<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Alexandre Vandamme</title>
    <description>The latest articles on Forem by Alexandre Vandamme (@alexandre_vandamme_241212).</description>
    <link>https://forem.com/alexandre_vandamme_241212</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2137917%2F49cdd793-eb1a-4d8b-aa8f-2b8ca4451e58.png</url>
      <title>Forem: Alexandre Vandamme</title>
      <link>https://forem.com/alexandre_vandamme_241212</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/alexandre_vandamme_241212"/>
    <language>en</language>
    <item>
      <title>Why Domain Monitoring Is Essential for a Company</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Thu, 07 Aug 2025 03:45:03 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/why-domain-monitoring-is-essential-for-a-company-15kh</link>
      <guid>https://forem.com/alexandre_vandamme_241212/why-domain-monitoring-is-essential-for-a-company-15kh</guid>
      <description>&lt;p&gt;The security of corporate credentials has become a critical issue. Between data breaches, phishing attacks, and malware designed to harvest passwords, any undetected exposure can have disastrous consequences. To avoid data theft or account hijacking, establishing a domain-wide monitoring system is now indispensable.&lt;br&gt;
What LeakRadar Delivers&lt;br&gt;
Compromised-Credential Detection&lt;/p&gt;

&lt;p&gt;LeakRadar collects and analyzes billions of logs from a variety of sources—forums, the dark web, and more. By continuously watching your domain, the platform quickly pinpoints any credentials linked to your corporate email addresses.&lt;br&gt;
Real-Time Alerts&lt;/p&gt;

&lt;p&gt;The moment a new breach mentioning your domain is detected, you’re notified. This lets you act before an attacker can exploit the stolen information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API &amp;amp; Automation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With its API, organizations can plug monitoring directly into internal tools (SIEM, SOC solutions, and more). You can automate searches or generate regular security reports with ease.&lt;br&gt;
Why This Approach Matters&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Speed of Response: The sooner a leak is spotted, the faster you can take corrective measures—reset passwords, block compromised accounts, and so on.

Broader Visibility: Many breaches occur outside your own systems (third-party services, unsecured platforms). Domain monitoring dramatically expands your line of sight.

Risk Management: Knowing the nature and scope of exposures lets you prioritize actions and strengthen security policies (strong authentication, employee awareness).

Compliance: In certain industries, promptly detecting and reporting leaks is a regulatory requirement. Proactive monitoring helps you stay compliant.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Adopting a monitoring solution such as LeakRadar equips you to safeguard both your users and your business. By continuously watching over your domain, you stay a step ahead of cyber-criminals and dramatically reduce the potential impact of a data leak. It’s a strategic investment in the longevity and reputation of your company.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>tutorial</category>
      <category>productivity</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Prevent Account Fraud by Checking Leaked Credentials with LeakRadar.io</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Fri, 25 Jul 2025 05:48:01 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/prevent-account-fraud-by-checking-leaked-credentials-with-leakradario-3a2p</link>
      <guid>https://forem.com/alexandre_vandamme_241212/prevent-account-fraud-by-checking-leaked-credentials-with-leakradario-3a2p</guid>
      <description>&lt;p&gt;Most fraud starts with reused credentials. Malware like RedLine or Raccoon harvests logins from infected devices. These stealer logs are leaked online and later used for account takeovers.&lt;/p&gt;

&lt;p&gt;If your users or employees appear in those logs, your app is already vulnerable.&lt;br&gt;
✅ Proactive Protection with &lt;a href="https://leakradar.io" rel="noopener noreferrer"&gt;LeakRadar.io&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With over 4.7 billion leaked credentials indexed, LeakRadar helps you:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;    Search emails or domains instantly&lt;/li&gt;
&lt;li&gt;    Spot exposed accounts and force password resets&lt;/li&gt;
&lt;li&gt;    Get alerts via Slack, webhook, or Telegram (subscription required)&lt;/li&gt;
&lt;li&gt;    Automate everything with our REST API (API key required)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Try it: &lt;a href="https://leakradar.io" rel="noopener noreferrer"&gt;https://leakradar.io&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>infosec</category>
      <category>api</category>
      <category>automation</category>
    </item>
    <item>
      <title>Neutralize Stolen Passwords in 30 Minutes – LeakRadar.io</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Thu, 24 Jul 2025 07:18:18 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/neutralize-stolen-passwords-in-30-minutes-leakradario-cpb</link>
      <guid>https://forem.com/alexandre_vandamme_241212/neutralize-stolen-passwords-in-30-minutes-leakradario-cpb</guid>
      <description>&lt;p&gt;52 million fresh logins hit dark‑web markets every week . If you can spot yours first, attackers lose their advantage. Here’s the lightning‑fast workflow:&lt;/p&gt;

