├── README.md ├── convert_d2ip.sh └── LICENSE /README.md: -------------------------------------------------------------------------------- 1 | ![alt text](https://i.imgur.com/79dnspw.png) 2 | 3 | 4 | # Domain2IP-Converter 5 | Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty 6 | 7 | # Install 8 | 9 | git clone https://github.com/blackhatethicalhacking/Domain2IP-Converter.git 10 | 11 | cd convert_d2ip 12 | 13 | chmod +x convert_d2ip.sh 14 | 15 | ./convert_d2ip.sh 16 | 17 | # Usage 18 | 19 | Usage: ./convert_d2ip.sh [domain-list-file] [output-file] 20 | 21 | Written by Black Hat Ethical Hacking 22 | www.blackhatethicalhacking.com 23 | 24 | 25 | 26 | 27 | 28 | -------------------------------------------------------------------------------- /convert_d2ip.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Written by SaintDrug for Black Hat Ethical Hacking - 2021 Copyrights All Rights Reserved 3 | # With this script, you can convert domain lists to resolved IP lists without duplicates. 4 | # Usage: ./convert_d2ip.sh [domain-list-file] [output-file] 5 | 6 | 7 | 8 | figlet Black Hat Ethical Hacking 9 | echo -e "[+] Convert Domain 2 IP without Duplicates by SaintDruG\n" 10 | if [ -z "$1" ] || [ -z "$2" ]; then 11 | echo "[!] Usage: ./convert_d2ip.sh [domain-list-file] [output-file]" 12 | exit 1 13 | fi 14 | echo "[+] Resolving domains to IPs Just Chill a bit..." 15 | while read d || [[ -n $d ]]; do 16 | ip=$(dig +short $d|grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1) 17 | if [ -n "$ip" ]; then 18 | echo "[+] '$d' => $ip" 19 | echo $ip >> $2 20 | else 21 | echo "[!] '$d' => [RESOLVE ERROR]" 22 | fi 23 | done < $1 24 | echo -e "\n[+] Removing duplicates...Told ya ;)" 25 | sort $2 | uniq > $2.new 26 | mv $2.new $2 27 | echo -e "\n[+] Done You can Light one up, IPs saved to '$2'." 28 | figlet Security is a myth.. 29 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2021 Black Hat Ethical Hacking 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | --------------------------------------------------------------------------------