🚀 A fast, multithreaded subdomain enumeration tool written in Python using a wordlist-based approach. Useful for reconnaissance in ethical hacking and bug bounty hunting.
⚡ Fast performance with multithreading
✅ Progress bar for real-time scan updates
📂 Output saved to a text file
🔐 Silent error handling
🧾 Customizable wordlist support
- The script takes a target domain and brute-forces potential subdomains using a wordlist. If the subdomain resolves, it’s printed and saved.
- Python 3.x
- requests module (pip install requests)
To get started with Sub_Domain_Enum, clone the repository and install the necessary dependencies:
git clone https://github.com/0xHawkEye/Sub_Domain_Enum.git
cd Sub_Domain_Enum
pip install requestspython sub.pyYou’ll be prompted to enter the target domain:
[+]Enter the target URL: example.comDiscovered subdomains are saved in:
output/<target>.txtExample:
output/example.com.txtsub.py
sorted_wordlist.txt
output/Sub_Domain_Enum is intended for educational and authorized penetration testing purposes only.
By using this tool, you agree to the following:
✅ You will not use Sub_Domain_Enum to scan, probe, or interact with Domain without explicit permission from the owner.
✅ You are solely responsible for any misuse or unauthorized activity performed using this tool.
✅ The developer is not liable for any damage, legal consequences, or misuse resulting from the use of this tool.
❗ Always obtain proper authorization before scanning or enumerating subdomains on any domain.
This tool is intended for educational and authorized testing purposes only.
This project is licensed under the MIT License.
- Use in lab environments, CTFs, bug bounty, or client-approved pentests.
- Respect all terms of service and network usage policies.
Contributions are welcome! Feel free to submit pull requests or open issues to enhance the tool. Your feedback and contributions help improve Sub_Domain_Enum.
Developed by: Ayush Kumar
Linkedin: https://www.linkedin.com/in/ayushkr4422