{"id":33491,"date":"2024-06-26T05:54:35","date_gmt":"2024-06-26T05:54:35","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33491"},"modified":"2024-06-26T05:54:37","modified_gmt":"2024-06-26T05:54:37","slug":"gungnir","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/gungnir\/","title":{"rendered":"Gungnir : Monitoring Certificate Transparency In Real-Time"},"content":{"rendered":"\n<p>Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS certificates. <\/p>\n\n\n\n<p>Its primary purpose is to aid security researchers and penetration testers in discovering new domains and subdomains as soon as they are issued certificates, allowing for timely security testing.<\/p>\n\n\n\n<p>The tool connects to multiple CT logs and actively watches for new certificate entries. <\/p>\n\n\n\n<p>Whenever a new certificate is detected, Gungnir extracts the domains and subdomains present in the certificate&#8217;s subject alternative names (SANs) and Common Name (CN) and prints them to stdout in real-time.<\/p>\n\n\n\n<p>By running Gungnir continuously, security professionals can stay ahead of the curve and rapidly identify potential attack surfaces as soon as new domains or subdomains become active on the web. <\/p>\n\n\n\n<p>This proactive approach enables early reconnaissance, vulnerability scanning, and prompt remediation of any identified issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Features:<\/strong><a href=\"https:\/\/github.com\/g0ldencybersec\/gungnir#key-features\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time Monitoring:<\/strong>\u00a0Actively monitors multiple CT logs for newly issued certificates.<\/li>\n\n\n\n<li><strong>Domain Extraction:<\/strong>\u00a0Extracts domains and subdomains from certificate subject alternative names and common name.<\/li>\n\n\n\n<li><strong>Continuous Output:<\/strong>\u00a0Prints discovered domains and subdomains to stdout as they are detected.<\/li>\n\n\n\n<li><strong>Customizable Filtering:<\/strong>\u00a0Allows filtering output based a text file of root domains. Gungnir is designed to be a lightweight and efficient tool, making it suitable for running on various platforms, from local machines to cloud instances or containerized environments.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>go install github.com\/g0ldencybersec\/gungnir\/cmd\/gungnir@latest<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><a href=\"https:\/\/github.com\/g0ldencybersec\/gungnir#usage\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Options<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>Usage of gungnir:\n  -debug    Debug CT logs to see if you are keeping up. Outputs to STDERR\n  -r        Path to the list of root domains to filter against\n  -v        Output go logs (500\/429 errors) to STDERR\n  -j        JSONL output cert info<\/code><\/pre>\n\n\n\n<p>To run the tool, use a text file of root domains you want to monitor:&nbsp;<code>roots.txt<\/code>. Then, run the&nbsp;<code>gungnir<\/code>&nbsp;module:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>.\/gungnir -r roots.txt (filtered)\n- or -\n.\/gungnir (unfiltered)<\/code><\/pre>\n\n\n\n<p>Once the tool starts and initializes, it will print domains to stdout. So feel free to pipe the output into your favorite tool!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS certificates. Its primary purpose is to aid security researchers and penetration testers in discovering new domains and subdomains as soon as they are issued certificates, allowing for timely security testing. The tool connects to multiple CT [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33495,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6809,6321,6052,6325],"class_list":["post-33491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-gungnir","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gungnir : Monitoring Certificate Transparency In Real-Time<\/title>\n<meta name=\"description\" content=\"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/gungnir\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gungnir : Monitoring Certificate Transparency In Real-Time\" \/>\n<meta property=\"og:description\" content=\"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/gungnir\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-26T05:54:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-26T05:54:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Gungnir : Monitoring Certificate Transparency In Real-Time\",\"datePublished\":\"2024-06-26T05:54:35+00:00\",\"dateModified\":\"2024-06-26T05:54:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/\"},\"wordCount\":274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\",\"keywords\":[\"cybersecurity\",\"Gungnir\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gungnir\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/\",\"name\":\"Gungnir : Monitoring Certificate Transparency In Real-Time\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\",\"datePublished\":\"2024-06-26T05:54:35+00:00\",\"dateModified\":\"2024-06-26T05:54:37+00:00\",\"description\":\"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gungnir\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gungnir : Monitoring Certificate Transparency In Real-Time","description":"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/gungnir\/","og_locale":"en_US","og_type":"article","og_title":"Gungnir : Monitoring Certificate Transparency In Real-Time","og_description":"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS","og_url":"https:\/\/kalilinuxtutorials.com\/gungnir\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-06-26T05:54:35+00:00","article_modified_time":"2024-06-26T05:54:37+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Gungnir : Monitoring Certificate Transparency In Real-Time","datePublished":"2024-06-26T05:54:35+00:00","dateModified":"2024-06-26T05:54:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/"},"wordCount":274,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","keywords":["cybersecurity","Gungnir","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/gungnir\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/","url":"https:\/\/kalilinuxtutorials.com\/gungnir\/","name":"Gungnir : Monitoring Certificate Transparency In Real-Time","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","datePublished":"2024-06-26T05:54:35+00:00","dateModified":"2024-06-26T05:54:37+00:00","description":"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/gungnir\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/gungnir\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20(2).