aiodnsbrute alternatives

Looking for an alternative tool to replace aiodnsbrute? During the review of aiodnsbrute we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Fierce (DNS reconnaissance tool)
  2. SubFinder (subdomain scanner)
  3. SubBrute (DNS enumeration tool)

These tools are ranked as the best alternatives to aiodnsbrute.

Alternatives (by score)

76

Fierce

Introduction

Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.

Project details

Fierce is written in Python.

Strengths and weaknesses

  • + The source code of this software is available

    Typical usage

    • Information gathering
    • Reconnaissance
    • Security assessment

    Fierce review

    60

    SubFinder

    Introduction

    SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.

    Project details

    SubFinder is written in Golang.

    Strengths and weaknesses

    • + Tool is modular and extendable
    • + More than 500 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Discovery of sensitive information
      • Information gathering
      • Penetration testing
      • Reconnaissance
      • Security assessment

      SubFinder review

      60

      SubBrute (subdomain-bruteforcer)

      Introduction

      SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.

      Project details

      SubBrute is written in Python.

      Strengths and weaknesses

      • + More than 1000 GitHub stars
      • + The source code of this software is available
      • - Full name of author is unknown

      Typical usage

      • Information gathering
      • Penetration testing
      • Security assessment

      SubBrute review

      64

      RTA (Red Team Arsenal)

      Introduction

      RTA is helpful to automate scanning public resources of a company. As the project name implies, this may be used during red teaming, like a penetration test. That obviously does not limit its use, as it is similarly useful by the blue team.

      With its integration with Nessus and other tools, RTA is more of a toolkit. This can be seen in its functionality, like subdomain enumeration and information gathering capabilities.

      Project details

      RTA is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available
      • - No releases on GitHub available

      Typical usage

      • Information gathering
      • Penetration testing
      • Security assessment
      • System enumeration

      RTA review

      60

      0d1n

      Introduction

      0d1n is useful to perform brute-force login attempts for authentication forms. It can discover useful directory names by using a predefined list of paths. With options to use a random proxy per request and load CSRF tokens, it is a tool that can be used in different type of assignments.

      Project details

      0d1n is written in C.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Information gathering
        • Penetration testing
        • Security assessment
        • Vulnerability scanning

        0d1n review

        85

        Crowbar

        Introduction

        While most brute forcing tools take a similar approach, Crowbar can use different methods that are not always available in other utilities. For example, Crowbar can use SSH keys, instead of the typical username and password combination. This might be useful during penetration testing when these type of details are discovered.

        Project details

        Crowbar is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Penetration testing

          Crowbar review

          76

          dirsearch

          Introduction

          Dirsearch is a tool to guide security professionals to find possible information leaks or sensitive data. It does this by looking for directory and file names.

          Project details

          dirsearch is written in Python.

          Strengths and weaknesses

          • + More than 10 contributors
          • + More than 500 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Information gathering
            • Penetration testing
            • Security assessment

            dirsearch review

            85

            django-axes

            Introduction

            This tool may be used by developers that work with the Django framework. It adds a security layer on top of the application by looking at login attempts and track them.

            Project details

            django-axes is written in Python.

            Strengths and weaknesses

            • + More than 50 contributors
            • + The source code of this software is available

              Typical usage

              • Application security

              django-axes review

              89

              Fail2ban

              Introduction

              Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks

              Project details

              Fail2ban is written in Python.

              Strengths and weaknesses

              • + More than 2000 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Network traffic filtering
                • Security monitoring

                Fail2ban review

                64

                IKEForce

                Introduction

                IKEForce is a command line utility to brute force VPN connections (IPSEC) that allow group name/ID enumeration and XAUTH.

                Project details

                IKEForce is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  IKEForce review

                  56

                  John the Ripper

                  Introduction

                  John the Ripper is a mature password cracker to find weak or known passwords. It works on Linux and other flavors of Unix and Microsoft Windows.

                  Project details

                  84

                  Patator

                  Introduction

                  Patator is based on similar tools like Hydra, yet with the goal to avoid the common flaws these tools have like performance limitations. The tool is modular and supports different types of brute-force attacks or enumeration of information.

                  Project details

                  Patator is written in Python.

                  Strengths and weaknesses

                  • + More than 500 GitHub stars
                  • + The source code of this software is available

                    Typical usage

                    • Password discovery
                    • Penetration testing
                    • Reconnaissance
                    • Vulnerability scanning

                    Patator review

                    64

                    RouterSploit

                    Introduction

                    RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.

                    Project details

                    RouterSploit is written in Python.

                    Strengths and weaknesses

                    • + More than 50 contributors
                    • + More than 6000 GitHub stars
                    • + The source code of this software is available

                      Typical usage

                      • Penetration testing
                      • Self-assessment
                      • Software testing
                      • Vulnerability scanning

                      RouterSploit review

                      78

                      THC Hydra (thc-hydra)

                      Introduction

                      THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.

