Skip to content

Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and security researchers.

Notifications You must be signed in to change notification settings

WHOISshuvam/gotld

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

gotld

Enumerate all possible root domains of any organization on the fly ✨

Installation 📩

  • Using go ( Assuming you have set $GOPATH)
$ go install github.com/WHOISshuvam/gotld@latest
  • From source
$ git clone --depth=1 https://github.com/WHOISshuvam/gotld 
$ cd gotld
$ go build . 

Usages 💡

  • Help Menu ( No arguments )

  • default scans ( No custom keywords)
$ gotld -k <keyword> -o <output>

  • User defined custom wordlist file
$ gotld -k <keyword> -f <wordlist>  -o <output>

  • Number of threads to use (default 5)
$ gotld -k <keyword> -t <number of threads> -o <output>

Thanks 🌺

Thanks to pwnwriter for code/ui improvement and custom wordlist options.

About

Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and security researchers.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages