subhunter

Crates.iosubhunter
lib.rssubhunter
version1.0.2
created_at2025-05-28 14:51:39.386402+00
updated_at2025-05-28 15:10:27.769435+00
descriptionFerramenta avanΓ§ada de enumeraΓ§Γ£o de subdomΓ­nios para Bug Bounty e Pentest
homepage
repository
max_upload_size
id1692869
size80,486
Kaique da Silva (ktfth)

documentation

README

🎯 SubHunter - Advanced Subdomain Enumeration for Bug Bounty

πŸš€ Lightning-fast subdomain enumeration with intelligent prioritization for Bug Bounty hunters and Penetration Testers

Features β€’ Installation β€’ Usage β€’ Priority System β€’ Examples


🌟 Why SubHunter?

SubHunter isn't just another subdomain enumerator. It's a professional-grade reconnaissance tool specifically designed to maximize your Bug Bounty ROI by intelligently prioritizing high-value targets.

🎯 Built for Bug Bounty Success

  • Smart Prioritization: Automatically ranks subdomains by their value for Bug Bounty programs
  • Deep Discovery: Goes beyond surface-level enumeration with advanced techniques
  • High Performance: 100+ concurrent threads with optimized async operations
  • Actionable Intelligence: Detailed reports with security-focused insights

✨ Features

πŸ” Multi-Vector Enumeration

  • πŸš€ Brute Force: 500+ curated subdomains optimized for Bug Bounty
  • πŸ” Certificate Transparency: Searches CT logs (crt.sh integration)
  • ⚑ DNS Resolution: Ultra-fast async DNS lookups
  • 🌐 HTTP Analysis: Comprehensive web service fingerprinting

🧠 Intelligent Analysis

  • 🎯 Priority Classification: Critical β†’ High β†’ Medium β†’ Low β†’ Unknown
  • πŸ›‘οΈ Security Headers: Identifies missing security controls
  • βš™οΈ Technology Detection: Recognizes frameworks, servers, and tools
  • πŸ“Š Performance Metrics: Response times and availability status

πŸ“ˆ Professional Reporting

  • πŸ“‹ Organized Output: Sorted by priority for efficient triage
  • πŸ“„ Detailed Reports: Complete subdomain intelligence in text format
  • 🎨 Color-coded Results: Visual priority indicators
  • πŸ“Š Statistical Summary: Quick overview of findings

πŸš€ Installation

Prerequisites

Quick Start

# Clone the repository
git clone https://github.com/your-username/subhunter.git
cd subhunter

# Build in release mode for maximum performance
cargo build --release

# Run SubHunter
./target/release/subhunter example.com

One-liner Installation

cargo install [--lock] subhunter

🎯 Intelligent Priority System

SubHunter uses a sophisticated classification system to help you focus on high-value targets first:

Priority 🎯 Target Type Examples Why It Matters
πŸ”΄ CRITICAL Admin interfaces, APIs, Dev environments admin, api, dev, staging, test Highest Bug Bounty value - Direct access to sensitive functions
🟠 HIGH Infrastructure services mail, ftp, vpn, database, backup High privilege access - Often misconfigured or outdated
🟑 MEDIUM Standard web services www, blog, support, portal Moderate value - Common attack vectors
🟒 LOW Static resources cdn, static, assets, images Lower priority - Limited attack surface
βšͺ UNKNOWN Custom patterns Domain-specific subdomains Manual review needed - Potential hidden gems

πŸ’» Usage

Basic Usage

# Enumerate subdomains for a target
subhunter example.com

Example Output

🎯 SubHunter - Advanced Subdomain Enumeration for Bug Bounty
Target: example.com

πŸ” Searching Certificate Transparency logs...
πŸ“‹ Found 23 certificates in CT log
βœ… CT Log: admin.example.com
βœ… CT Log: api.example.com

πŸ” Starting brute force enumeration...
βœ… Found: admin.example.com (CRITICAL)
βœ… Found: api.example.com (CRITICAL)
βœ… Found: dev.example.com (CRITICAL)
βœ… Found: mail.example.com (HIGH)
βœ… Found: www.example.com (MEDIUM)

πŸ“Š Report saved to: subdomains_example.com.txt
πŸ“ˆ Statistics:
  πŸ”΄ Critical: 15
  🟠 High: 8
  🟑 Medium: 12
  🟒 Low: 5
  βšͺ Unknown: 3

βœ… Enumeration completed!

