RevoltSecurities/SubProber โ€” GitHub Repository Preview
Security & Pentesting โ˜… 265 Python

RevoltSecurities/SubProber

by @RevoltSecurities ยท

265 Stars
31 Forks
5 Issues
Python Language

SubProber is a fast, asynchronous HTTP probing tool written in Python, designed for penetration testers and bug bounty hunters who need to quickly validate large lists of subdomains. It uses an async httpx client to send concurrent HTTP requests at scale (default concurrency: 100) and collects a rich set of response metadata: status codes, page titles, server headers, DNS records, TLS certificate data, and JARM fingerprints. Input can be hosts, URLs, or IP addresses fed via stdin or file. SubProber supports multiple HTTP methods, custom headers, proxy routing, and flexible output filtering by status code, response time, or regex patterns. Results can be exported to JSON for downstream tooling. It integrates naturally into recon pipelines alongside tools like Subfinder and Amass โ€” pipe subdomain lists directly into SubProber to identify live hosts. The tool is installable via pip or pipx and works on Linux, macOS, and Windows. Built by RevoltSecurities as part of a suite of open-source offensive security utilities.

Author avatar for @RevoltSecurities
@RevoltSecurities Project maintainer on GitHub
View Profile
View on GitHub
git clone https://github.com/RevoltSecurities/SubProber.git

Quick Start Example

bash
# Install
pipx install git+https://github.com/RevoltSecurities/Subprober.git

# Probe subdomains from a file
subprober -f subdomains.txt -o results.json

# Pipe from subfinder
subfinder -d example.com -silent | subprober -sc -title -sv -rl 100

# Filter by status code and export JSON
subprober -f hosts.txt -mc 200,301 -json -o alive.json

Tags

#subdomain#http-probe#recon#python#async#bug-bounty

Related Projects