.\" Text automatically generated by txt2man .TH dnsmap-bulk 1 "18 Nov 2019" "dnsmap-bulk-0.1" "mass scan using dnsmap" .SH NAME \fBdnsmap-bulk \fP- mass scan using dnsmap \fB .SH SYNOPSIS .nf .fam C \fBdnsmap-bulk\fP [\fIresults-path\fP] .fam T .fi .fam T .fi .SH DESCRIPTION \fBdnsmap-bulk\fP is used to bruteforce several target domains in bulk fashion. In other words, is possible get a list of domains from a file to scan multiple targets using dnsmap as backend. .PP WARNING: using \fBdnsmap-bulk\fP, dnsmap will always use the default options, i.e. built-in wordlist, delay = 10 ms, never ignoring IPs. .SH OPTIONS .TP .B domain-file A file with domains to be scanned, one per line. .TP .B \fIresults-path\fP A path where the results will be saved. dnsmap will use the \fB-r\fP option to name files and will be created a file for each domain. This item is optional and if not supplied, dnsmap won't create files. .SH EXAMPLE For bruteforcing a list of target domains in a bulk fashion, saving all results inside a directory: .PP .nf .fam C $ dnsmap-bulk domains.txt /tmp/results/ .fam T .fi .SH SEE ALSO \fBdnsmap\fP(1) .SH AUTHOR \fBdnsmap-bulk\fP was originally written by "pagvac" in 2006. Currently it is maintained by volunteers, inside dnsmap project, at https://github.com/resurrecting-open-source-projects/dnsmap/ .PP This manpage was written by Joao Eriberto Mota Filho.