aiodnsbrute alternatives

Looking for an alternative tool to replace aiodnsbrute? During the review of aiodnsbrute we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Fierce (DNS reconnaissance tool)
  2. SubFinder (subdomain scanner)
  3. SubBrute (DNS enumeration tool)

These tools are ranked as the best alternatives to aiodnsbrute.

Alternatives (by score)

60

Fierce

Introduction

Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.

Project details

Fierce is written in Python.

Strengths and weaknesses

  • + The source code of this software is available

    Typical usage

    • Information gathering
    • Reconnaissance
    • Security assessment

    Fierce review

    60

    SubFinder

    Introduction

    SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.

    Project details

    SubFinder is written in Golang.

    Strengths and weaknesses

    • + Tool is modular and extendable
    • + More than 500 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Discovery of sensitive information
      • Information gathering
      • Penetration testing
      • Reconnaissance
      • Security assessment

      SubFinder review

      60

      SubBrute (subdomain-bruteforcer)

      Introduction

      SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.

      Project details

      SubBrute is written in Python.

      Strengths and weaknesses

      • + More than 1000 GitHub stars
      • + The source code of this software is available
      • - Full name of author is unknown

      Typical usage

      • Information gathering
      • Penetration testing
      • Security assessment

      SubBrute review

      60

      RTA (Red Team Arsenal)

      Introduction

      RTA is helpful to automate scanning public resources of a company. As the project name implies, this may be used during red teaming, like a penetration test. That obviously does not limit its use, as it is similarly useful by the blue team.

      With its integration with Nessus and other tools, RTA is more of a toolkit. This can be seen in its functionality, like subdomain enumeration and information gathering capabilities.

      Project details

      RTA is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available
      • - No releases on GitHub available

      Typical usage

      • Information gathering
      • Penetration testing
      • Security assessment
      • System enumeration

      RTA review

      60

      0d1n

      Introduction

      0d1n is useful to perform brute-force login attempts for authentication forms. It can discover useful directory names by using a predefined list of paths. With options to use a random proxy per request and load CSRF tokens, it is a tool that can be used in different type of assignments.

      Project details

      0d1n is written in C.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Information gathering
        • Penetration testing
        • Security assessment
        • Vulnerability scanning

        0d1n review

        60

        Crowbar

        Introduction

        While most brute forcing tools take a similar approach, Crowbar can use different methods that are not always available in other utilities. For example, Crowbar can use SSH keys, instead of the typical username and password combination. This might be useful during penetration testing when these type of details are discovered.

        Project details

        Crowbar is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Penetration testing

          Crowbar review

          74

          Fail2ban

          Introduction

          Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks

          Project details

          Fail2ban is written in Python.

          Strengths and weaknesses

          • + More than 2000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Network traffic filtering
            • Security monitoring

            Fail2ban review

            64

            IKEForce

            Introduction

            IKEForce is a command line utility to brute force VPN connections (IPSEC) that allow group name/ID enumeration and XAUTH.

            Project details

            IKEForce is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available

              IKEForce review

              56

              John the Ripper

              Introduction

              John the Ripper is a mature password cracker to find weak or known passwords. It works on Linux and other flavors of Unix and Microsoft Windows.

              Project details

              76

              Patator

              Introduction

              Patator is based on similar tools like Hydra, yet with the goal to avoid the common flaws these tools have like performance limitations. The tool is modular and supports different types of brute-force attacks or enumeration of information.

              Project details

              Patator is written in Python.

              Strengths and weaknesses

              • + More than 500 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Password discovery
                • Penetration testing
                • Reconnaissance
                • Vulnerability scanning

                Patator review

                64

                RouterSploit

                Introduction

                RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.

                Project details

                RouterSploit is written in Python.

                Strengths and weaknesses

                • + More than 50 contributors
                • + More than 6000 GitHub stars
                • + The source code of this software is available

                  Typical usage

                  • Penetration testing
                  • Self-assessment
                  • Software testing
                  • Vulnerability scanning

                  RouterSploit review

                  85

                  THC Hydra (thc-hydra)

                  Introduction

                  THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.

                  Project details

                  THC Hydra is written in C.

                  Strengths and weaknesses

                  • + More than 25 contributors
                  • + More than 1000 GitHub stars
                  • + Project is mature (10+ years)
                  • + The source code of this software is available

                    Typical usage

                    • Penetration testing
                    • Security assessment

                    THC Hydra review

                    60

                    WPForce

                    Introduction

                    This toolkit is fairly new and consists of WPForce and Yertle. As the name implies, the first component has the focus on brute force attacking of login credentials. When admin credentials have been found, it is Yertle that allows uploading a shell. Yertle also has post-exploitation modules for further research.

