RevoltSecurities/SubProber
SubProber is a fast, asynchronous HTTP probing tool written in Python, designed for penetration testers and bug bounty hunters who need to quickly validate large lists of subdomains. It uses an async httpx client to send concurrent HTTP requests at scale (default concurrency: 100) and collects a rich set of response metadata: status codes, page titles, server headers, DNS records, TLS certificate data, and JARM fingerprints. Input can be hosts, URLs, or IP addresses fed via stdin or file. SubProber supports multiple HTTP methods, custom headers, proxy routing, and flexible output filtering by status code, response time, or regex patterns. Results can be exported to JSON for downstream tooling. It integrates naturally into recon pipelines alongside tools like Subfinder and Amass โ pipe subdomain lists directly into SubProber to identify live hosts. The tool is installable via pip or pipx and works on Linux, macOS, and Windows. Built by RevoltSecurities as part of a suite of open-source offensive security utilities.
git clone https://github.com/RevoltSecurities/SubProber.git
Quick Start Example
# Install
pipx install git+https://github.com/RevoltSecurities/Subprober.git
# Probe subdomains from a file
subprober -f subdomains.txt -o results.json
# Pipe from subfinder
subfinder -d example.com -silent | subprober -sc -title -sv -rl 100
# Filter by status code and export JSON
subprober -f hosts.txt -mc 200,301 -json -o alive.json