&lt;p&gt;Instant scan (5 min).&lt;br&gt;
    • Open &lt;a href="https://leakradar.io" rel="noopener noreferrer"&gt;LeakRadar&lt;/a&gt; → Domain Search → enter your‑company.com.&lt;br&gt;
    • Results appear in seconds—employees, customers, suppliers.&lt;/p&gt;

&lt;p&gt;Rapid reset (10 min).&lt;br&gt;
    • Export the CSV.&lt;br&gt;
    • Feed usernames to Okta / Azure AD; force password change + session revocation.&lt;br&gt;
    • One PowerShell or API call does the job.&lt;/p&gt;

&lt;p&gt;Always‑on defense (15 min).&lt;br&gt;
    • Add your domain to Monitoring; choose Slack / Webhook alerts.&lt;br&gt;
    • Enable Auto‑unlock so the clear‑text password lands right in the alert.&lt;br&gt;
    • LeakRadar ingests new stealer‑logs every 12 hours —you’ll know before attackers do.&lt;/p&gt;

&lt;p&gt;Act now: run a free domain scan on &lt;a href="https://leakradar.io" rel="noopener noreferrer"&gt;LeakRadar.io&lt;/a&gt; and shut down opportunistic logins before they start.&lt;/p&gt;

&lt;p&gt;Act now: run a free domain scan on LeakRadar.io and shut down opportunistic logins before they start.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>tutorial</category>
      <category>news</category>
      <category>programming</category>
    </item>
    <item>
      <title>Stop Employee Account Takeovers Before They Begin</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Tue, 22 Jul 2025 07:30:57 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/stop-employee-account-takeovers-before-they-begin-2kp5</link>
      <guid>https://forem.com/alexandre_vandamme_241212/stop-employee-account-takeovers-before-they-begin-2kp5</guid>
      <description>&lt;h2&gt;
  
  
  Why employee credential leaks are a ticking time-bomb ⚠️
&lt;/h2&gt;

&lt;p&gt;Info-stealer malware drops &lt;strong&gt;millions of clear-text usernames and passwords&lt;/strong&gt; on public forums and Telegram channels daily. The playbook for criminals is simple:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Buy&lt;/strong&gt; a dump that contains one of your employees’ logins.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reuse&lt;/strong&gt; the exposed password.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bypass MFA&lt;/strong&gt; with stolen session cookies.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Move laterally&lt;/strong&gt; through your network.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;LeakRadar solves the issue at its root.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;3 B+ credentials&lt;/strong&gt; already indexed, with new records ingested around the clock.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Domain, email, or keyword watches&lt;/strong&gt; with real-time alerts via Email, Slack, Telegram, or webhook.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filters&lt;/strong&gt; to zero in on employees, customers, or third parties.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Protect your domain in under 3 minutes 🚀
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Add a notification channel&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;code&gt;Monitoring → Notification methods → Create&lt;/code&gt;&lt;br&gt;&lt;br&gt;
Choose Email, Slack, Telegram, or Webhook. A test ping confirms delivery.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Select what to watch&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;code&gt;Monitored assets → New asset&lt;/code&gt;&lt;br&gt;&lt;br&gt;
&lt;em&gt;Type&lt;/em&gt;: &lt;code&gt;Domain&lt;/code&gt; — &lt;em&gt;Value&lt;/em&gt;: &lt;code&gt;acme.com&lt;/code&gt;&lt;br&gt;&lt;br&gt;
&lt;em&gt;Scope&lt;/em&gt;: All leaks, Employees, Customers, or Third parties.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;(Optional)&lt;/em&gt; &lt;strong&gt;Enable Auto-unlock&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Spend daily points so the clear-text credentials are included directly in every alert.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Example alert payloads 📬
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Auto-unlock ON&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"leaks"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"message"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"New leaks found for acme.com"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"unlocked_leaks"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"123"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"url"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"https://acme.com/leak/123"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"username"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"j.doe"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"password"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"password123"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"added_at"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;1744824404789&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Auto-unlock OFF&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"leaks"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"message"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"New leaks found for acme.com"&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You decide whether your SIEM/SOAR receives the full password or just the heads-up.&lt;/p&gt;