                      Project details

                      THC Hydra is written in C.

                      Strengths and weaknesses

                      • + More than 25 contributors
                      • + More than 1000 GitHub stars
                      • + Project is mature (10+ years)
                      • + The source code of this software is available

                        Typical usage

                        • Penetration testing
                        • Security assessment

                        THC Hydra review

                        60

                        Wfuzz

                        Introduction

                        Wfuzz is a fuzzing tool written in Python. Tools like Wfuzz are typically used to test web applications and how they handle both expected as unexpected input.

                        Project details

                        Wfuzz is written in Python.

                        Strengths and weaknesses

                        • + More than 1000 GitHub stars
                        • + The source code of this software is available

                          Typical usage

                          • Application fuzzing
                          • Application security
                          • Application testing
                          • Web application analysis

                          Wfuzz review

                          60

                          WPForce

                          Introduction

                          This toolkit is fairly new and consists of WPForce and Yertle. As the name implies, the first component has the focus on brute force attacking of login credentials. When admin credentials have been found, it is Yertle that allows uploading a shell. Yertle also has post-exploitation modules for further research.

                          Project details

                          WPForce is written in Python.

                          Strengths and weaknesses

                          • + The source code of this software is available
                          • - Full name of author is unknown

                          Typical usage

                          • Penetration testing
                          • Security assessment
                          • Vulnerability scanning

                          WPForce review

                          52

                          WPSeku

                          Introduction

                          With WPSeku a WordPress installation can be tested for the presence of security issues. Some examples are cross-site scripting (XSS), sql injection, and local file inclusion. The tool also tests for the presence of default configuration files. These files may reveal version numbers, used themes and plugins.

                          Project details

                          WPSeku is written in Python.

                          Strengths and weaknesses

                          • + The source code of this software is available
                          • - Unknown project license

                          Typical usage

                          • Penetration testing
                          • Security assessment
                          • Vulnerability scanning

                          WPSeku review

                          63

                          DNSChef

                          Introduction

                          DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.

                          Project details

                          64

                          DNSteal

                          Introduction

                          DNSteal allows you to extract files from a machine through DNS requests. This can be used to circumvent security measures and test them against data leakage. The tool supports compression and allows for multiple files to be transferred.

                          Project details

                          DNSteal is written in Python.

                          Strengths and weaknesses

                          • + More than 500 GitHub stars
                          • + The source code of this software is available
                          • - No releases on GitHub available
                          • - Full name of author is unknown

                          Typical usage

                          • Application security
                          • Data hiding

                          DNSteal review

                          64

                          QuickScan

                          Introduction

                          Although there are many port scanning utilities, sometimes it is specific functionality that makes a tool really powerful. For example, QuickScan saves the results of a scan, which then can be processed later for follow-up.

                          Project details

                          QuickScan is written in Python.

                          Strengths and weaknesses

                          • + Very low number of dependencies
                          • + The source code of this software is available
                          • - No releases on GitHub available
                          • - Full name of author is unknown

                          Typical usage

                          • Network scanning

                          QuickScan review

                          64

                          altdns

                          Introduction

                          Altdns is a security tool to discover subdomains. It generates permutations, alterations, and mutations of subdomains. The generated names can also be tested by performing DNS lookups. An enumeration tool like Altdns is useful during penetrating testing assignments.

                          Project details

                          altdns is written in Python.

                          Strengths and weaknesses

                          • + More than 500 GitHub stars
                          • + The source code of this software is available

                            Typical usage

                            • Reconnaissance
                            • Subdomain discovery
                            • Subdomain enumeration

                            altdns review

                            56

                            domain

                            Introduction

                            Domain is a Python script written by Jason Haddix to combine the tools Recon-ng and altdns. It allows to use the two tool one multiple domains within the same session.

                            Project details

                            domain is written in Python.

                            Strengths and weaknesses

                            • + More than 500 GitHub stars
                            • + The source code of this software is available
                            • - Unknown project license

                            Typical usage

                            • Subdomain enumeration

                            domain review

                            84

                            Sublist3r

                            Introduction

                            Sublist3r helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.

                            Project details

                            Sublist3r is written in Python.

                            Strengths and weaknesses

                            • + More than 2000 GitHub stars
                            • + The source code of this software is available

                              Sublist3r review

                              64

                              Th3inspector

                              Introduction

                              This tool can be called a true 'inspector tool' as it helps to discover many types of data.

                              • Website information
                              • Domain and subdomain information
                              • Mail server information and email
                              • Phone details
                              • IP addresses
                              • Detection of used CMS

                              Project details

                              Th3inspector is written in Perl.

                              Strengths and weaknesses

                              • + The source code of this software is available
                              • - No releases on GitHub available

                              Typical usage

                              • Discovery of sensitive information
                              • Information gathering

                              Th3inspector review

                              Some relevant tool missing as an alternative to aiodnsbrute? Please contact us with your suggestion.