What is Sublist3r?

Sublist3r is a fast and open-source subdomain enumeration tool written in Python. It's commonly used in the reconnaissance phase of ethical hacking to discover subdomains of a target domain using OSINT (Open Source Intelligence).

🚀 Key Features

💻 Installation Guide

# Clone the repository
git clone https://github.com/aboul3la/Sublist3r.git

# Navigate into the directory
cd Sublist3r

# Install the required packages
pip install -r requirements.txt

Note: Ensure you have Python 2.7 or Python 3+ and pip installed.

🛠️ How to Use Sublist3r

Basic syntax:

python sublist3r.py -d example.com

Examples:

  • python sublist3r.py -d target.com -o subdomains.txt → Saves the results to a file
  • python sublist3r.py -d example.com -p 80,443 → Launches port scan on discovered subdomains
  • python sublist3r.py -d example.com -v → Enables verbose mode to see real-time progress

📡 Advanced Usage

Sublist3r can be combined with other tools like Amass, Assetfinder, or DNS resolvers to verify and expand subdomain results.

Example chaining with DNS resolution:

python sublist3r.py -d example.com -o domains.txt
cat domains.txt | dnsx -silent -a -resp

💡 Practical Tips & Insights

🌐 Real-World Use Case

During a bug bounty assessment, a researcher used Sublist3r to discover dev.target.com — a forgotten development server running outdated software with default credentials, resulting in critical RCE vulnerability. Subdomain enumeration often reveals the weakest entry point.

📚 Further Reading & Tools