098696',
    'CSRF102874705' : 'cybercrime110476127',
    'CSRF103810429' : 'computer109165745',
    'CSRF25190828' : '43240686',
    'CSRF' : '90393327',
    'security' : '77099357',
    '83365415' : 'CSRF22615523',
    'domain_6' : 'mask106411859',
    'scan_subdomains' : '',
    'privatequery' : 'on'
    }

    reqs = requests.post('https://subdomainfinder.c99.nl/', data=params).text
    html = bs(reqs, 'html.parser').find('table', {'id' : 'result_table'})

    for tr in html.find_all('tr'):
    try:
    host = tr.find('a').text
    subdomains.append(host)
    except:
    pass

    for s in subdomains:
    print(s)