πŸ“‹ Sample Report

🎯 SUBDOMAIN ENUMERATION REPORT
Domain: example.com
Total found: 43
Timestamp: 2025-05-28 15:30:45
================================================================================

πŸ”΄ CRITICAL - HIGH PRIORITY FOR BUG BOUNTY
--------------------------------------------------

Domain: admin.example.com
IPs: ["192.168.1.10"]
HTTP Status: 200
Title: Admin Panel - Login
Technologies: ["Server: Apache/2.4.41"]
Security Headers: {"x-frame-options": "DENY"}
Response Time: 234ms

Domain: api.example.com
IPs: ["192.168.1.15"]
HTTP Status: 200
Title: API Gateway
Technologies: ["Server: nginx/1.18.0", "Powered by: Express"]
Security Headers: {}
Response Time: 156ms

πŸ› οΈ Technical Specifications

Performance

  • ⚑ Concurrent Requests: 100 simultaneous operations
  • ⏱️ Timeout Management: 60 second intelligent timeouts
  • πŸ”„ Rate Limiting: Smart request throttling
  • 🎯 Accuracy: Advanced duplicate detection

Technology Detection

SubHunter automatically identifies:

  • Web Servers: Apache, Nginx, IIS, Cloudflare
  • Frameworks: WordPress, Joomla, Drupal, React, Angular
  • Languages: PHP, Python, Node.js, Java
  • Security: WAFs, CDNs, Load Balancers

Wordlist Coverage

  • 🎯 Bug Bounty Focused: Curated for maximum finding potential
  • πŸ”§ Technology Specific: Jenkins, GitLab, Jira, Confluence
  • 🌐 Infrastructure: Mail, VPN, Database, Monitoring
  • πŸ”„ Variants: Automatic prefix generation (new-, old-, v1-, v2-)

🎯 Bug Bounty Optimizations

Maximize Your ROI

  • 🎯 Target High-Value Assets: Automatically prioritizes admin panels and APIs
  • ⚑ Efficient Scanning: Focuses on subdomains with highest bug potential
  • πŸ“Š Actionable Intelligence: Provides context for each finding
  • πŸš€ Time Optimization: Spend time on valuable targets, not noise

Use Cases

  • πŸ” Initial Reconnaissance: Comprehensive asset discovery
  • 🎯 Attack Surface Expansion: Find hidden entry points
  • πŸ“Š Continuous Monitoring: Track new subdomain deployments
  • πŸ”΄ Red Team Operations: Professional-grade enumeration

πŸ›‘οΈ Responsible Usage

⚠️ Important Notice: SubHunter is designed for ethical security testing only

Authorized Use Cases:

  • βœ… Bug Bounty programs with explicit permission
  • βœ… Penetration testing with written authorization
  • βœ… Security auditing of your own assets
  • βœ… Educational and research purposes

Prohibited Uses:

  • ❌ Unauthorized scanning of third-party systems
  • ❌ Malicious reconnaissance activities
  • ❌ Violation of computer fraud and abuse laws

🚧 Roadmap

πŸ”œ Coming Soon

  • Subdomain Takeover Detection - Automated verification
  • Screenshot Capture - Visual reconnaissance
  • Port Scanning Integration - Service discovery
  • JSON/CSV Export - Multiple output formats
  • Web Dashboard - Interactive results viewer

🌟 Future Enhancements

  • Custom Wordlists - User-defined dictionaries
  • API Integration - Shodan, VirusTotal, SecurityTrails
  • Machine Learning - Intelligent pattern recognition
  • Team Collaboration - Shared workspace features

🀝 Contributing

We welcome contributions from the security community!

How to Contribute

  1. 🍴 Fork the repository
  2. 🌿 Create a feature branch
  3. πŸ’» Make your changes
  4. πŸ§ͺ Test thoroughly
  5. πŸ“ Submit a pull request

Areas for Contribution

  • 🎯 Enhanced wordlists
  • πŸ”§ New enumeration techniques
  • πŸ“Š Improved reporting formats
  • πŸ›‘οΈ Additional security checks

πŸ“œ License

Released under the MIT License - see LICENSE for details.


πŸŽ–οΈ Credits

Developed with ❀️ for the Bug Bounty and Penetration Testing community

SubHunter - Hunt subdomains like a pro 🎯


πŸ”— Connect & Support

github.com/ktfth

Happy Hunting! 🎯

Commit count: 0

cargo fmt