diff --git a/README.md b/README.md index c2dd689..58ca3f4 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # Sublist3r ![Python](https://img.shields.io/badge/Python-3.6%2B-blue?logo=python&logoColor=white) [![License: GPL v2](https://img.shields.io/badge/License-GPL%20v2-green.svg)](https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html) [![Stars](https://img.shields.io/github/stars/aboul3la/Sublist3r?style=social)](https://github.com/aboul3la/Sublist3r/stargazers) -![Banner](http://www.secgeek.net/images/Sublist3r.png) +![Banner]()https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.geeksforgeeks.org%2Flinux-unix%2Fwhat-is-sublist3r-and-how-to-use-it%2F&psig=AOvVaw3AzLnLvIDERjYHZcNf2DOG&ust=1759413024629000&source=images&cd=vfe&opi=89978449&ved=0CBUQjRxqFwoTCIDqsc2Sg5ADFQAAAAAdAAAAABAM) > **Sublist3r** is a fast and powerful Python tool designed for OSINT-based subdomain enumeration. It helps penetration testers, bug bounty hunters, and security researchers discover hidden subdomains for targeted domains. Sublist3r leverages multiple search engines (Google, Yahoo, Bing, Baidu, Ask) and passive sources (Netcraft, VirusTotal, ThreatCrowd, DNSdumpster, ReverseDNS, BufferOverRun, CertSpotter) to build comprehensive subdomain lists.