DomainHound is a simple yet powerful Python tool designed to filter subdomains based on a custom wordlist.
It helps bug bounty hunters, penetration testers, and security researchers quickly locate subdomains of interest from massive domain lists.
- β Filters subdomains using a keyword/wordlist
- β Simple CLI interface with colorful terminal output
- β Optional saving of results to a file
- β Regular expression-based matching
- β Clean and readable output
Clone the repository:
git clone https://github.com/yourusername/DomainHound.git
cd DomainHound
you need two wordlists to run this script
admin
test
dev
admin.example.com
dev-api.example.com
login.example.com
example.com
Note: Make sure you have Python 3 installed.
those both commands filters all subdomains in subdomains.txt that contain any word from keywords.txt
python3 domainhound.py -w keywords.txt -sd subdomains.txt
or
python3 domainhound.py -w keywords.txt -sd subdomains.txt -o filtered.txt
Argument | Description |
---|---|
-w |
Path to the wordlist (keywords) used for filtering |
-sd |
Path to the subdomain list you want to filter |
-o |
(Optional) Path to save the output |
If -o is provided, the output will be saved to the given path and If -o does not used, matches will be printed directly to the terminal with color formatting.
Created by: NakuTenshi