ShadowHunter is a powerful reconnaissance and subdomain enumeration tool designed for bug bounty hunters, penetration testers, and cybersecurity researchers. It automates the process of finding subdomains, extracting live assets, filtering parameters, and performing Shodan-based reconnaissance to provide an edge in security assessments.
βοΈ Domain & Subdomain Enumeration β Discover subdomains, including 3rd-level domains.
βοΈ Live Subdomain Detection β Identify which subdomains are actively running.
βοΈ IP Address Extraction β Fetch IPs of discovered subdomains.
βοΈ Shodan Integration β Perform passive reconnaissance on discovered assets.
βοΈ Web Crawling & Parameter Extraction β Crawl live subdomains and extract parameters.
βοΈ Live Parameter Filtering β Identify potential vulnerable input points.
βοΈ Automation & Speed β Designed to handle large-scale recon with efficiency.
git clone https://github.com/VedantKCSE/ShadowHunter.git
cd ShadowHunter
pip install -r requirements.txt # Install dependencies (if applicable)
chmod +x shadowhunter.py # Make it executablepython shadowhunter.py -d target.compython shadowhunter.py --subdomains -d target.compython shadowhunter.py --shodan -ip 192.168.1.1python shadowhunter.py --crawl -d target.comGot ideas? Want to improve ShadowHunter? Contributions are welcome!
- Fork the repository
- Create a new branch (
feature-branch) - Commit your changes
- Push to your branch
- Open a Pull Request
This tool is for educational and ethical hacking purposes only. The author is not responsible for any misuse. Always ensure legal permission before using ShadowHunter on any target.
β Star this repo if you find it useful! π