---"Recon like a pro. Hunt like a ghost."
enumRust is an automated offensive recon framework written in Rust that performs comprehensive reconnaissance and vulnerability analysis on any target domain.
It integrates top-tier tools like subfinder, httpx, masscan, nuclei, ffuf, and feroxbuster to uncover:
- 🔍 Subdomains
- 🌐 Open ports & services
- 🧪 Vulnerabilities (XSS, RCE, SSRF, etc.)
- 📂 Sensitive files & directories
- ☑️ Exposed cloud buckets
- 🧪 Hidden form parameters
- 🛡️ Misconfigurations via
robots.txtand more!
| Module | Description |
|---|---|
| 🧐 Subdomain Enumeration | Uses subfinder & tlsx to find valid subdomains |
| 📡 Port Scanning | Executes masscan for lightning-fast port discovery |
| 🔍 Service Validation | Resolves IPs & checks HTTP/HTTPS services using httpx |
| 🔸 Crawler + Analysis | Extracts JS/HTML paths, comments, URLs, and cloud storage exposures |
| 🧪 Vulnerability Scan | Executes nuclei with critical tags like XSS, RCE, SSRF |
| 🏗️ Directory Brute-Force | Uses feroxbuster with intelligent timeouts and result parsing |
| ☑️ Cloud Bucket Finder | Regex-based discovery for AWS, GCP, Azure buckets |
| 🧕♀️ Hidden Param Grabber | Extracts hidden form parameters for parameter pollution attacks |
| 📂 VHost Brute-Force | Uses ffuf to brute virtual hosts with custom Host: headers |
| 🛡️ robots.txt Extractor | Parses disallowed paths and adds them to wordlists for further fuzzing |
The following tools must be installed and available in your $PATH:
subfinder, anew, tlsx, jq, dnsx, masscan, httpx, hakrawler, nuclei, curl, feroxbuster, ffuf
You can check dependencies by running:
cargo run --release -- -d example.comapt install rustup pkg-config libssl-dev
rustup default stable
git clone https://github.com/KingOfBugbounty/enumrust.git
cd enumrust
cargo build --release./enumRust -d example.comThis will:
- Create a directory named
example.com - Perform full recon and scan workflow
- Save all results inside this directory
| File | Description |
|---|---|
subdomains.txt |
All discovered subdomains |
masscan.txt |
Raw port scan results |
ports.txt |
HTTP/HTTPS services on open ports |
http200.txt |
Alive and reachable HTTP URLs |
cloud_buckets.txt |
Detected exposed cloud storage |
urls.txt |
Discovered internal URLs |
hiddenparams.txt |
URLs with injectable hidden parameters |
params.txt |
Crawled parameters from URLs |
ferox_results.json |
Raw output from Feroxbuster |
ferox_parsed.txt |
Clean parsed output from Feroxbuster |
nuclei_results.txt |
All vulnerability results |
vhost_results.txt |
Found vhosts via FFUF |
subfinder -d domain.com | anew subdomains.txt
tlsx → Collect SANs → appenddnsx → IPs
masscan → Open ports
httpx → Validate services-
reqwest+scraperfor HTML/JS/Comment URLs -
Regex search for:
- ☑️ S3 Buckets
- 🧱 GCP/Azure Storage
- 👁️ Hidden Params
feroxbusterwith depth control and image filteringffuffor virtual hosts viaHost: FUZZ.domain.com
-
nucleiwith:-tagsxss,rce,ssrf,keycloak,actuator,misconfig-severitymedium,high,critical
./enumRust -d target.com
# Outputs directory:
# └── target.com/
# ├── subdomains.txt
# ├── ports.txt
# ├── cloud_buckets.txt
# ├── ferox_results.json
# ├── nuclei_results.txt
# └── ...This tool is for educational and authorized penetration testing only. Do not use against targets without proper authorization. The developer assumes no liability for misuse.
- ProjectDiscovery (Subfinder, HTTPX, Nuclei)
- Daniel Miessler (SecLists)
- Feroxbuster by @epi052
- FFUF by @ffuf
Found a bug or want a new feature?
📬 Open an issue or PR at: github.com/KingOfBugbounty/enumrust