&lt;h2&gt;
  
  
  First actions to automate 🤖
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Employees&lt;/strong&gt; — Hit the IdP API (Okta, Azure AD, …) to &lt;em&gt;force-reset&lt;/em&gt; the password and revoke active sessions.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customers&lt;/strong&gt; — Bump the account’s risk score, mandate MFA, or trigger step-up verification.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Third parties&lt;/strong&gt; — Alert the vendor and pause their access until they remediate.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Try it free in 30 seconds 🆓
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Head to &lt;strong&gt;&lt;a href="https://leakradar.io" rel="noopener noreferrer"&gt;LeakRadar.io&lt;/a&gt;&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;Enter your corporate domain — no credit card required.
&lt;/li&gt;
&lt;li&gt;In seconds, see how many employee, customer, or supplier logins are already exposed.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Every password you fix today is one less breach tomorrow.&lt;/strong&gt; Run your free domain scan now.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;&lt;em&gt;Written by **Alexandre Vandamme&lt;/em&gt;**&lt;br&gt;&lt;br&gt;
&lt;em&gt;Follow me for more practical security guides and tooling deep dives.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>news</category>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Introducing SubdomainRadar.io: Your Comprehensive Solution for Subdomain Enumeration and Vulnerability Scanning</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Tue, 05 Nov 2024 00:18:11 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/introducing-subdomainradario-your-comprehensive-solution-for-subdomain-enumeration-and-vulnerability-scanning-15d8</link>
      <guid>https://forem.com/alexandre_vandamme_241212/introducing-subdomainradario-your-comprehensive-solution-for-subdomain-enumeration-and-vulnerability-scanning-15d8</guid>
      <description>&lt;p&gt;In the ever-evolving digital landscape, safeguarding your online assets is more important than ever. &lt;a href="https://subdomainradar.io" rel="noopener noreferrer"&gt;SubdomainRadar.io&lt;/a&gt; offers a comprehensive solution for subdomain enumeration, vulnerability scanning, and port scanning—all in one user-friendly platform.&lt;/p&gt;

&lt;p&gt;Why SubdomainRadar.io?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Efficient Subdomain Enumeration: Uncover all subdomains associated with your domain using advanced techniques. Start your scan now at SubdomainRadar.io.&lt;/li&gt;
&lt;li&gt;    Vulnerability Scanning: Identify and address security flaws before they become threats. Learn more about our scanning tools at SubdomainRadar.io.&lt;/li&gt;
&lt;li&gt;    Port Scanning: Detect open ports and services to strengthen your network security. Try it today at SubdomainRadar.io.&lt;/li&gt;
&lt;li&gt;    User-Friendly Interface: Navigate through our intuitive dashboard designed for both beginners and experts. Experience it firsthand at SubdomainRadar.io.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Get Started Today&lt;/p&gt;

&lt;p&gt;Don’t leave your digital assets unprotected. Visit SubdomainRadar.io to sign up for a free account and take control of your web security.&lt;/p&gt;

&lt;p&gt;For inquiries, contact us at &lt;a href="mailto:contact@subdomainradar.io"&gt;contact@subdomainradar.io&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>SubdomainRadar.io - Your Subdomain Finder &amp; Port Scanner</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Sat, 19 Oct 2024 13:47:20 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/subdomainradario-your-subdomain-finder-port-scanner-29id</link>
      <guid>https://forem.com/alexandre_vandamme_241212/subdomainradario-your-subdomain-finder-port-scanner-29id</guid>
      <description>&lt;p&gt;Looking for those hidden subdomains and checking which ports are open? &lt;a href="https://subdomainradar.io" rel="noopener noreferrer"&gt;SubdomainRadar.io&lt;/a&gt; is your go-to tool for fast, efficient subdomain discovery and port scanning.&lt;/p&gt;

&lt;p&gt;Sign up for free, grab 100 points, and start scanning in no time. Whether you’re after a quick overview or a deep dive into a domain’s substructure, SubdomainRadar.io has you covered. From Fast to Deep Scans, it finds all those forgotten subdomains others miss—and checks their ports to spot any open doors.&lt;/p&gt;

