subscan 1.3.0

A subdomain enumeration tool leveraging diverse techniques, designed for advanced pentesting operations
Documentation
use subscan::{
    enums::content::Content,
    modules::integrations::hackertarget::{HackerTarget, HACKERTARGET_URL},
    types::result::status::SubscanModuleStatus,
};

use crate::common::{
    constants::{TEST_BAR_SUBDOMAIN, TEST_DOMAIN, TEST_URL},
    mock::funcs,
    utils,
};

#[tokio::test]
#[stubr::mock("module/integrations/hackertarget.json")]
async fn run_test() {
    let mut hackertarget = HackerTarget::dispatcher();

    funcs::wrap_module_url(&mut hackertarget, &stubr.path("/hackertarget"));

    let (results, status) = utils::run_module(hackertarget, TEST_DOMAIN).await;

    assert_eq!(results, [TEST_BAR_SUBDOMAIN.into()].into());
    assert_eq!(status, SubscanModuleStatus::Finished);
}

#[tokio::test]
async fn get_query_url_test() {
    let url = HackerTarget::get_query_url(TEST_DOMAIN);
    let expected = format!("{HACKERTARGET_URL}/?q={TEST_DOMAIN}");

    assert_eq!(url, expected);
}

#[tokio::test]
async fn get_next_url_test() {
    let url = TEST_URL.parse().unwrap();
    let next = HackerTarget::get_next_url(url, Content::Empty);

    assert!(next.is_none());
}