The Cleveridge Subdomain Scanner finds subdomains of a given domain.
This project is maintained by Cleveridge
This tool is for ethical testing purpose only.
Cleveridge and its owners can't be held responsible for misuse by users.
Users have to act as permitted by local law rules.
The Cleveridge Subdomain Scanner finds subdomains of a given domain and shows the list on screen and records all results in easy accessible log-files.
On the first run the tool creates a directory '/log' to store all results in.
This tool is tested in a Linux environment with Python 2.7 installed
In Linux, download the files in to the directory of your choice. BE sure the cl_subd_scan.py file is executeble (chmod 0766) and the other files are readable. In Terminal go to directory your files are listed in and run the cl_subd_scan.py file followed by the domain name of the domain you want to search the subdomains of eg.
./cl_subd_scan.py google.com
./cl_subd_scan.py -s subs_mini.txt google.com
./cl_subd_scan.py -s subs_mini.txt google.com yahoo.com msn.com
./cl_subd_scan.py -h
When you are using the full list of +114.000 subdomains, the scan takes a while. For slow domains or when you are working over a VPN it can take more then 1 hour for each domain.
The 'subs_mini.txt'-list is much faster. This list contains the most common subdomains but of course the list is not as complete as the full 'subs.txt'-list. This means you can miss some, not so common, subdomains.
Cleveridge - Ethical Hacking Lab
De Brulen 28
2370 Arendonk
Belgium
https://cleveridge.org