Version: 3.1
Author: Mayank Chaubey
Welcome to the Elite DNS Reconnaissance Suite! This powerful Bash script is your all-in-one tool for advanced DNS enumeration, subdomain discovery, threat intelligence, and more. Designed for security researchers and penetration testers, it leverages a suite of open-source tools to uncover hidden details about domains and IPs. π
The Elite DNS Reconnaissance Suite is a feature-rich script that automates DNS reconnaissance tasks with a sleek, terminal-based UI. Whether you're bruteforcing subdomains, testing zone transfers, or monitoring the dark web, this tool has you covered. Itβs built with modularity, robust error handling, and colorful output to make your recon adventures both effective and enjoyable! π¨
- π Advanced DNS Enumeration: Dig deep into DNS records with
dnsenum. - π Subdomain Bruteforcing: Discover subdomains using
massdnsandaltdnswith multiple techniques. - π΅οΈββοΈ Search Engine Recon: Harvest data from search engines with
theHarvester. - π WHOIS & Network Analysis: Retrieve domain/IP ownership details.
- π Reverse DNS Lookup: Map IPs back to domains using
dig. - π‘ DNS Zone Transfer Testing: Check for misconfigured servers with
dnsrecon. β οΈ Threat Intelligence Lookup: Query AbuseIPDB (or fallback to WHOIS) for IP reputation.- π Dark Web Monitoring: Search the dark web via Tor (experimental).
- π€ AI-Assisted Analysis: Basic pattern matching on reports (expandable to real AI).
- π Reporting & Visualization: Summarize findings with simple stats.
- βοΈ Configuration: Customize DNS servers and thread counts.
- π§ Linux system (Ubuntu/Debian recommended)
- π Root privileges (some features require
sudo) - π Internet connection (for threat intel and dark web features)
Install the required tools with:
sudo apt update
sudo apt install dnsenum dnsutils whois parallel subfinder amass massdns dnsrecon sublist3r knockpy theharvester curl torFor altdns:
git clone https://github.com/infosec-au/altdns.git
cd altdns
pip install -r requirements.txt- Clone or download this repository:
git clone https://github.com/Mayank-Chaubey/Advance_dnsenum.git cd elite-dns-recon - Make the script executable:
chmod +x dnsenum_6v.sh
Run the script with:
sudo ./dnsenum_6v.sh- π₯οΈ Launch the script to see the main menu.
- π’ Select an option (1-12) to start a recon module.
- π Follow the prompts to input targets (domains/IPs) and options.
- π Results are saved in
~/elite_dns_reports/.
To enumerate DNS records for example.com:
- Select 1) Advanced DNS Enumeration
- Enter
example.com - Choose DNS server (e.g., Cloudflare: 1)
- Set threads and output format
- Watch the magic happen! β¨
Edit settings via the Configuration menu (option 11):
- π Update DNS servers (default:
1.1.1.1,8.8.8.8,9.9.9.9) - π§΅ Adjust thread count (max: your CPU cores)
For Threat Intelligence:
- Add an AbuseIPDB API key to
/etc/elite_dns_recon/api_keys.conf:echo "ABUSEIPDB_API_KEY=your_key_here" | sudo tee -a /etc/elite_dns_recon/api_keys.conf
Subdomain Bruteforcing in Action
Feel free to fork, tweak, and submit pull requests! Issues and feature requests are welcome too. Letβs make this tool even better together! π
This project is licensed under the MIT License - see the LICENSE file for details.
β οΈ Use responsibly and only on targets you have permission to test.- π Dark Web Monitoring requires Tor and may not always return results due to network variability.
- π€ AI Analysis is basic; contributions to integrate real ML models are appreciated!
Happy reconning! πβ¨

