Skip to content

redX000/SubHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” SubHunter

Python License Platform

Async Subdomain Enumerator & DNS Bruteforcer β€” Fast, multi-threaded subdomain discovery with passive and active enumeration.

πŸ”₯ Features

  • πŸš€ Multi-threaded DNS bruteforce β€” 50+ concurrent threads for fast enumeration
  • πŸ”Ž Passive enumeration β€” Certificate Transparency logs via crt.sh
  • πŸ“‹ Built-in wordlist β€” 150+ common subdomain prefixes included
  • πŸ“ Custom wordlists β€” Bring your own wordlist for targeted bruteforcing
  • 🎯 CNAME detection β€” Identify potential subdomain takeover targets
  • πŸ“Š Multiple output formats β€” JSON, TXT, or colored terminal output
  • ⚑ Zero dependencies β€” Pure Python, no external packages required

πŸš€ Installation

```bash git clone https://github.com/redX000/SubHunter.git cd SubHunter pip install -e . ```

πŸ“– Usage

```bash

Basic enumeration

subhunter example.com

With passive sources (crt.sh)

subhunter example.com -p

Custom wordlist + more threads

subhunter example.com -w /path/to/wordlist.txt -t 100

JSON output

subhunter example.com --json

Save results

subhunter example.com -o results.json subhunter example.com -o subdomains.txt ```

πŸ“Έ Preview

``` πŸ” SubHunter β€” Async Subdomain Enumerator

Target: example.com Threads: 50

[*] Bruteforcing 150 subdomains... [120/150] 80% β€” 245/s β€” 12 found

══════════════════════════════════════════ 🎯 Results: 12 subdomains found ⏱ Time: 2.3s ══════════════════════════════════════════

Subdomain IP Address Source ──────────────────────────────────────── ────────────────── ──────────── api.example.com 93.184.216.34 bruteforce blog.example.com 93.184.216.34 bruteforce mail.example.com 93.184.216.40 passive www.example.com 93.184.216.34 bruteforce ```

🧠 Enumeration Methods

Method Description
DNS Bruteforce Multi-threaded A record resolution
crt.sh Certificate Transparency log mining
CNAME Detection Identify dangling CNAMEs for takeover

⚠️ Disclaimer

This tool is for authorized security testing and educational purposes only. Always obtain proper authorization before scanning any domain. The author is not responsible for any misuse.

πŸ“„ License

MIT License β€” see LICENSE

πŸ‘€ Author

Yassine Lasraoui β€” @redX000

About

πŸ” Async Subdomain Enumerator & DNS Bruteforcer β€” Fast multi-threaded subdomain discovery

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages