10/12 free views
Tool
CLI
Penetration Testing & Red Teaming

subfinder

by projectdiscovery

12.9Kstars
1.5Kforks
157watchers
Updated 3 months ago
About

subfinder is a fast and lightweight passive subdomain enumeration tool designed for efficient discovery of valid subdomains using curated online sources.

Fast passive subdomain enumeration tool.

Primary Use Case

This tool is primarily used by penetration testers, bug bounty hunters, and red teamers to quickly gather subdomain information about target domains without active probing, ensuring stealth and speed. It helps in reconnaissance phases to identify attack surfaces by passively collecting subdomains from multiple sources.

Key Features
  • Fast and powerful resolution and wildcard elimination modules
  • Curated passive sources to maximize results
  • Multiple output formats supported including JSON and file outputs
  • Optimized for speed and lightweight on resources
  • Supports STDIN/STDOUT for easy integration into automated workflows
  • Modular architecture focused solely on passive subdomain enumeration
  • Ability to include or exclude specific data sources
  • Rate limiting and concurrency controls for request management

Installation

  • Download the latest release from the GitHub releases page
  • Alternatively, build from source using Go environment
  • Run `subfinder -h` to verify installation and view help

Usage

>_ subfinder -h

Displays help information and all available flags for the tool

>_ subfinder -d example.com

Enumerates subdomains for the specified domain 'example.com'

>_ subfinder -dL domains.txt

Reads a list of domains from 'domains.txt' and enumerates subdomains for each

>_ subfinder -s crtsh,github

Uses only specified sources (crtsh and github) for subdomain discovery

>_ subfinder -all

Uses all available sources for enumeration (slower but more comprehensive)

>_ subfinder -rl 10

Limits the number of HTTP requests to 10 per second

>_ subfinder -o output.txt

Writes the enumeration results to 'output.txt'

>_ subfinder -oJ

Outputs results in JSON Lines format

>_ subfinder -update

Updates subfinder to the latest version

Security Frameworks
Reconnaissance
Resource Development
Discovery
Usage Insights
  • Integrate subfinder into automated red team reconnaissance pipelines to speed up attack surface mapping.
  • Use subfinder's JSON output to feed into vulnerability scanners for continuous monitoring.
  • Combine with active scanning tools for comprehensive domain enumeration.
  • Leverage rate limiting and concurrency controls to avoid detection during stealth operations.
  • Incorporate subfinder into purple team exercises to improve collaboration between offense and defense during reconnaissance phases.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about subfinder. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team40%
Purple Team60%
Details
LicenseMIT License
LanguageGo
Open Issues531
Topics
subdomain-enumeration
osint
subdomains
bugbounty
reconnaissance
hacking
hacktoberfest