Skip to content

**SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects live hosts, fuzzes directories, scans ports, identifies vulnerabilities, and automates exploitation. Ideal for penetration testers and bug bounty hunters. Comprehensive recon in one script.

Notifications You must be signed in to change notification settings

who0xac/SubHunterX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SubHunterX 🎯

Advanced Bug Bounty Automation Framework

The ultimate reconnaissance and vulnerability detection arsenal for security professionals

Made with Bash Offensive Tool Recon

🚀 Overview

SubHunterX is a powerful bug bounty automation framework designed to silently map attack surfaces and uncover critical vulnerabilities. By combining military-grade reconnaissance techniques with intelligent automation, SubHunterX gives security professionals the edge in identifying security weaknesses before they can be exploited by malicious actors.

✨ Features

  • Stealth Subdomain Enumeration: Uncover hidden assets with minimal footprint
  • Parallel Processing Engine: Lightning-fast execution for time-sensitive operations
  • Real-time Target Validation: Immediate verification of discovered assets
  • Advanced Fingerprinting: Identify technologies and potential attack vectors
  • API Infiltration: Automatically detect and analyze API endpoints
  • Aggressive Content Discovery: Thorough directory and file enumeration
  • Vulnerability Pattern Recognition: Pre-configured detection for common security issues
  • Network Topology Mapping: Complete DNS resolution and IP correlation
  • Operational Security Logging: Detailed activity tracking with OPSEC considerations

🔧 Prerequisites

Core Arsenal

Category Tools
Subdomain Discovery Amass, Subfinder, Findomain, Assetfinder, Sublist3r, Chaos
DNS Operations ShuffleDNS, Massdns, DNSx
Web Analysis HTTPx, Katana, Waybackurls, GAU, Gobuster, FFuf
Pattern Matching GF

Environment Configuration

AMASS_CONFIG=/path/to/amass/config
CHAOS_API_KEY=your_chaos_api_key
RESOLVERS=/path/to/resolvers.txt
WORDLISTS=/path/to/wordlists

📥 Deployment

git clone https://github.com/who0xac/SubHunterX
cd SubHunterX
chmod +x subhunterx.sh

🚀 Usage

./subhunterx.sh <target_domain>

🔎 Capability Details

Subdomain Enumeration

  • Active Reconnaissance: In-depth enumeration with Amass
  • Passive Intelligence: Data aggregation via Subfinder, Findomain, Assetfinder, Sublist3r
  • Brute Force Discovery: Dictionary-based detection with Gobuster
  • Private Programs: Additional sources through Chaos API

DNS Infrastructure Analysis

  • High-performance resolution via ShuffleDNS and Massdns
  • Live validation using HTTPx
  • Comprehensive IP mapping with DNSx

Web Asset Discovery

  • Deep Crawling: Thorough application mapping with Katana
  • API Detection: Automatic identification of endpoints
  • Content Discovery: Systematic enumeration with FFuf
  • Historical Analysis: Archive data via Waybackurls and GAU

Vulnerability Detection

Pattern matching for critical issues:

  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Local/Remote File Inclusion
  • Server-Side Request Forgery (SSRF)
  • Open Redirects

🛡️ Operational Security

This tool is developed for security professionals conducting authorized security assessments. Always:

  • Obtain proper permission before testing any systems
  • Follow responsible disclosure principles
  • Respect rate limits and system resources
  • Comply with all applicable laws and regulations

🤝 Contributing

Contributions are welcome! Please feel free to submit pull requests or open issues for:

  • Bug fixes
  • Feature enhancements
  • Documentation improvements
  • Tool integrations

🙏 Acknowledgments

  • Tool created and maintained by who0xac

About

**SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects live hosts, fuzzes directories, scans ports, identifies vulnerabilities, and automates exploitation. Ideal for penetration testers and bug bounty hunters. Comprehensive recon in one script.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages