The Dnsrecon script will perform the following:

* Standard Record Enumeration for a given domain (A, NS, SOA and MX).
* Top Leven Domain Expansion for a given domain.
* Zone Transfer against all NS records of a given domain.
* Reverse Lookup against a given IP Range given a start and end IP.
* SRV Record enumeration


Passive DNS network mapper a.k.a. subdomains bruteforcer

dnsmap is mainly meant to be used by pentesters during the information gathering/enumeration phase of infrastructure security assessments. During the enumeration stage, the security consultant would typically discover the target company’s IP netblocks, domain names, phone numbers, etc …


The purpose of Dnsenum is to gather as much information as possible about a domain. The program currently performs the following operations:

1) Get the host’s addresse (A record). 2) Get the namservers (threaded). 3) Get the MX record (threaded). 4) Perform axfr queries on nameservers (threaded). 5) Get extra names and subdomains via google scraping (google query = “allinurl: -www site:domain”). 6) Brute force subdomains from file, can also perform recursion on subdomain that have NS records (all threaded). 7) Calculate C class domain network ranges and perform whois queries on them (threaded). 8) Perform reverse lookups on netranges ( C class or/and whois netranges) (threaded). 9) Write to domain_ips.txt file ip-blocks.


dnstracer determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data.


dnswalk is a DNS debugger. It performs zone transfers of specifieddomains, and checks the database in numerous ways for internalconsistency, as well as accuracy.