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4768,"url":"https:\/\/kalilinuxtutorials.com\/findomain-certificate-transparency-subdomains\/","url_meta":{"origin":33491,"position":0},"title":"Findomain &#8211; Tool That Use Certificate Transparency Logs to Find Subdomains","author":"R K","date":"April 28, 2019","format":false,"excerpt":"Finddomain is a tool that use Certificates Transparency logs to find subdomains. How it works? It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it tool very faster and reliable. If you want to know more\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5730,"url":"https:\/\/kalilinuxtutorials.com\/findomain\/","url_meta":{"origin":33491,"position":1},"title":"Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains","author":"R K","date":"July 15, 2019","format":false,"excerpt":"Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported platforms are 64 bits. How it works? It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3085,"url":"https:\/\/kalilinuxtutorials.com\/ct-exposer-certificate-transparency-logs\/","url_meta":{"origin":33491,"position":2},"title":"ct-exposer : An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs","author":"R K","date":"November 1, 2018","format":false,"excerpt":"ct-exposer will query the CT logs for a given domain, and then try to do DNS lookups for the domains to see which ones exist in DNS. In my experience, so far, I've found numerous sub-domains that were not located with 'site:domain.com' google searches. Keep in mind that the domains\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":30215,"url":"https:\/\/kalilinuxtutorials.com\/moniorg\/","url_meta":{"origin":33491,"position":3},"title":"Moniorg &#8211; Passive Monitoring via Certificate Transparency","author":"Varshini","date":"September 12, 2023","format":false,"excerpt":"Description Moniorg is a cutting-edge tool that uses Certificate Transparency logs to let you keep an eye on things without being noticed. With this tool, security experts can keep track of new names that are linked to an organization's SSL certificates. This gives them a unique look into the organization's\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjLF-Z-hQrOPgKSm5K17nsmwKfzvZhrTyxz5bfmOQDeBs78lVIsnP6Npa9AeTNTGNnVyyMY7B1aZyX7vGY_GdqRqUv1h--EjyC3kNNp035q_bwTpa2XGlPWimiMD0FlFzfZi_NZVeuQEr5BFuZ4Ezcr44s28tk4IEgQsXgBVsH36R1UmrxdeN2XxikgDNLT\/s16000\/Screenshot%202023-09-12%20173212.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjLF-Z-hQrOPgKSm5K17nsmwKfzvZhrTyxz5bfmOQDeBs78lVIsnP6Npa9AeTNTGNnVyyMY7B1aZyX7vGY_GdqRqUv1h--EjyC3kNNp035q_bwTpa2XGlPWimiMD0FlFzfZi_NZVeuQEr5BFuZ4Ezcr44s28tk4IEgQsXgBVsH36R1UmrxdeN2XxikgDNLT\/s16000\/Screenshot%202023-09-12%20173212.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjLF-Z-hQrOPgKSm5K17nsmwKfzvZhrTyxz5bfmOQDeBs78lVIsnP6Npa9AeTNTGNnVyyMY7B1aZyX7vGY_GdqRqUv1h--EjyC3kNNp035q_bwTpa2XGlPWimiMD0FlFzfZi_NZVeuQEr5BFuZ4Ezcr44s28tk4IEgQsXgBVsH36R1UmrxdeN2XxikgDNLT\/s16000\/Screenshot%202023-09-12%20173212.webp?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":37718,"url":"https:\/\/kalilinuxtutorials.com\/website-osint-tools-and-techniques-for-reconnaissance\/","url_meta":{"origin":33491,"position":4},"title":"Website OSINT: Tools and Techniques for Reconnaissance","author":"0xSnow","date":"September 9, 2025","format":false,"excerpt":"Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways to strengthen defenses is by analyzing what information your website already exposes to the public. This process, often referred to as Website OSINT (Open-Source Intelligence), focuses on collecting data that attackers could leverage, but without\u2026","rel":"","context":"In &quot;OSINT&quot;","block_context":{"text":"OSINT","link":"https:\/\/kalilinuxtutorials.com\/category\/open-source-intelligence\/"},"img":{"alt_text":"Website OSINT","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Website-OSINT.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12370,"url":"https:\/\/kalilinuxtutorials.com\/subcert\/","url_meta":{"origin":33491,"position":5},"title":"Subcert : Finds All The Subdomains From Certificate Transparency Logs","author":"R K","date":"March 25, 2021","format":false,"excerpt":"Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Setup Step 1: Install Python 3 apt-get install python3-pip Step 2: Clone the Repository git clone https:\/\/github.com\/A3h1nt\/Subcert.git Step 3: Install Dependencies pip3 install -r requirements.txt Step 4: Move the Directory to \/opt mv subcert\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/xihYOaM6p8Y\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33491"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33491\/revisions"}],"predecessor-version":[{"id":33494,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33491\/revisions\/33494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33495"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}