SubSprayer - Automated Subdomain Enumeration Tool
During reconnaissance, subdomain enumeration is one of the most critical steps. You need to find all the assets and entry points of your target, but running multiple tools manually can be tedious and time-consuming. That’s why I created SubSprayer - a comprehensive tool that automates the entire subdomain discovery process.
What SubSprayer Does
SubSprayer combines multiple enumeration techniques into a single automated workflow:
Multiple Enumeration Techniques
- Subfinder - Fast passive DNS enumeration
- Sublist3r - OSINT-based enumeration
- Amass - Comprehensive active/passive enumeration
- Crtsh - Certificate transparency log search
- Gobuster - DNS brute force with wordlists
- GitHub Search - Discover subdomains mentioned in code repositories
Live Host Detection
Once subdomains are discovered, SubSprayer automatically:
- Checks which hosts are actually live using HTTPX
- Scans common ports (80, 443, 8080, 8000, 8081, 8008, 8888, 8443, 9000, 9001, 9090)
- Extracts page titles and HTTP status codes
- Organizes results in a clean, structured format
Why I Built It
This was done for recon on subdomains based on trying to discover some assets and with available tools. I wanted something that would:
- Save time - Automate the entire enumeration process
- Be comprehensive - Use multiple techniques for maximum coverage
- Be organized - Structure output clearly for easy analysis
- Be easy to use - Simple command-line interface with sensible defaults
Usage
Basic Usage
# Single domain enumeration./subsprayer.sh -t example.com -w /path/to/wordlist.txt
# Multiple domains from file./subsprayer.sh -l domains.txt -w /path/to/wordlist.txt
# With GitHub token for enhanced search./subsprayer.sh -t example.com -w /path/to/wordlist.txt -g YOUR_GITHUB_TOKENOutput Structure
Results are organized in a clean directory structure:
resultSubsprayer/└── domain.com/ └── YYYY-MM-DD/ ├── all-subdomains.txt # Combined unique subdomains ├── live-hosts.txt # Live hosts with HTTP details ├── domain-subfinder.txt # Subfinder results ├── domain-sublist3r.txt # Sublist3r results ├── domain-crtsh.txt # Certificate transparency results ├── domain-gobuster.txt # Brute force results └── domain-github.txt # GitHub search resultsEasy Installation
A single installation script handles everything:
chmod +x install.sh./install.shThis installs all required tools, downloads wordlists, and configures your environment.
Comprehensive Tool Suite
SubSprayer integrates:
- Subfinder - Fast passive enumeration
- Sublist3r - OSINT gathering
- Amass - Active and passive enumeration
- Crtsh - Certificate transparency logs
- Gobuster - DNS brute forcing
- HTTPX - Live host detection and probing
GitHub Repository
The tool is open source and available on GitHub:
🔗 github.com/solidshadw/subsprayer
You can clone it, customize it, and contribute improvements. It’s designed to be modular, so you can easily add new enumeration techniques or modify existing ones.
Automate the boring stuff, focus on finding vulnerabilities.
← Back to blog