ZoneXplorer is a military-grade reconnaissance framework designed for advanced DNS exploration and intelligence gathering. Built for security researchers and red teamers, it provides a comprehensive suite of tools to map attack surfaces, hunt for subdomain takeovers, and visualize network topologies in real-time.
- 🚀 Advanced DNS Attacks: Support for
AXFR(Zone Transfer),IXFR(Incremental Transfer), andNSECZone Walking. - 🕵️ DNS Cache Snooping: Identify recently resolved domains on a target Name Server.
- ☁️ Cloud Takeover Hunt: Automatically detect vulnerable subdomains pointing to abandoned cloud services (AWS, Azure, GCP, etc.).
- 📊 Live Terminal Dashboard: High-fidelity UI using
richfor real-time scan statistics and findings. - 🗺️ Topology Visualization: Generate
.dotfiles to visualize network relationships and infrastructure. - 🛡️ SOCKS5 Support: Route your reconnaissance traffic through proxies for stealth.
Follow these steps to set up ZoneXplorer on your Kali Linux system.
First, ensure your system is up to date and install the necessary Python environment headers.
sudo apt update && sudo apt install -y python3-venv gitNavigate to your desired directory and clone the tool.
git clone https://github.com/mrdineshpathro/ZoneXplorer.git
cd ZoneXplorerIt is highly recommended to use a Virtual Environment to avoid dependency conflicts.
# Create the virtual environment
python3 -m venv .venv
# Activate the virtual environment
source .venv/bin/activateWith the virtual environment active, install the required Python packages.
pip install --upgrade pip
pip install -r requirements.txtZoneXplorer comes with a powerful CLI. Below are the available options and examples.
| Flag | Description |
|---|---|
-d, --domain |
(Required) Target domain to scan. |
-o, --output |
Folder to save results (default: results). |
--proxy |
SOCKS5 Proxy string (IP:PORT). |
--passive |
Enable OSINT reconnaissance via crt.sh. |
--walk |
Enable NSEC Zone Walking for DNSSEC-secured zones. |
--snoop |
Enable DNS Cache Snooping on Name Servers. |
--cloud |
Perform Cloud Subdomain Takeover checks. |
--graph |
Generate a Network Topology Graph (.dot file). |
--all |
Recommended: Run all features at once. |
1. Basic Passive Reconnaissance
python3 main.py -d example.com --passive2. Full Military-Grade Scan (Run All Features)
python3 main.py -d example.com --all3. Stealthy Scan via SOCKS5 Proxy
python3 main.py -d target-corp.com --all --proxy 127.0.0.1:90504. Specific NSEC Walk and Graph Generation
python3 main.py -d site.gov --walk --graph -o gov_recon- Activation: Remember to run
source .venv/bin/activatewhenever you start a new terminal session. - Deactivation: Type
deactivateto exit the virtual environment.
Made with ❤️ for the Security Community
