DomainDouche – OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force
Discription

[![](https://blogger.googleusercontent.com/img/a/AVvXsEgad_q4Q6z9A-opQWg-i2Ajz_TAp3zBKQexPEB_cqcjQE-nRK0qOGMPY5SkLAET2nl84YKocw1DUbtjnYpgJKSXQUEzwHZi75YvGO1pXDU5CNtL2dQRlvXO3DwrB3oWv8wX6OWYaqcEZnYU7qGQdLEbBvBUar5WEAjD3XsLaNz_IhjEQUACO8jUXbp14g=w640-h448)]()

Abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and [brute]( “brute” ) force.

Use it while it still works

(Also, hmu on Mastodon: [@[email protected]]( “@[email protected]” ))

###

### Usage:

usage: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] keyword

Abuses SecurityTrails API to find related domains by keyword.
Go to https://securitytrails.com/dns-trails, solve any CAPTCHA you might encounter,
copy the raw value of your Cookie and User-Agent headers and use them with the -c and -a arguments.

positional arguments:
keyword keyword to append brute force string to

options:
-h, –help show this help message and exit
-n N, –num N number of characters to brute force (default: 2)
-c COOKIE, –cookie COOKIE
raw cookie string
-a USER_AGENT, –useragent USER_AGENT
user-agent string (must match the browser where the cookies are from)
-w NUM, –workers NUM
number of workers (default: 5)
-o OUTFILE, –output OUTFILE
output file path

**[Download DomainDouche]( “Download DomainDouche” )**Read More

Back to Main

Subscribe for the latest news: