.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.16. .TH FINDOMAIN "1" "December 2020" "findomain 2.1.5" "User Commands" .SH NAME findomain \- manual page for findomain 2.1.5 .SH DESCRIPTION findomain 2.1.5 Eduard Tolosa The fastest and cross\-platform subdomain enumerator, do not waste your time. .SS "USAGE:" .IP findomain [FLAGS] [OPTIONS] .SS "FLAGS:" .TP \fB\-x\fR, \fB\-\-as\-resolver\fR Use Findomain as resolver for a list of domains in a file. .TP \fB\-\-check\-updates\fR Check for available Findomain updates. .TP \fB\-\-enable\-dot\fR Enable DNS over TLS for resolving subdomains IPs. .TP \fB\-\-aempty\fR Send alert to webhooks still when no new subdomains have been found. .TP \fB\-h\fR, \fB\-\-help\fR Prints help information .TP \fB\-i\fR, \fB\-\-ip\fR Show/write the ip address of resolved subdomains. .TP \fB\-\-ipv6\-only\fR Perform a IPv6 lookup only. .TP \fB\-m\fR, \fB\-\-monitoring\-flag\fR Activate Findomain monitoring mode. .TP \fB\-\-no\-wildcards\fR Disable wilcard detection when resolving subdomains. .TP \fB\-o\fR, \fB\-\-output\fR Write to an output file. The name of the output file will be the target string with TXT format. .TP \fB\-\-query\-database\fR Query the findomain database to search subdomains that have already been discovered. .TP \fB\-q\fR, \fB\-\-quiet\fR Remove informative messages but show fatal errors or subdomains not found message. .TP \fB\-r\fR, \fB\-\-resolved\fR Show/write only resolved subdomains. .TP \fB\-V\fR, \fB\-\-version\fR Prints version information .SS "OPTIONS:" .HP \fB\-c\fR, \fB\-\-config\fR .IP Use a configuration file. The default configuration file is findomain and the format can be toml, json, hjson, ini or yml. .HP \fB\-\-resolvers\fR ... .IP Path to a file (or files) containing a list of DNS IP address. If no specified then 1.5k of built\-in valid DNS servers from public\-dns.info are used. .HP \fB\-\-exclude\-sources\fR ... .IP Exclude sources from searching subdomains in. [possible values: certspotter, crtsh, virustotal, sublist3r, facebook, spyse, bufferover, threatcrowd, virustotalapikey, anubis, urlscan, securitytrails, threatminer, archiveorg, c99] .TP \fB\-f\fR, \fB\-\-file\fR ... Use a list of subdomains writen in a file as input. .HP \fB\-\-import\-subdomains\fR ... .IP Import subdomains from one or multiple files. Subdomains need to be one per line in the file to import. .TP \fB\-\-postgres\-database\fR Postgresql database. .TP \fB\-\-postgres\-host\fR Postgresql host. .TP \fB\-\-postgres\-password\fR Postgresql password. .TP \fB\-\-postgres\-port\fR Postgresql port. .TP \fB\-\-postgres\-user\fR Postgresql username. .TP \fB\-t\fR, \fB\-\-target\fR Target host. .TP \fB\-\-threads\fR Number of threads to use to perform subdomains resolution. .HP \fB\-u\fR, \fB\-\-unique\-output\fR .IP Write all the results for a target or a list of targets to a specified filename. .HP \fB\-w\fR, \fB\-\-wordlist\fR .IP Wordlist file to use in the bruteforce process. Using it option automatically enables bruteforce mode. .SH "SEE ALSO" The full documentation for .B findomain is maintained as a Texinfo manual. If the .B info and .B findomain programs are properly installed at your site, the command .IP .B info findomain .PP should give you access to the complete manual.