What Sources Does Our Subdomain Enumeration Tool Include?

What Sources Does Our Subdomain Enumeration Tool Include?
What Sources Does Our Subdomain Enumeration Tool Include?

A common question asked by many people who are interested in our ASM Solution is "What Sources Does Our Subdomain Enumeration Tool Include?".

In this article you'll find a comprehensive list of all the sources we use to deliver you the most result for your subdomain enumeration scan.


In Short:

  • SSL Certificate Logs
  • HTTP Response (Headers & Body)
  • Private Vault by Nova Security
  • DNS Queries (Zone Transfers, etc.)
  • DNS/Subdomain Bruteforcing
  • Internet Archives
  • Google Tag Manager
  • GitHub (optional)
  • Shodan (optional)
  • Security Trails (optional)
  • Virus Total (optional)
ℹ️
Optional sources are only used if a valid API key has been supplied.

More sources and methods will be included (such as bruteforcing) with the aim to find as much data about a target as possible as development on Nova Security progresses.

The #1 Web App Pentesting Platform Favored by Pentesting Agencies Across the US

Comes Included With a an Reconnaissance Framework to Monitor Your Targets Daily!

Try a Quick Demo →

Read more

3 Main Ways To Use BLACKBIRD Pentesting Suite To Find More Vulnerabilities

3 Main Ways To Use BLACKBIRD Pentesting Suite To Find More Vulnerabilities

1) Automated Vulnerability Scanner The core of BLACKBIRD is its comprehensive automated scanning capabilities. Unlike traditional vulnerability scanners that generate excessive noise, BLACKBIRD's intelligent automation helps you: * Scan multiple targets simultaneously * Reduce false positives * Focus on high-impact vulnerabilities * Generate detailed, actionable reports 💡RECOMMENDATION: Paste in URLs you'

By BLACKBIRD Technologies