{"id":30982,"date":"2023-10-23T04:43:40","date_gmt":"2023-10-23T04:43:40","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=30982"},"modified":"2023-10-24T05:31:09","modified_gmt":"2023-10-24T05:31:09","slug":"subcat","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/subcat\/","title":{"rendered":"SubCat &#8211; A Fast And Efficient Subdomain Enumeration Tool"},"content":{"rendered":"\n<p>SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. <\/p>\n\n\n\n<p>SubCat is built for doing one thing only &#8211; passive subdomain enumeration, and it does that very well.<\/p>\n\n\n\n<p>We have designed SubCat to comply with all passive sources licenses, and usage restrictions, as well as maintained a consistently passive model to make it useful to both penetration testers and bug bounty hunters alike.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-features\"><a href=\"https:\/\/github.com\/duty1g\/subcat#features\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Features<\/strong><\/a><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzNVb4jhRclCOzWUbqGdVYMI4qJ8rCI4jk-WzOhwPNSj34_mw53BH5oZibqZFcVO9DI4nELl5FJfIf2sqTujPFwwcbHYbbwoLzn4_Bf8IT3Ub-oPej01fZ_B1dfgyvg51KFSs99AGdaxlar7MmFRRq1WtpYzR0izEZwGeVJtP5RGJHKW0ZwpyHSsOrcv-V\/s16000\/170030037-4e5cf0f7-3ed5-46aa-afaa-4d992a2c1eb3.gif\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Fast and powerful resolution and wildcard elimination module<\/li>\n\n\n\n<li><strong>Curated<\/strong>&nbsp;passive sources to maximize results<\/li>\n\n\n\n<li>Optimized for speed, very fast and&nbsp;<strong>lightweight<\/strong>&nbsp;on resources<\/li>\n\n\n\n<li><strong>STDIN\/OUT<\/strong>&nbsp;support for integrating in workflows<\/li>\n\n\n\n<li>Scope limitation based on given IP ranges list<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-install\"><a href=\"https:\/\/github.com\/duty1g\/subcat#install\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Install<\/strong><\/a><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># Linux, Windows, MacOS\npip3 install -r requirements.txt<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-post-installation\"><a href=\"https:\/\/github.com\/duty1g\/subcat#post-installation\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Post Installation<\/strong><\/a><\/h2>\n\n\n\n<p>API Key is needed before querying on third-party sites, such as&nbsp;<code>Shodan, SecurityTrails, Virustotal,<\/code>&nbsp;and&nbsp;<code>BinaryEdge<\/code>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The API key setting can be done via&nbsp;<code>config.yaml<\/code>.<\/li>\n<\/ul>\n\n\n\n<p>An example provider config file<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\nbinaryedge:\n  - 0bf8919b-aab9-42e4-9574-d3b639324597\n  - ac244e2f-b635-4581-878a-33f4e79a2c13\n\nvirustotal:\n  - AAAAClP1bJJSRMEAAAAClP1bJJSRMEYJazgwhJKrggRwKAYJazgwhJKrggRwKA\nsecuritytrails: &#91;]\nshodan:\n  - AAAAClP1bJJSRMEYJazgwhJKrggRwKA\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><a href=\"https:\/\/github.com\/duty1g\/subcat#usage\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Usage<\/a><\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 subcat.py -h<\/code><\/pre>\n\n\n\n<p>This will display help for the tool. Here are all the switches it supports.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Flags:\nINPUT:\n   -d --domain string    domains to find subdomains for\n   -l DOMAINLIST         file containing list of domains for subdomain discovery\n   --scope SCOPE         show only subdomains in scope\n\nOUTPUT:\n   -sc, --status-code    show response status code\n   -ip, --ip             resolve IP address\n   -title, --title       show page title\n   -silent, --silent     show only subdomains in output\n   -o OUTPUT, --output OUTPUT\n                        file to write output to\n   \nCONFIG:\n   -t THREADS, --threads THREADS\n                        number of concurrent threads for resolving (default 40)\n\nDEBUG:\n   -v                    show verbose output\n   -h, --help            show this help message and exit<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><a href=\"https:\/\/github.com\/duty1g\/subcat#running-subcat\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Running