Skip to content

Instantly share code, notes, and snippets.

@C0axx
Forked from si9int/c99-nl.py
Created April 5, 2020 18:47
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save C0axx/e7d4ed11afc12fa405de286134ce4107 to your computer and use it in GitHub Desktop.
Save C0axx/e7d4ed11afc12fa405de286134ce4107 to your computer and use it in GitHub Desktop.
Automates https://subdomainfinder.c99.nl | Usage: python3 c99-nl.py <domain.com> | Requirements: pip3 install bs4
#!/usr/bin/env python3
import requests, sys
from bs4 import BeautifulSoup as bs
domain = sys.argv[1]
subdomains = []
params = {
'CSRF102664102' : 'geek100526529',
'CSRF105639185' : 'espionage103090877',
'CSRF105425384' : 'malware103726348',
'CSRF100159316' : 'subnet_ip107692824',
'CSRF100962167' : 'drudge103629153',
'CSRF109590103' : 'computer108351989',
'CSRF103511594' : 'tech106748132',
'CSRF106630274' : 'malware102238288',
'CSRF101161561' : 'spammer108513508',
'CSRF105918489' : 'security100797595',
'CSRF100737541' : 'thief103449013',
'CSRF103051531' : 'burglar100417899',
'CSRF109634325' : 'addict103181028',
'CSRF107994468' : 'subnet103656850',
'CSRF100355950' : 'burglar108764382',
'CSRF101931621' : 'phishing109263812',
'CSRF105512081' : 'intrusion104705632',
'CSRF100069713' : 'bogey104684780',
'CSRF101021677' : 'bot105831137',
'CSRF109373552' : 'spy105071422',
'CSRF103106435' : 'programmer102291574',
'CSRF105010505' : 'security107419238',
'CSRF108132841' : 'thief109444740',
'CSRF103389877' : 'infiltrator108716803',
'CSRF104708794' : 'bot106464179',
'CSRF102233168' : 'TrojanHorse102832112',
'CSRF110860003' : 'cyberspace100718494',
'CSRF105583248' : 'phisher101762356',
'CSRF105448985' : 'burglar108336158',
'CSRF109161941' : 'thief105559430',
'CSRF101550813' : 'CSRF102561258',
'CSRF108475096' : 'pirating110482989',
'CSRF108589158' : 'infiltrator103662624',
'CSRF108679726' : 'phisher106951609',
'CSRF102643284' : 'CSRF108365228',
'CSRF88046738' : '39889423',
'breach' : '34255420',
'56339944' : 'CSRF81213693',
'CSRF109310100202048578' : 'intrusion108998403',
'CSRF104648154' : 'security105090286',
'domain' : '{}'.format(domain),
'41559767' : 'CSRF23056260',
'CSRF76937701' : '80495764',
'CSRF104966208' : 'subnet100080162',
'scanner' : '64431067',
'71563262' : 'CSRF52194957',
'CSRF11056969020200404' : '86098696',
'CSRF102874705' : 'cybercrime110476127',
'CSRF103810429' : 'computer109165745',
'CSRF25190828' : '43240686',
'CSRF' : '90393327',
'security' : '77099357',
'83365415' : 'CSRF22615523',
'domain_6' : 'mask106411859',
'scan_subdomains' : '',
'privatequery' : 'on'
}
reqs = requests.post('https://subdomainfinder.c99.nl/', data=params).text
html = bs(reqs, 'html.parser').find('table', {'id' : 'result_table'})
for tr in html.find_all('tr'):
try:
host = tr.find('a').text
subdomains.append(host)
except:
pass
for s in subdomains:
print(s)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment