Simple Passive Subdomain Enumerator written in Python.
__
_______ __/ /_ ___ ____ __ ______ ___
/ ___/ / / / __ \/ _ \/ __ \/ / / / __ `__ \
(__ ) /_/ / /_/ / __/ / / / /_/ / / / / / /
/____/\__,_/_.___/\___/_/ /_/\__,_/_/ /_/ /_/
Simple Subdomain Enumerator
usage: subenum.py [-h] -d DOMAIN [--status]
Subenum is a lightweight passive subdomain enumeration tool inspired by tools like subfinder.
It collects subdomains from public sources and optionally checks HTTP status codes.
Designed for:
- Bug bounty recon
- OSINT
- Red team reconnaissance
- Learning passive enumeration techniques
- Passive subdomain enumeration
- Multiple data sources:
- crt.sh
- dns.bufferover.run
- hackertarget
- DNS resolution validation
- Optional HTTP status check
- Threaded performance
- Clean CLI output
- Pipe-friendly
Clone the repository:
git clone https://github.com/pangeran-droid/subenum.git
cd subenum
pip install requestsBasic usage:
python3 subenum.py -d example.comapi.example.com
dev.example.com
mail.example.compython3 subenum.py -d example.com --statusapi.example.com [200]
dev.example.com [403]
mail.example.com [301]Pipe into other tools:
python3 subenum.py -d example.com | tee subs.txtpython3 subenum.py -d example.com | httpxpython3 subenum.py -d example.com | nuclei -t templates/- Python 3.8+
- requests
This tool is intended for educational purposes and authorized security testing only.
Do not use against systems without proper permission.
MIT License