SubCat<\/a><\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>cat domains | python3 subcat.py<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>echo hackerone.com | python3 subcat.py -silent | httpx -silent\n\nhttp:&#47;&#47;hackerone.com\nhttp:\/\/www.hackerone.com\nhttp:\/\/docs.hackerone.com\nhttp:\/\/api.hackerone.com\nhttps:\/\/docs.hackerone.com\nhttp:\/\/mta-sts.managed.hackerone.com<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 subcat.py -d hackerone.com\n\n \n\t                      \u037e            \u037e                  \n\t                    \u03c1\u03b2\u03b2\u039a          \u037e\u03b2\u03b2\u039d                \n\t                  \u03ad\u0386\u03c7\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u0392              \n\t                \u037e\u03a3\u0386\u03c7\u039c\u0385\u0385\u03ab\u039d\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2 \u03ab\u0385\u0385\u03ab\u03b2\u03b2\u03b2\u039d            \n\t               \u03cc\u0386\u0386\u03c7\u03b2   \u0386   \u03b2\u03b2\u03b2\u03b2\u0385  \u0386\u0385  \u03b2\u03b2\u03b2\u03b2\u03b2           \n\t              \u03c7\u0386\u0386\u0386\u03c6\u03b2\u0392\u037e \u03ab\u0385\u037e\u03ad\u03b2\u03b2\u03b2\u03b2\u0392\u037e \u03ab\u0385 \u03c1\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2          \n\t              \u0386\u0386\u0386\u0386\u03b4\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u037e\u03c7\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03bc\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2          \n\t              \u03aa\u03c7\u03c7\u03c7\u03c7\u03a7\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b8\u03b8\u03b8\u03b8\u039a          \n\t             \u0387\u03ca\u03b2\u03b8\u03b2\u03b6  \u03aa\u03b8\u03b8\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03bc \u037e\u03cc\u03b2\u03ab\u0385        \n\t              \u0387\u0385   \u0385\u03ab\u03ab\u03ab\u0386\u0386\u03b8\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b8\u03b8\u03ab\u0385   \u0385\u03ab\u0385         \n\t                      \u037e\u03a3\u0386\u03b8\u03b2\u03b2\u03b2\u03b2\u0392\u039d\u03c1\u03c1\u03c1\u03bc                  \n\t                     \u037e\u03a3\u0386\u0386\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03bc\n\t \u2584\u221e\u221e\u221e\u221e\u221e\u2584, \u2552\u221e\u221e\u2584   \u221e\u221e\u2584 \u2584\u221e\u221e\u221e\u221e\u221e\u221e\u2584   ,\u2584\u221e\u221e\u221e\u221e\u2584      \u2584\u221e\u221e4\u2584  \u2552\u221e\u221e\u221e\u221e\u221e\u221e\u221e\u2584,\n\t\u2590\u2584 \u2550\u2584\u2584\u2584 \u2590\u2588\u2590 ,\u2580  j' \u2588\u258c\u2588  \u2584\u2584\u2584 \u2580\u2588\u258c\u2588\u2580 \u2553\u2584\u2584  \u2580\u2584  \u00a1\u2588  , \u2590\u2588 \u2590\u2584\u2584\u2584  \u2584\u2584\u2588\u2588\n\t\u2590\u2584 `'\"\"\u2580\u2588\u2588\u2590  \u2588\u258c j  \u2588\u258c\u2588  `\"\" \u2584\u2588\u258c\u2588 \u2590\u2588\u2580`\u2580\u2584\u2588\u2588' M  $\u2588\u2588  \u2588, `\u2588 \u2590\u2588```\n\tj\u2580\u2580\u2588\u2588\u2588\u258c \u2590\u2588\u2590  \u2580\u258c\u2584\u2588  \u2580\u2580\u2588 \u2590\u2588\u2588\u2588  \u2588\u258c\u2584 \u2580\u2588\u2584\u2584\u2580 \u2590\u2588M\u2580.       \u2580\u2588\u2584.\u2580 J\u2580\n\t\u255a\u2584,,\u00ac\u00ac\u2310\u2584\u2588\u258c \u2580\u2584,,, \u2584\u2588\u2588 \u2588,,,,,\u2593\u2588\u2588\u258c \u2580\u2584,,,,\u2584\u2588\u2569j\u258c,\u2588\u2588\u2580\u2580\u2580\u2580\u258c,\u2588\u258c`\u2588,\u2590\u2588\n\t  \u2580\u2580\u2580\u2580\u2580\u2580\u2580    \u2580\u2580\u2580\u2580\u2580\u2580 \"\"\u2580\u2580\u2580\u2580\u2580\u2580      \u2580\u2580\u2580\"\"`  \u2580\u2580\u2580     \u2580\u2580\u2580   \u2580\u2580\u2580\n\t               \u0385q\u0386\u0386\u0386\u0386\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03a1\u0385  \n\t                  \u03ab\u03b8\u0386\u0386\u0386\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03b2\u03a1\u0385         \n\t                      \u0385\u03ab\u03ab\u03ab\u03ab\u039dNN\u039d\u03ab\u03ab\u03ab\u0390\u0385\u0385      \n\t                    \n\t                    \n\t                    v{1.1.1#dev}@duty1g\n\t                            \n\n\n&#91;13:05:51] &#91;INFO]: binaryedge.io 13 asset                                             \n&#91;13:05:52] &#91;INFO]: virustotal 18 asset                                             \n&#91;13:05:53] &#91;INFO]: urlscan.io 98 asset                                             \n&#91;13:05:54] &#91;INFO]: alienvault.com 59 asset                                             \n&#91;13:06:28] &#91;INFO]: wayback 193046 asset                                             \n&#91;13:06:29] &#91;INFO]: hackertarget.com 4 asset                                             \n&#91;13:06:31] &#91;INFO]: crt.sh 268 asset                                             \n&#91;13:06:32] &#91;INFO]: certspotter.com 12 asset                                             \n&#91;13:06:33] &#91;INFO]: bufferover.run 11 asset                                             \n&#91;13:06:33] &#91;INFO]: threatcrowd.org 4 asset                                             \n&#91;13:06:33] &#91;INFO]: Found 21 for hackerone.com\n\nmta-sts.managed.hackerone.com\nmta-sts.hackerone.com\nmta-sts.forwarding.hackerone.com\na.ns.hackerone.com\nb.ns.hackerone.com\ndocs.hackerone.com\ngo.hackerone.com\ninfo.hackerone.com\nlinks.hackerone.com\nsupport.hackerone.com\napi.hackerone.com\nwww.hackerone.com\nhackerone.com\nzendesk1.hackerone.com\nzendesk3.hackerone.com\ngslink.hackerone.com\nzendesk4.hackerone.com\nresources.hackerone.com\nevents.hackerone.com\nzendesk2.hackerone.com\n3d.hackerone.com\n<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. SubCat is built for doing one thing only &#8211; passive subdomain enumeration, and it does that very well. We have designed SubCat to comply with all passive sources [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":30984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6375],"class_list":["post-30982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-subcat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SubCat - A Fast And Efficient Subdomain Enumeration Tool<\/title>\n<meta name=\"description\" content=\"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/subcat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SubCat - A Fast And Efficient Subdomain Enumeration Tool\" \/>\n<meta property=\"og:description\" content=\"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/subcat\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T04:43:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-24T05:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"SubCat &#8211; A Fast And Efficient Subdomain Enumeration Tool\",\"datePublished\":\"2023-10-23T04:43:40+00:00\",\"dateModified\":\"2023-10-24T05:31:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/\"},\"wordCount\":181,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"SubCat\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/subcat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/subcat\/\",\"name\":\"SubCat - A Fast And Efficient Subdomain Enumeration Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\",\"datePublished\":\"2023-10-23T04:43:40+00:00\",\"dateModified\":\"2023-10-24T05:31:09+00:00\",\"description\":\"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/subcat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SubCat - A Fast And Efficient Subdomain Enumeration Tool","description":"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/subcat\/","og_locale":"en_US","og_type":"article","og_title":"SubCat - A Fast And Efficient Subdomain Enumeration Tool","og_description":"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch","og_url":"https:\/\/kalilinuxtutorials.com\/subcat\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-10-23T04:43:40+00:00","article_modified_time":"2023-10-24T05:31:09+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/subcat\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/subcat\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"SubCat &#8211; A Fast And Efficient Subdomain Enumeration Tool","datePublished":"2023-10-23T04:43:40+00:00","dateModified":"2023-10-24T05:31:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/subcat\/"},"wordCount":181,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","SubCat"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/subcat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/subcat\/","url":"https:\/\/kalilinuxtutorials.com\/subcat\/","name":"SubCat - A Fast And Efficient Subdomain Enumeration Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","datePublished":"2023-10-23T04:43:40+00:00","dateModified":"2023-10-24T05:31:09+00:00","description":"SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular arch","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/subcat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/subcat\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjyr8axG7UQI1-RhNvNYNOCIfVHdQhwA9u1JY7etuCq4W6IluTso5UGfRfyJw_apb8GC41Mr1gL0MZ0V7N8G3iyUsjcu9gc-pj3Qjr2Pp_yDXSG_ZRAA2y49Lt0t0EO4B-iwcg4gsLdSBhypX5dXKUVLDWM3MtgogKAWpfwyoewKVivREyq2aiwCsE40kKe\/s16000\/Untitled%20design%20(37).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":28769,"url":"https:\/\/kalilinuxtutorials.com\/subfinder-subdomain\/","url_meta":{"origin":30982,"position":0},"title":"Subfinder &#8211; A New Tool to Discover Subdomains for Websites","author":"Linumonk","date":"April 4, 2023","format":false,"excerpt":"Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains that should be \"blog.kalilinuxtutorials.com\" and \"store.kalilinuxtutorials.com\" are subdomains of the \"kalilinuxtutorials.com\" domain. What is Subdomain? Subdomains are created as subsets of the primary domain name to help organize and navigate\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"subfinder","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgS_nox8n1nKIG9TfW9s1uphHBiG4V-8Y7ihIGFs6TI-8zqjFNvMm4cDJPCWw3Z-tagdNEqnWpDqFSh-RjW5zj46uwUA21t1qNa3bktefWqVKuSJVhEG6w5Kyi76-q9Iu2Hrw-sRhDAS10zUvN2b0vGxTwe3mc-62pyenxNGGSVCRzE-KitrezAxoiRXQ\/s16000\/subfinder.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgS_nox8n1nKIG9TfW9s1uphHBiG4V-8Y7ihIGFs6TI-8zqjFNvMm4cDJPCWw3Z-tagdNEqnWpDqFSh-RjW5zj46uwUA21t1qNa3bktefWqVKuSJVhEG6w5Kyi76-q9Iu2Hrw-sRhDAS10zUvN2b0vGxTwe3mc-62pyenxNGGSVCRzE-KitrezAxoiRXQ\/s16000\/subfinder.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgS_nox8n1nKIG9TfW9s1uphHBiG4V-8Y7ihIGFs6TI-8zqjFNvMm4cDJPCWw3Z-tagdNEqnWpDqFSh-RjW5zj46uwUA21t1qNa3bktefWqVKuSJVhEG6w5Kyi76-q9Iu2Hrw-sRhDAS10zUvN2b0vGxTwe3mc-62pyenxNGGSVCRzE-KitrezAxoiRXQ\/s16000\/subfinder.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgS_nox8n1nKIG9TfW9s1uphHBiG4V-8Y7ihIGFs6TI-8zqjFNvMm4cDJPCWw3Z-tagdNEqnWpDqFSh-RjW5zj46uwUA21t1qNa3bktefWqVKuSJVhEG6w5Kyi76-q9Iu2Hrw-sRhDAS10zUvN2b0vGxTwe3mc-62pyenxNGGSVCRzE-KitrezAxoiRXQ\/s16000\/subfinder.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6360,"url":"https:\/\/kalilinuxtutorials.com\/sudomy-subdomain-enumeration-tool\/","url_meta":{"origin":30982,"position":1},"title":"Sudomy : Subdomain Enumeration Tool Created Using A Bash Script","author":"R K","date":"August 30, 2019","format":false,"excerpt":"Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and comprehensive way. Features For recent time,\u00a0the tool\u00a0has these 9 features: Easy, light, fast and powerful. Bash script is available by default in almost all Linux distributions. By using bash script\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37313,"url":"https:\/\/kalilinuxtutorials.com\/subdominator\/","url_meta":{"origin":30982,"position":2},"title":"Subdominator &#8211; Unleash The Power Of Subdomain Enumeration","author":"Varshini","date":"March 26, 2025","format":false,"excerpt":"Subdominator is a lightweight and fast tool designed for passive subdomain enumeration, primarily used in bug hunting and reconnaissance processes. Developed by RevoltSecurities, it helps cybersecurity professionals and researchers identify potential security vulnerabilities by efficiently enumerating subdomains using various free passive resources. Key Features Of Subdominator Speed and Efficiency: Subdominator\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Subdominator-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37025,"url":"https:\/\/kalilinuxtutorials.com\/subcat-2\/","url_meta":{"origin":30982,"position":3},"title":"SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool","author":"Varshini","date":"March 12, 2025","format":false,"excerpt":"SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug bounty hunters, and security researchers. Version 1.3.1 of SubCat continues to build on its predecessors by offering a robust set of features that enhance its performance and versatility. Key Features\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/SubCat-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24489,"url":"https:\/\/kalilinuxtutorials.com\/subdomains-sh\/","url_meta":{"origin":30982,"position":4},"title":"Subdomains.Sh : A Wrapper Around Tools I Use For Subdomain Enumeration On A Given Domain","author":"R K","date":"May 23, 2022","format":false,"excerpt":"Subdomains.Sh is a wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash. The Workflow Installation Run the installation script: curl -s https:\/\/raw.githubusercontent.com\/enenumxela\/subdomains.sh\/main\/install.sh | bash - Or run in an ephemeral Docker container: Clone the repository and run cd subdomains.shBuild the container\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhE8IxyxKMptWIvHDD5lVVV73I3Ac2o_RH_G9bcTLCE3BAtZQ5EDhh8WQwtp-UPfqmS78BAjjk0yjTEHgOsa1LQmIo4eGWrOLFZ2CT1Hi8pLoT3bRt5Q_j1F1spW9WIHGjy0oPBeCCWAmFzLujRrlyY9sPfdW-zHAzMIVmrwq6iWZTKOZIVlmZNIWPG\/s728\/subdomains.sh%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhE8IxyxKMptWIvHDD5lVVV73I3Ac2o_RH_G9bcTLCE3BAtZQ5EDhh8WQwtp-UPfqmS78BAjjk0yjTEHgOsa1LQmIo4eGWrOLFZ2CT1Hi8pLoT3bRt5Q_j1F1spW9WIHGjy0oPBeCCWAmFzLujRrlyY9sPfdW-zHAzMIVmrwq6iWZTKOZIVlmZNIWPG\/s728\/subdomains.sh%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhE8IxyxKMptWIvHDD5lVVV73I3Ac2o_RH_G9bcTLCE3BAtZQ5EDhh8WQwtp-UPfqmS78BAjjk0yjTEHgOsa1LQmIo4eGWrOLFZ2CT1Hi8pLoT3bRt5Q_j1F1spW9WIHGjy0oPBeCCWAmFzLujRrlyY9sPfdW-zHAzMIVmrwq6iWZTKOZIVlmZNIWPG\/s728\/subdomains.sh%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhE8IxyxKMptWIvHDD5lVVV73I3Ac2o_RH_G9bcTLCE3BAtZQ5EDhh8WQwtp-UPfqmS78BAjjk0yjTEHgOsa1LQmIo4eGWrOLFZ2CT1Hi8pLoT3bRt5Q_j1F1spW9WIHGjy0oPBeCCWAmFzLujRrlyY9sPfdW-zHAzMIVmrwq6iWZTKOZIVlmZNIWPG\/s728\/subdomains.sh%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":23986,"url":"https:\/\/kalilinuxtutorials.com\/dome\/","url_meta":{"origin":30982,"position":5},"title":"Dome : Fast And Reliable Python Script That Makes Active And\/Or Passive Scan To Obtain Subdomains","author":"R K","date":"April 18, 2022","format":false,"excerpt":"Dome is a fast and reliable python script that makes active and\/or passive scan to obtain subdomains and search for open ports. This tool is recommended for bug bounty hunters and pentester in their reconnaissance phase. the more surface area exposed the faster a rock with break down If you\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEie9Fed0SZ_l15xO5QZ8omXpyD0l62xVRTGQY95-HUslWSkxRwPUrbjRq23WOss-szVvniZNBLA1BX-t9cuaBPkMGc_vQzrkKSQFVTHyW2jY2Ac42l_GwMOuwKOLZY1KQpCuwKqp8mYDb2i7wMZnvwqV4JxSlZu_nUoTNPWnf2GdIAWcymU_SpenEcp\/s728\/Dome_5-761230%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEie9Fed0SZ_l15xO5QZ8omXpyD0l62xVRTGQY95-HUslWSkxRwPUrbjRq23WOss-szVvniZNBLA1BX-t9cuaBPkMGc_vQzrkKSQFVTHyW2jY2Ac42l_GwMOuwKOLZY1KQpCuwKqp8mYDb2i7wMZnvwqV4JxSlZu_nUoTNPWnf2GdIAWcymU_SpenEcp\/s728\/Dome_5-761230%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEie9Fed0SZ_l15xO5QZ8omXpyD0l62xVRTGQY95-HUslWSkxRwPUrbjRq23WOss-szVvniZNBLA1BX-t9cuaBPkMGc_vQzrkKSQFVTHyW2jY2Ac42l_GwMOuwKOLZY1KQpCuwKqp8mYDb2i7wMZnvwqV4JxSlZu_nUoTNPWnf2GdIAWcymU_SpenEcp\/s728\/Dome_5-761230%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEie9Fed0SZ_l15xO5QZ8omXpyD0l62xVRTGQY95-HUslWSkxRwPUrbjRq23WOss-szVvniZNBLA1BX-t9cuaBPkMGc_vQzrkKSQFVTHyW2jY2Ac42l_GwMOuwKOLZY1KQpCuwKqp8mYDb2i7wMZnvwqV4JxSlZu_nUoTNPWnf2GdIAWcymU_SpenEcp\/s728\/Dome_5-761230%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=30982"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30982\/revisions"}],"predecessor-version":[{"id":30983,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30982\/revisions\/30983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/30984"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=30982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=30982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=30982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}