You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can also use the `subfinder -ls` command to display all the available sources.
127
-
128
-
These values are stored in the `$HOME/.config/subfinder/provider-config.yaml` file which will be created when you run the tool for the first time. The configuration file uses the YAML format. Multiple API keys
129
-
can be specified for each of these services from which one of them will be used for enumeration.
130
-
131
-
Composite keys for sources like, `Censys`, `PassiveTotal`, `Fofa`, `Intellix` and `360quake`, need to be separated with a colon (`:`).
Note: RedHunt Labs's [Attack Surface Recon API](https://devportal.redhuntlabs.com/) has different API endpoints depending on the user's subscription. Make sure to add the appropriate endpoint before running any scans.
165
-
166
-
# Running Subfinder
167
-
168
-
To run the tool on a target, just use the following command.
Use with caution. You are responsible for your actions
182
-
Developers assume no liability and are not responsible for any misuse or damage.
183
-
By using subfinder, you also agree to the terms of the APIs used.
184
-
185
-
[INF] Enumerating subdomains for hackerone.com
186
-
187
-
www.hackerone.com
188
-
support.hackerone.com
189
-
links.hackerone.com
190
-
api.hackerone.com
191
-
o1.email.hackerone.com
192
-
go.hackerone.com
193
-
3d.hackerone.com
194
-
resources.hackerone.com
195
-
a.ns.hackerone.com
196
-
b.ns.hackerone.com
197
-
mta-sts.hackerone.com
198
-
docs.hackerone.com
199
-
mta-sts.forwarding.hackerone.com
200
-
gslink.hackerone.com
201
-
hackerone.com
202
-
info.hackerone.com
203
-
mta-sts.managed.hackerone.com
204
-
events.hackerone.com
205
-
206
-
[INF] Found 18 subdomains for hackerone.com in 3 seconds 672 milliseconds
207
-
```
208
-
209
-
The subdomains discovered can be piped to other tools too. For example, you can pipe the discovered subdomains to [`httpx`](https://github.com/projectdiscovery/httpx) which will then find
Learn about more ways to install subfinder here: https://docs.projectdiscovery.io/tools/subfinder/install.
222
121
223
-
<table>
224
-
<tr>
225
-
<td>
226
-
227
-
## Subfinder with docker
228
-
229
-
Pull the latest tagged [subfinder](https://hub.docker.com/r/projectdiscovery/subfinder) docker image:
230
-
231
-
```sh
232
-
docker pull projectdiscovery/subfinder:latest
233
-
```
234
-
235
-
Running `subfinder` using the docker image:
236
-
237
-
```sh
238
-
docker run projectdiscovery/subfinder:latest -d hackerone.com
239
-
```
240
-
241
-
Running `subfinder` using the docker image, with a local config file:
122
+
## Post Installation Instructions
242
123
243
-
```sh
244
-
docker run -v $HOME/.config/subfinder:/root/.config/subfinder -t projectdiscovery/subfinder -d hackerone.com
245
-
```
124
+
`subfinder` can be used right after the installation, however many sources required API keys to work. Learn more here: https://docs.projectdiscovery.io/tools/subfinder/install#post-install-configuration.
246
125
247
-
</td>
248
-
</tr>
249
-
</table>
126
+
## Running Subfinder
250
127
251
-
<table>
252
-
<tr>
253
-
<td>
128
+
Learn about how to run Subfinder here: https://docs.projectdiscovery.io/tools/subfinder/running.
0 commit comments