puredns

puredns

1871 Stars

Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.

d3mondev
May 25, 2025
1871 stars
Category
Bug-bounty
GitHub Stars
1871
Project Added On
May 25, 2025
Contributors
1

Fast domain resolver and subdomain bruteforcing with accurate wildcard filtering
Getting Started »

Usage · How it works · Sponsorship · FAQ

About

puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.

It uses massdns, a powerful stub DNS resolver, to perform bulk lookups. With the proper bandwidth and a good list of public resolvers, it can resolve millions of queries in just a few minutes. Unfortunately, the results from massdns are only as good as the answers provided by the public resolvers. The results are often polluted by wrong DNS answers and false positives from wildcard subdomains.

puredns solves this with its wildcard detection algorithm. It can filter out wildcards based on the DNS answers obtained from a set of trusted resolvers. It also attempts to work around DNS poisoning by validating the answers obtained using those trusted resolvers.

Think this is useful? :star: Star us on GitHub — it helps!

puredns terminal

Features

  • Resolve thousands of DNS queries per second using massdns and a list of public DNS resolvers
  • Bruteforce subdomains using a wordlist and root domains
  • Clean wildcards and detect wildcard roots using the minimal number of queries to ensure precise results
  • Circumvent DNS load-balancing during wildcard detection
  • Validate that the results are free of DNS poisoning by running against a list of known, trusted resolvers
  • Save a list of valid domains, wildcard subdomain roots, and a clean massdns output containing only the valid entries
  • Read a list of domains or words from stdin and enable quiet mode for easy integration into custom automation pipelines

Sponsorship

If my work is earning you money, consider becoming a sponsor! You can earn some unique perks!

It would also mean A WHOLE LOT ❤️ as it would allow me to continue working for free for the community. But no matter what you do, rest assured that my software will remain free and open-source for you to use.

Getting Started

Prerequisites

massdns

Puredns requires massdns on the host machine. If the path to the massdns binary is present in the PATH environment variable, puredns will work out of the box. A good place to copy the massdns executable is /usr/local/bin on most systems. Otherwise, you will need to specify the path to the massdns binary file using the --bin command-line argument.

The following should work on most Debian based systems. Follow the official instructions for more information.

git clone https://github.com/blechschmidt/massdns.git
cd massdns
make
sudo make install

List of public DNS resolver servers

You need to obtain a list of public DNS servers in order to use puredns. Refer to the FAQ to learn how to curate your own list of working servers.

Installation

You can download a binary release.

Alternatively, you can compile the latest version easily. First make sure that Go is installed on your system - the last two major releases of Go are supported. Refer to the official Go installation page for installation instructions. Then run the following command:

go install github.com/d3mondev/puredns/v2@latest

Usage

Make sure to view the complete list of available commands and options using puredns --help.

If a resolvers.txt file exists in the current working directory, puredns will default to using it. Otherwise, if either ~/.config/puredns/resolvers.txt or ~/.config/puredns/resolvers-trusted.txt files are present, puredns will automatically utilize them as resolvers. If none of these options are available, specify the resolvers to use with the –resolvers and –resolvers-trusted arguments.

Specifying trusted resolvers is optional. By default, puredns will simply use 8.8.8.8 and 8.8.4.4.

Subdomain bruteforcing

Here’s how to bruteforce a massive list of subdomains using a wordlist named all.txt:

puredns bruteforce all.txt domain.com

You can also bruteforce multiple domains at once with the -d option to load a text file containing domains instead of specifying a single domain as an argument:

puredns bruteforce all.txt -d domains.txt

Resolving a list of domains

You can also resolve a list of domains contained in a text file (one per line).

puredns resolve domains.txt

Stdin operation

You can pass the list of domains to resolve through stdin:

cat domains.txt | puredns resolve

Or a list of words to use for bruteforcing:

cat wordlist.txt | puredns bruteforce domain.com

You can also add the -q switch to output only the domains found to pipe to other tools:

cat domains.txt | puredns resolve -q | httprobe

Saving the results to files

You can save the following information to files to reuse it in your workflows:

  • domains: clean list of domains that resolve correctly
  • wildcard root domains: list of the wildcard root domains found (i.e., *.store.yahoo.com)
  • massdns results file (-o Snl text output): can be used as a reference and to extract A and CNAME records.
puredns resolve domains.txt --write valid_domains.txt \
                            --write-wildcards wildcards.txt \
                            --write-massdns massdns.txt

How it works

puredns in operation

You can see puredns in action against the domain google.com using a small wordlist of the 100k most common subdomains in the image above.

As part of its workflow, puredns performs three steps automatically:

  1. Mass resolve using public DNS servers
  2. Wildcard detection
  3. Validation

1. Mass resolve using public DNS servers

Using massdns, puredns will perform a mass resolve of all the domains and subdomains. It feeds the data to massdns through stdin, which allows it to throttle the number of queries per second if needed and perform basic sanitization on the list of domains generated.

By default, the input domains are set to lowercase, and only entries containing valid characters are accepted (essentially [a-z0-9.-]). You can disable this with the --skip-sanitize flag.

After this step, the results are usually polluted: some public resolvers will send back bad answers, and wildcard subdomains can quickly inflate the results.

2. Wildcard detection

Puredns then uses its wildcard detection algorithm to detect and extract all the wildcard subdomain roots from the massdns results file.

It will use the massdns output from step 1 as a DNS cache to minimize the number of queries it needs to perform. To ensure precise results, it may have to validate the cache results by performing a DNS query.

You can skip this step using the --skip-wildcard flag.

3. Validation

To protect against DNS poisoning, puredns uses massdns one last time to validate the remaining results using trusted DNS resolvers. Currently, the internal trusted resolvers used are 8.8.8.8 and 8.8.4.4. This step is done at a slower pace to avoid hitting any rate limiting on the trusted resolvers.

You can skip this step using the --skip-validation flag.

At this point, the resulting files should be clean of wildcard subdomains and DNS poisoned answers.

FAQ

How do I get resolvers for use with puredns?

Trickest maintains a list of valid resolvers here: https://github.com/trickest/resolvers

Alternatively, you can obtain a list of public resolvers from public-dns.info, then use the DNS Validator project to keep only resolvers that provide valid answers.

If your public resolvers provide incorrect information to puredns, for example by sending back poisoned replies, some subdomains can be missed as they will get filtered out. Hint: Avoid resolvers from countries that censor the internet, like China.

Once you have a list of custom resolvers, you can pass them to puredns with the -r argument or by placing them in a file located at ~/.config/puredns/resolvers.txt:

puredns resolve domains.txt -r resolvers.txt

The default trusted resolvers are currently 8.8.8.8 and 8.8.4.4. If you do want to change them, you can also specify a custom list with the --resolvers-trusted argument or by placing them in a file located at ~/.config/puredns/resolvers-trusted.txt. I have done many tests to find the best possible trusted resolvers for pur

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

d3mondev

Project Added On

May 25, 2025

License

Open Source

Tags

bugbounty dns dns-bruteforcer dns-lookup dns-resolution dns-resolver hacking massdns recon subdomain subdomain-bruteforcing