@@ -1,78 +1,40 @@
#!/usr/bin/env python3
# v.0.2 | twitter.com/si9int
import requests , sys
from bs4 import BeautifulSoup as bs
domain = sys .argv [1 ]
subdomains = []
params = {
'CSRF102664102' : 'geek100526529' ,
'CSRF105639185' : 'espionage103090877' ,
'CSRF105425384' : 'malware103726348' ,
'CSRF100159316' : 'subnet_ip107692824' ,
'CSRF100962167' : 'drudge103629153' ,
'CSRF109590103' : 'computer108351989' ,
'CSRF103511594' : 'tech106748132' ,
'CSRF106630274' : 'malware102238288' ,
'CSRF101161561' : 'spammer108513508' ,
'CSRF105918489' : 'security100797595' ,
'CSRF100737541' : 'thief103449013' ,
'CSRF103051531' : 'burglar100417899' ,
'CSRF109634325' : 'addict103181028' ,
'CSRF107994468' : 'subnet103656850' ,
'CSRF100355950' : 'burglar108764382' ,
'CSRF101931621' : 'phishing109263812' ,
'CSRF105512081' : 'intrusion104705632' ,
'CSRF100069713' : 'bogey104684780' ,
'CSRF101021677' : 'bot105831137' ,
'CSRF109373552' : 'spy105071422' ,
'CSRF103106435' : 'programmer102291574' ,
'CSRF105010505' : 'security107419238' ,
'CSRF108132841' : 'thief109444740' ,
'CSRF103389877' : 'infiltrator108716803' ,
'CSRF104708794' : 'bot106464179' ,
'CSRF102233168' : 'TrojanHorse102832112' ,
'CSRF110860003' : 'cyberspace100718494' ,
'CSRF105583248' : 'phisher101762356' ,
'CSRF105448985' : 'burglar108336158' ,
'CSRF109161941' : 'thief105559430' ,
'CSRF101550813' : 'CSRF102561258' ,
'CSRF108475096' : 'pirating110482989' ,
'CSRF108589158' : 'infiltrator103662624' ,
'CSRF108679726' : 'phisher106951609' ,
'CSRF102643284' : 'CSRF108365228' ,
'CSRF88046738' : '39889423' ,
'breach' : '34255420' ,
'56339944' : 'CSRF81213693' ,
'CSRF109310100202048578' : 'intrusion108998403' ,
'CSRF104648154' : 'security105090286' ,
'domain' : '{}' .format (domain ),
'41559767' : 'CSRF23056260' ,
'CSRF76937701' : '80495764' ,
'CSRF104966208' : 'subnet100080162' ,
'scanner' : '64431067' ,
'71563262' : 'CSRF52194957' ,
'CSRF11056969020200404' : '86098696' ,
'CSRF102874705' : 'cybercrime110476127' ,
'CSRF103810429' : 'computer109165745' ,
'CSRF25190828' : '43240686' ,
'CSRF' : '90393327' ,
'security' : '77099357' ,
'83365415' : 'CSRF22615523' ,
'domain_6' : 'mask106411859' ,
'scan_subdomains' : '' ,
'privatequery' : 'on'
}
def get_csrf_params ():
csrf_params = {}
data = requests .get ('https://subdomainfinder.c99.nl/' ).text
html = bs (data , 'html.parser' ).find ('div' , {'class' : 'input-group' })
for c in html .find_all ('input' ):
try :
csrf_params [c .get ('name' )] = c .get ('value' )
except :
pass
return csrf_params
params = get_csrf_params ()
# Additional options
params ['scan_subdomains' ] = ''
params ['domain' ] = domain
params ['privatequery' ] = 'on'
reqs = requests .post ('https://subdomainfinder.c99.nl/' , data = params ).text
html = bs (reqs , 'html.parser' ).find ('table' , {'id' : 'result_table' })
data = requests .post ('https://subdomainfinder.c99.nl/' , data = params ).text
html = bs (data , 'html.parser' ).find ('table' , {'id' : 'result_table' })
for tr in html .find_all ('tr' ):
try :
host = tr .find ('a' ).text
subdomains .append (host )
subdomains .append (tr .find ('a' ).text )
except :
pass
for s in subdomains :
print (s )
print (s )