From 055436aaa0c3b7c12272a94a6ea2256118457d6f Mon Sep 17 00:00:00 2001 From: hetparekh16 <72140834+hetparekh16@users.noreply.github.com> Date: Thu, 1 Oct 2020 09:54:30 +0530 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index bef8dba..1c3bb40 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # CTFR -Do you miss AXFR technique? This tool allows to get the subdomains from a HTTP**S** website in a few seconds. +Do you miss AXFR technique? Yes ? This tool allows to get the subdomains from a HTTP**S** website in a few seconds. So now lets see how its work How it works? CTFR does not use neither dictionary attack nor brute-force, it just abuses of Certificate Transparency logs. For more information about CT logs, check www.certificate-transparency.org and [crt.sh](https://crt.sh/).