Getting started
Knowledge hub
- Overview
-
-
- 34 M Wordlist Subdomain Brute Force
- Asn Based Network Scan
- Asset Discovery and Vulnerability Scanning
- Custom Subdomain Brute Force Wordlist From Ip Ranges
- Enumerate Cloud Resources
- Full Subdomain Enumeration
- Get Ips and Cnames
- Getdns
- Github Recon and Scanner
- Hostnames S3 Bucket Finder
- Simple Content Discovery
-
-
- amass
- anew
- apkurlgrep
- assetfinder
- cent
- cero
- cewl
- cloudenum
- crosslinked
- dnsdumpster-dns-lookup
- dnsdumpster-host-search
- dnstwist
- dnsvalidator
- dsieve
- dumpsterdiver
- eyeballer
- ffuf
- find-gh-poc
- findomain
- gau
- generate-yaml-report
- get-asn-prefixes
- get-trickest-output
- gf
- github-subdomains
- goaltdns
- gospider
- gotator
- hakcheckurl
- httprobe
- httpx
- infoga
- ipinfo
- jldc-subdomains
- katana
- mapcidr
- mass-linkfinder
- masscan
- massdns
- meg
- mksub
- naabu
- notify
- nrich
- nuclei
- oneforall
- puredns
- pymeta
- s3scanner
- securitytrails-subdomains
- spiderfoot
- sslyze
- subdomainizer
- subfinder
- tlsx
- uncover
- unfurl
- uro
- vita
- webanalyze-1
- webanalyze
- x8
Tutorials
- Creating a Workflow
- Downloading a Result
- Executing a Workflow
- How Do Machines Work
- Keeping Track of a Run
- Navigating in Workflow Editor
- Overview
- Saving a Workflow and History
- Scheduling a Workflow
- Using Workflows From Library
Concepts
puredns
Usage
This tool can be used for solving following use cases:
-
Subdomain bruteforcing
-
Resolving a list of domains
Subdomain Bruteforcing Usage
Values for following puredns inputs should be provided:
mode
input - setbruteforce
String value as given input’s valuedomain
input - set a domain as a target to bruteforce on, e.g. trickest.comwordlist
input - set your wordlist file for generating subdomain combinations for a given domainresolvers
input - set a file containing a list of public DNS resolvers. In following example we’re using our sample - feel free to try it put.resolvers-trusted
input - optionally set a file containing a list of trusted public DNS resolvers, in order to validate previous resolved subdomains. In following example we’re using our sample - feel free to try it put.
Here’s how to set up puredns to bruteforce a massive list of subdomains for trickest.com
target, using a wordlist named shubs-subdomains.txt
:

Puredns inputs setup for Subdomain Bruteforcing mode
Domains Resolving Usage
Values for following puredns inputs should be provided:
mode
input - setresolve
String value as given input’s valuewordlist
input - set a file containing a list of domains as a target to resolveresolvers
input - set a file containing a list of public DNS resolvers. In following example we’re using our sample - try it out by setting its raw URL as an input’s value.resolvers-trusted
input - set a file containing a list of trusted public DNS resolvers, in order to validate previous resolved subdomains. In following example we’re using our sample - try it out by setting its raw URL as an input’s value.
Here’s how to set up puredns to resolve a list of domains contained in domains.txt
file:

Puredns inputs setup for Domains Resolving mode
Notable Workflows
- Asset Discovery & Vulnerability Scanning (Domains Resolving mode)
- Github Recon & Scanner (Domains Resolving mode)
- 34 M Wordlist Subdomain Brute-Force (Domains Resolving mode)
- Full Subdomain Enumeration (Domains Resolving mode)
Get a Video Demo
Fill out and submit this form to receive an in-depth video demo of the Trickest platform.
Talk To Sales
Fill out the form and we'll get back to you about any questions you have on our products, services, pricing, or scheduling a demo.