███████╗██╗ ██╗██████╗ ██╗ ██╗██╗ ██╗███╗ ██╗████████╗███████╗██████╗
██╔════╝██║ ██║██╔══██╗██║ ██║██║ ██║████╗ ██║╚══██╔══╝██╔════╝██╔══██╗
███████╗██║ ██║██████╔╝███████║██║ ██║██╔██╗ ██║ ██║ █████╗ ██████╔╝
╚════██║██║ ██║██╔══██╗██╔══██║██║ ██║██║╚██╗██║ ██║ ██╔══╝ ██╔══██╗
███████║╚██████╔╝██████╔╝██║ ██║╚██████╔╝██║ ╚████║ ██║ ███████╗██║ ██║
╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═══╝ ╚═╝ ╚══════╝╚═╝ ╚═╝
Advanced Subdomain Enumeration Tool
by: Psikoz
A powerful subdomain enumeration tool that combines multiple data sources for comprehensive subdomain discovery. Subhunter is designed for security professionals and bug bounty hunters to perform thorough reconnaissance.
- 🔍 Multi-Source Enumeration - Combines results from multiple public sources
- 🚀 High Performance - Concurrent scanning with configurable threads
- 📊 Comparison Mode - Compare results with other tools like Subfinder
- 📁 Flexible Output - Save results to file with customizable naming
- 📈 Detailed Reporting - Get statistics and detailed comparison reports
- 🔄 Smart Deduplication - Automatic removal of duplicate entries
- 🛡️ Respectful Scanning - Built-in delays and rate limiting
- Go 1.16 or higher
- Internet connection
# Install the specific version
go install github.com/Psikoz-coder/[email protected]
# Make sure your Go bin directory is in your PATH
export PATH="$PATH:$(go env GOPATH)/bin"
# Verify installation
subhunter --help
git clone https://github.com/Psikoz-coder/subhunter.git
cd subhunter
go build -o subhunter
sudo mv subhunter /usr/local/bin/
# Pull the latest image
docker pull ghcr.io/psikoz-coder/subhunter:latest
# Run the container
docker run -it --rm ghcr.io/psikoz-coder/subhunter -d example.com
go install github.com/Psikoz-coder/[email protected]
# Scan a single domain
subhunter -d example.com
# Save results to a file
subhunter -d example.com -o results.txt
# Enable verbose output
subhunter -d example.com -v
# Compare with Subfinder results
subhunter -d example.com --compare subfinder_results.txt
Usage: subhunter -d <domain> [options]
Required Flags:
-d, --domain string Target domain to scan
Optional Flags:
-o, --output string Output file (default: subhunter_<domain>_<timestamp>.txt)
-v, --verbose Enable verbose output
-t, --threads int Number of concurrent threads (default 5)
--timeout int HTTP request timeout in seconds (default 30)
--compare string Compare with subdomains from another tool's output file
-c, --check Run system check before scanning
-h, --help Show this help message
Subhunter can compare its results with other tools like Subfinder to identify unique and common subdomains:
# First run Subfinder
subfinder -d example.com -o subfinder_results.txt
# Then compare with Subhunter
subhunter -d example.com --compare subfinder_results.txt -v
This will generate several files:
subhunter_only_<domain>_<timestamp>.txt
- Unique to Subhuntersubfinder_only_<domain>_<timestamp>.txt
- Unique to the compared filecommon_<domain>_<timestamp>.txt
- Found by both toolscomparison_summary_<domain>_<timestamp>.txt
- Summary report
[+] Target: example.com
[+] Output: subhunter_example_com_20250709_1337.txt
[+] Threads: 5
[+] Timeout: 30 seconds
[+] Start Time: 2025-07-09 13:37:45
[*] Scanning RapidDNS...
[*] Scanning Riddler...
[*] Scanning JLDC Anubis...
[*] Scanning crt.sh...
[*] Scanning BufferOver...
[*] Scanning URLScan...
[+] Merging and cleaning results...
[+] Comparison Results:
[+] SubHunter found: 42 subdomains
[+] Other tool found: 37 subdomains
[+] Unique to SubHunter: 8
[+] Unique to other tool: 3
[+] Common subdomains: 34
[+] Scan completed in 12.45 seconds
[+] Found 42 unique subdomains
[+] Results saved to: subhunter_example_com_20250709_1337.txt
[+] Comparison results saved to files with timestamp: 20250709_133745
Contributions are welcome! Please feel free to submit a Pull Request.
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature
) - Commit your changes (
git commit -m 'Add some AmazingFeature'
) - Push to the branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
This tool is intended for security testing and research purposes only. Only use on targets you own or have explicit permission to test. The developers assume no liability and are not responsible for any misuse or damage caused by this program.
For questions or feedback, please open an issue on GitHub.
⭐ If you find this tool useful, please give it a star!
🐛 Found a bug? Open an issue
💡 Have a feature request? Start a discussion