Subdomain Enumeration
SSL / TLS Certificates
crt.sh Certificate Search: https://crt.sh/
curl -s <https://crt.sh/\\?cn=%.oneplus.com\\&output=json> | jq -r '.[].name_value' | sed 's/\\*\\.//g' | sort -ucurl -s <https://crt.sh/\\?o=OnePlus\\&output=json> | jq -r '.[].common_name' | sed 's/\\*\\.//g' | sort -uOSINT - Search Engines
site:*.domain.com -site:www.domain.comsite:*.domain.com: Searches all webpages related todomain.comincluding its subdomains.-site:www.domain.com: Excludewww.domain.comfrom the results.site:azena.com:Searches for pages from azena.com domain.site:azena.com -www -store: Searches for pages from azena.com excluding www and store subdomains.site:azena.com filetype:xlsx: Searches for excel files under the specified domain.site:azena.com filetype:xlsx password: Looks for excel spreadsheet with the word password.
DNSRecon
dnsrecon -t brt -d [DOMAIN]Resources: https://www.kali.org/tools/dnsrecon/
Sublist3r
./sublist3r.py -d [DOMAIN]Subfinder
~/go/bin/subfinder -d [DOMAIN]~/go/bin/subfinder -d [DOMAIN] -all~/go/bin/subfinder -dL oneplus.com -allAssetfinder
assetfinder [DOMAIN]assetfinder [DOMAIN] | grep [DOMAIN] | sort -uAmass
amass enum -d [DOMAIN]Virtual Hosts
ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H "Host: FUZZ.acmeitsupport.thm" -u <http://10.10.43.201> -fs [SIZE]Shuffle DNS (Subdomain Bruteforcing)
/go/bin/shuffledns -d [DOMAIN] -w [SUBDOMAINS_WORDLIST] -r [RESOLVERS_LIST] -mode bruteforce -m massdns --silentShodan CLI
# Initialize shodan
shodan init [API_KEY]
# Subdomain enum
shodan domain [DOMAIN]Last updated

