Sub_Crawler is a fast and flexible subdomain enumeration tool designed to help security researchers, penetration testers, and network administrators discover subdomains of a target domain quickly and efficiently.
- 🚀 High-Performance: Multithreaded scanning for rapid subdomain discovery
- 📋 Flexible Wordlists: Multiple built-in wordlist options
- 🔧 Customizable: Support for custom wordlists and thread configurations
- 🎯 Easy to Use: Simple command-line interface
- Rust programming language (latest stable version recommended)
- Optional: SecLists wordlist collection
- Clone the repository:
git clone https://github.com/sylar-my/sub_crawler.git
cd sub_crawler- Build the project:
cargo build --release- Install the binary:
cargo install --path .Download the latest release from the Releases page.
sub_crawler example.com# Use top 5000 wordlist with 20 threads
sub_crawler -w top5000 -t 20 example.com
# Use a custom wordlist
sub_crawler -w custom -c /path/to/custom_wordlist.txt example.comlight: Default lightweight wordlisttop5000: Top 5000 most common subdomain namestop20000: Extended subdomain listtop110000: Comprehensive subdomain collectioncustom: User-provided custom wordlist
Set the SecLists path:
export SECLISTS_PATH=/path/to/seclists| Option | Description | Default |
|---|---|---|
-w, --wordlist |
Wordlist type | light |
--seclists-path |
Custom SecLists directory path | - |
-c, --custom-wordlist |
Path to custom wordlist | - |
-t, --threads |
Number of concurrent threads | 10 |
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
Distributed under the MIT License. See LICENSE for more information.
Project Link: https://github.com/sylar-my/sub_crawler
- SecLists
- Rust Community