mirror of
https://github.com/jakejarvis/subtake.git
synced 2025-09-15 20:55:32 -04:00
Update README.md
This commit is contained in:
@@ -41,7 +41,7 @@ After generating a list of all vulnerable subdomains, you can use my [collection
|
|||||||
|
|
||||||
### Examples
|
### Examples
|
||||||
|
|
||||||
`./sonar.sh 2018-10-27-1540655191-fdns_cname.json.gz sonar_all_cnames.txt`
|
`./sonar.sh 2018-10-27-1540655191 sonar_all_cnames.txt`
|
||||||
|
|
||||||
`subtake -f sonar_all_cnames.txt -t 50 -ssl -a -o vulnerable.txt`
|
`subtake -f sonar_all_cnames.txt -t 50 -ssl -a -o vulnerable.txt`
|
||||||
|
|
||||||
@@ -80,4 +80,4 @@ After generating a list of all vulnerable subdomains, you can use my [collection
|
|||||||
|
|
||||||
- Integrate `sonar.sh` into the main Go script as an option instead of input file.
|
- Integrate `sonar.sh` into the main Go script as an option instead of input file.
|
||||||
- All-in-one Docker image to automatically download the latest FDNS Project Sonar file and check for takeover possibilities.
|
- All-in-one Docker image to automatically download the latest FDNS Project Sonar file and check for takeover possibilities.
|
||||||
- Have `sonar.sh` pull domains to check for from `fingerprints.json`, instead of hard-coding them.
|
- Have `sonar.sh` pull domains to check for from `fingerprints.json`, instead of hard-coding them.
|
||||||
|
Reference in New Issue
Block a user