&lt;p&gt;Need automation? Use our easy API to integrate subdomain searches into your workflow. It’s as simple as plug-and-play with our Python wrapper.&lt;/p&gt;

&lt;p&gt;Why wait? Try SubdomainRadar.io today and uncover the hidden layers of the web! 🚀&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>security</category>
      <category>startup</category>
    </item>
    <item>
      <title>How I Made $6,200 in a Single Bug Bounty</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Fri, 11 Oct 2024 07:30:41 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/how-i-made-6200-in-a-single-bug-bounty-2mn9</link>
      <guid>https://forem.com/alexandre_vandamme_241212/how-i-made-6200-in-a-single-bug-bounty-2mn9</guid>
      <description>&lt;p&gt;Recently, I made $6,200 from a bug bounty thanks to SubdomainRadar.io. As a cybersecurity researcher, I often look for exposed subdomains that can reveal security vulnerabilities. Using SubdomainRadar.io, I performed a Deep Scan on a large platform and discovered several hidden subdomains that were publicly accessible and unprotected.&lt;/p&gt;

&lt;p&gt;After reporting the issue to the company, they recognized the critical nature of the vulnerability and rewarded me with $6,200.&lt;br&gt;
Why SubdomainRadar.io?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;    Deep Scans: It uncovers subdomains other tools miss.&lt;/li&gt;
&lt;li&gt;    API Integration: Easy to automate in my workflow.&lt;/li&gt;
&lt;li&gt;    Fast and Efficient: Gets results quickly, saving time.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you’re into bug bounty hunting or penetration testing, SubdomainRadar.io is a must-have tool that can help you discover more vulnerabilities and increase your chances of earning bigger rewards.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>productivity</category>
      <category>security</category>
      <category>testing</category>
    </item>
    <item>
      <title>Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python</title>
      <dc:creator>Alexandre Vandamme</dc:creator>
      <pubDate>Sat, 28 Sep 2024 06:40:04 +0000</pubDate>
      <link>https://forem.com/alexandre_vandamme_241212/discover-hidden-subdomains-effortlessly-with-subdomainradario-and-python-90d</link>
      <guid>https://forem.com/alexandre_vandamme_241212/discover-hidden-subdomains-effortlessly-with-subdomainradario-and-python-90d</guid>
      <description>&lt;p&gt;As a &lt;strong&gt;cybersecurity professional&lt;/strong&gt;, &lt;strong&gt;bug bounty hunter&lt;/strong&gt;, or &lt;strong&gt;penetration tester&lt;/strong&gt;, discovering hidden subdomains is critical for identifying potential vulnerabilities in a domain. Subdomains often host forgotten services or test environments that might be vulnerable to attacks. &lt;/p&gt;

&lt;p&gt;In this post, I’ll introduce you to &lt;strong&gt;SubDomainRadar.io&lt;/strong&gt; and its &lt;strong&gt;Python API wrapper&lt;/strong&gt; — the ultimate tool for &lt;strong&gt;automating subdomain enumeration&lt;/strong&gt; and &lt;strong&gt;reverse searches&lt;/strong&gt; in your security workflows.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why SubDomainRadar.io?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;SubDomainRadar.io&lt;/strong&gt; stands out because it uses &lt;strong&gt;over 40 private data sources&lt;/strong&gt; to deliver a comprehensive subdomain discovery experience. Whether you need to run &lt;strong&gt;fast, deep, or reverse searches&lt;/strong&gt;, this tool will help you find more subdomains than ever before.&lt;/p&gt;

&lt;p&gt;Plus, with the &lt;strong&gt;SubDomainRadar Python library&lt;/strong&gt;, you can easily integrate these powerful capabilities into your own projects and scripts.&lt;/p&gt;

&lt;h3&gt;
  
  
  Features of the Python Wrapper
&lt;/h3&gt;

&lt;p&gt;With the &lt;strong&gt;SubDomainRadar Python API wrapper&lt;/strong&gt;, you can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Perform reverse searches&lt;/strong&gt; on subdomains based on keywords&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enumerate domains&lt;/strong&gt; with varying search depth (Fast, Medium, Deep)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Retrieve excluded domains and TLDs&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Getting Started
&lt;/h3&gt;