                    Project details

                    WPForce is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available
                    • - Full name of author is unknown

                    Typical usage

                    • Penetration testing
                    • Security assessment
                    • Vulnerability scanning

                    WPForce review

                    52

                    WPSeku

                    Introduction

                    With WPSeku a WordPress installation can be tested for the presence of security issues. Some examples are cross-site scripting (XSS), sql injection, and local file inclusion. The tool also tests for the presence of default configuration files. These files may reveal version numbers, used themes and plugins.

                    Project details

                    WPSeku is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available
                    • - Unknown project license

                    Typical usage

                    • Penetration testing
                    • Security assessment
                    • Vulnerability scanning

                    WPSeku review

                    60

                    Wfuzz

                    Introduction

                    Wfuzz is a fuzzing tool written in Python. Tools like Wfuzz are typically used to test web applications and how they handle both expected as unexpected input.

                    Project details

                    Wfuzz is written in Python.

                    Strengths and weaknesses

                    • + More than 1000 GitHub stars
                    • + The source code of this software is available

                      Typical usage

                      • Application fuzzing
                      • Application security
                      • Application testing
                      • Web application analysis

                      Wfuzz review

                      60

                      dirsearch

                      Introduction

                      Dirsearch is a tool to guide security professionals to find possible information leaks or sensitive data. It does this by looking for directory and file names.

                      Project details

                      dirsearch is written in Python.

                      Strengths and weaknesses

                      • + More than 10 contributors
                      • + More than 500 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Information gathering
                        • Penetration testing
                        • Security assessment

                        dirsearch review

                        85

                        django-axes

                        Introduction

                        This tool may be used by developers that work with the Django framework. It adds a security layer on top of the application by looking at login attempts and track them.

                        Project details

                        django-axes is written in Python.

                        Strengths and weaknesses

                        • + More than 50 contributors
                        • + The source code of this software is available

                          Typical usage

                          • Application security

                          django-axes review

                          63

                          DNSChef

                          Introduction

                          DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.

                          Project details

                          64

                          DNSteal

                          Introduction

                          DNSteal allows you to extract files from a machine through DNS requests. This can be used to circumvent security measures and test them against data leakage. The tool supports compression and allows for multiple files to be transferred.

                          Project details

                          DNSteal is written in Python.

                          Strengths and weaknesses

                          • + More than 500 GitHub stars
                          • + The source code of this software is available
                          • - No releases on GitHub available
                          • - Full name of author is unknown

                          Typical usage

                          • Application security
                          • Data hiding

                          DNSteal review

                          64

                          QuickScan

                          Introduction

                          Although there are many port scanning utilities, sometimes it is specific functionality that makes a tool really powerful. For example, QuickScan saves the results of a scan, which then can be processed later for follow-up.

                          Project details

                          QuickScan is written in Python.

                          Strengths and weaknesses

                          • + Very low number of dependencies
                          • + The source code of this software is available
                          • - No releases on GitHub available
                          • - Full name of author is unknown

                          Typical usage

                          • Network scanning

                          QuickScan review

                          60

                          Sublist3r

                          Introduction

                          Sublist3r helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.

                          Project details

                          Sublist3r is written in Python.

                          Strengths and weaknesses

                          • + More than 2000 GitHub stars
                          • + The source code of this software is available

                            Sublist3r review

                            64

                            Th3inspector

                            Introduction

                            This tool can be called a true 'inspector tool' as it helps to discover many types of data.

                            • Website information
                            • Domain and subdomain information
                            • Mail server information and email
                            • Phone details
                            • IP addresses
                            • Detection of used CMS

                            Project details

                            Th3inspector is written in Perl.

                            Strengths and weaknesses

                            • + The source code of this software is available
                            • - No releases on GitHub available

                            Typical usage

                            • Discovery of sensitive information
                            • Information gathering

                            Th3inspector review

                            64

                            altdns

                            Introduction

                            Altdns is a security tool to discover subdomains. It generates permutations, alterations, and mutations of subdomains. The generated names can also be tested by performing DNS lookups. An enumeration tool like Altdns is useful during penetrating testing assignments.

                            Project details

                            altdns is written in Python.

                            Strengths and weaknesses

                            • + More than 500 GitHub stars
                            • + The source code of this software is available

                              Typical usage

                              • Reconnaissance
                              • Subdomain discovery
                              • Subdomain enumeration

                              altdns review

                              56

                              domain

                              Introduction

                              Domain is a Python script written by Jason Haddix to combine the tools Recon-ng and altdns. It allows to use the two tool one multiple domains within the same session.

                              Project details

                              domain is written in Python.

                              Strengths and weaknesses

                              • + More than 500 GitHub stars
                              • + The source code of this software is available
                              • - Unknown project license

                              Typical usage

                              • Subdomain enumeration

                              domain review

                              Some relevant tool missing as an alternative to aiodnsbrute? Please contact us with your suggestion.