You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+53-13Lines changed: 53 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,14 @@
8
8
9
9
# IPScope
10
10
11
-
A CLI tool written in pure Go for IP lookup and subdomain discovery. Designed for security researchers and network administrators to resolve IP addresses for TLDs and subdomains. Includes support for some reverse proxy and WAF detection.
11
+
A CLI tool written in pure Go for subdomain discovery and IP lookup. Designed for security researchers and network administrators to resolve IP addresses for TLDs and subdomains. Includes support for some reverse proxy and WAF detection.
12
12
13
-
IPScope was written as a capable, no-fuss alternative to more complex CLI tools commonly used for subdomain discovery and active DNS resolution. IPScope features a simple CLI that only requires one command-line argument, the target URL, while maintaining a powerful backend and optional command-line arguments for further customization. Since it's written in Go, there's no need to hunt down outdated or obscure Python / Ruby dependencies, and since it's written with ease of use in mind, there's no need to figure out complex command-line arguments -- **IPScope just works**.
13
+
IPScope was written as a capable, no-fuss alternative to more complex CLI tools commonly used for subdomain discovery and active DNS resolution. IPScope features a simple CLI that only requires one command-line argument, the target URL, while maintaining a powerful backend and optional command-line arguments for further customization. Since it's written in Go, there's no need to hunt down outdated or obscure Python / Ruby / Perl dependencies (we've all been there), and since it's written with ease of use in mind, there's no need to figure out complex command-line arguments -- **IPScope just works**.
14
14
15
15
### Usage Instructions:
16
16
Of course, don't run IPScope on domains you don't have permission to probe.
17
17
18
-
- Example Usage:
19
-
-`./ipscope.bin -url example.org`
18
+
-`./ipscope.bin -url example.org`
20
19
```
21
20
_
22
21
____ _ _ ____| | ___ ____ _____
@@ -25,25 +24,66 @@ Of course, don't run IPScope on domains you don't have permission to probe.
The `-dns` flag is useful for testing how a domain resolves with specific DNS servers, such as 1.1.1.1, 8.8.8.8, or DNS based filtering such as Cloudflare 1.1.1.3 or OpenDNS 208.67.222.222. It’s also great for testing locally hosted DNS servers like Pi-hole or pfSense.
66
+
Output redirected to file: output.txt
67
+
```
68
+
### Supported flags:
69
+
-`-url {foobar.com} (url to scan)`
70
+
-`-sub {subdirectory_file} (defaults to built-in list)`
71
+
-`-dns {dns_server} (defaults to 1.1.1.1)`
72
+
-`-json (outputs stdout to json format)`
73
+
-`-o {output_file} (redirects stdout to file)`
74
+
-`-help (prints usage instructions)`
75
+
-`-version (prints version info)`
76
+
77
+
The `-dns` flag is useful for testing how a domain resolves with a specific DNS server, such as 1.1.1.1, 8.8.8.8, or DNS based filtering such as Cloudflare 1.1.1.3 or OpenDNS 208.67.222.222. It’s also great for testing locally hosted DNS servers like Pi-hole or pfSense.
36
78
37
79
The tool can also be used with a custom subdomain list via the `-sub` flag to verify if known subdomains are resolving correctly through services like Cloudflare, or to check if they are leaking their host IP.
38
80
81
+
The `-json` flag will format stdout to json, while the `-o` flag will redirect stdout to file.
82
+
39
83
If neither the `-dns` nor `-sub` flags are given, the tool defaults to 1.1.1.1 and a built-in list of the top 10k common subdomains.
40
84
41
-
- Supported flags:
42
-
-`-url example.org (required)`
43
-
-`-sub subdomain.txt (optional, defaults to built-in list)`
- If you want the latest features, compiling from source is the best option since the release version may run several revisions behind the source code.
@@ -55,7 +95,7 @@ If neither the `-dns` nor `-sub` flags are given, the tool defaults to 1.1.1.1 a
0 commit comments