&lt;p&gt;To get started with the &lt;strong&gt;SubDomainRadar Python wrapper&lt;/strong&gt;, you’ll need to install it via &lt;code&gt;pip&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;subdomainradar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once installed, you can start discovering subdomains with just a few lines of code!&lt;/p&gt;

&lt;h3&gt;
  
  
  Basic Usage Example
&lt;/h3&gt;

&lt;p&gt;Here’s how to use the SubDomainRadar API to perform subdomain enumeration on a list of domains:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;subdomainradar&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;SubdomainRadarAPI&lt;/span&gt;

&lt;span class="c1"&gt;# Initialize the API client
&lt;/span&gt;&lt;span class="n"&gt;api&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;SubdomainRadarAPI&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;base_url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;https://api.subdomainradar.io&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;api_key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;YOUR_API_KEY&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Enumerate subdomains for a list of domains
&lt;/span&gt;&lt;span class="n"&gt;domains&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;tesla.com&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;google.com&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;results&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;api&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;enumerate_domains_with_results&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;domains&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;domains&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;group&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Fast&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Print the results
&lt;/span&gt;&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;domain&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;results&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;items&lt;/span&gt;&lt;span class="p"&gt;():&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Domain: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;domain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Task ID: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;task_id&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Status: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;status&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Total Subdomains Found: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;total_subdomains&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Subdomains:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;subdomains&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;[]):&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;  - Subdomain: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;subdomain&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;    IP: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;ip&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;    Country: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;country&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;No Country Info&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;    Reverse DNS: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;reverse_dns&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;[])&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;WHOIS Information:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;whois_info&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;whois&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;{})&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;  Registrar: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;whois_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;registrar&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;  Creation Date: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;whois_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;creation_date&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;  Expiration Date: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;whois_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;expiration_date&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;  Nameservers: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;whois_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;nameservers&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In this example, we’re running a &lt;strong&gt;Fast&lt;/strong&gt; enumeration search that quickly returns subdomains for the domains “tesla.com” and “google.com.” You can switch to &lt;strong&gt;Deep&lt;/strong&gt; or &lt;strong&gt;Medium&lt;/strong&gt; searches depending on how thorough you need to be.&lt;/p&gt;

&lt;h3&gt;
  
  
  Reverse Subdomain Search
&lt;/h3&gt;

&lt;p&gt;One of the coolest features of SubDomainRadar.io is the ability to run &lt;strong&gt;reverse searches&lt;/strong&gt;. If you’re looking for subdomains related to a specific keyword or part of a domain, this feature comes in handy.&lt;/p&gt;

&lt;p&gt;Here’s how to run a reverse search using the Python wrapper:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Perform a reverse search
&lt;/span&gt;&lt;span class="n"&gt;results&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;api&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;reverse_search&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;subdomain_part&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;api&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;domain_part&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;car&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;tld_part&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;com&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;results&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;subdomains&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]:&lt;/span&gt;
    &lt;span class="n"&gt;subdomain&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;subdomain&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;domain&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;domain&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;tld&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;tld&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;timestamp&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;subdomain_info&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;timestamp&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;subdomain&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="n"&gt;complete_subdomain&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;.&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;domain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;.&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;tld&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
    &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="n"&gt;complete_subdomain&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;domain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt;.&lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;tld&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;

    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Complete Subdomain: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;complete_subdomain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Subdomain: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;subdomain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Domain: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;domain&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;TLD: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;tld&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Timestamp: &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;timestamp&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This allows you to find subdomains based on keywords or specific patterns, making it easier to locate targeted assets.&lt;/p&gt;

&lt;h3&gt;
  
  
  Try It Out Today!
&lt;/h3&gt;

&lt;p&gt;If you’re looking for an effective, easy-to-use tool to discover &lt;strong&gt;all subdomains&lt;/strong&gt; of a website, give &lt;strong&gt;SubDomainRadar.io&lt;/strong&gt; a try. The &lt;strong&gt;SubDomainRadar Python wrapper&lt;/strong&gt; makes it even easier to integrate subdomain discovery into your security workflow.&lt;/p&gt;

&lt;p&gt;Ready to get started? Install the wrapper via pip and unlock the full power of SubDomainRadar.io today!&lt;/p&gt;

</description>
      <category>security</category>
      <category>python</category>
      <category>development</category>
    </item>
  </channel>
</rss>
