Async Subdomain Enumerator & DNS Bruteforcer β Fast, multi-threaded subdomain discovery with passive and active enumeration.
- π Multi-threaded DNS bruteforce β 50+ concurrent threads for fast enumeration
- π Passive enumeration β Certificate Transparency logs via crt.sh
- π Built-in wordlist β 150+ common subdomain prefixes included
- π Custom wordlists β Bring your own wordlist for targeted bruteforcing
- π― CNAME detection β Identify potential subdomain takeover targets
- π Multiple output formats β JSON, TXT, or colored terminal output
- β‘ Zero dependencies β Pure Python, no external packages required
```bash git clone https://github.com/redX000/SubHunter.git cd SubHunter pip install -e . ```
```bash
subhunter example.com
subhunter example.com -p
subhunter example.com -w /path/to/wordlist.txt -t 100
subhunter example.com --json
subhunter example.com -o results.json subhunter example.com -o subdomains.txt ```
``` π SubHunter β Async Subdomain Enumerator
Target: example.com Threads: 50
[*] Bruteforcing 150 subdomains... [120/150] 80% β 245/s β 12 found
ββββββββββββββββββββββββββββββββββββββββββ π― Results: 12 subdomains found β± Time: 2.3s ββββββββββββββββββββββββββββββββββββββββββ
Subdomain IP Address Source ββββββββββββββββββββββββββββββββββββββββ ββββββββββββββββββ ββββββββββββ api.example.com 93.184.216.34 bruteforce blog.example.com 93.184.216.34 bruteforce mail.example.com 93.184.216.40 passive www.example.com 93.184.216.34 bruteforce ```
| Method | Description |
|---|---|
| DNS Bruteforce | Multi-threaded A record resolution |
| crt.sh | Certificate Transparency log mining |
| CNAME Detection | Identify dangling CNAMEs for takeover |
This tool is for authorized security testing and educational purposes only. Always obtain proper authorization before scanning any domain. The author is not responsible for any misuse.
MIT License β see LICENSE
Yassine Lasraoui β @redX000