> cat /dev/github | grep security-tools
discovered 30 Mar 2026

SubDomainizer

Python ★ 1852 via github-topic
→ View on GitHub

AI Summary: SubDomainizer is a reconnaissance tool that identifies hidden subdomains and secrets from specified URLs, web pages, and external JavaScript files. It supports various cloud storage services and can detect S3 buckets and CloudFront URLs, potentially exposing vulnerabilities such as open read/write permissions and subdomain takeover risks. The tool is capable of scanning both individual URLs and lists, with a feature for extracting secrets based on keyword searches and Shannon Entropy calculations, although this is currently in beta phase.


README

Python 3.x Twitter

Buy Me A Coffee

SubDomainizer

SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascripts present in the given URL. This tool also finds S3 buckets, cloudfront URL’s and more from those JS files which could be interesting like S3 bucket is open to read/write, or subdomain takeover and similar case for cloudfront. It also scans inside given folder which contains your files.

Cloud Storage Services Supported:

SubDomainizer can find URL’s for following cloud storage services:

1. Amazon AWS services (cloudfront and S3 buckets)
2. Digitalocean spaces 
3. Microsoft Azure 
4. Google Cloud Services 
5. Dreamhost 
6. RackCDN. 

Secret Key’s Searching: (beta)

SubDomainizer will also find secrets present in content of the page and javascripts files. Those secret finding depends on some specific keywords and Shannon Entropy formula. It might be possible that some secrets which searched by tool will be false positive. This secret key searching is in beta and later version might have increased accuracy for search results.

Screenshots:

SubDomainizer

Sub2.0

Installation Steps

  1. Clone SubDomainzer from git:
git clone https://github.com/nsonaniya2010/SubDomainizer.git
  1. Change the directory:
cd SubDomainizer
  1. Install the requirements:
pip3 install -r requirements.txt
  1. Enjoy the Tool.

Update to latest version:

Use following command to update to latest version:

git pull

Usage

Short FormLong FormDescription
-u–urlURL in which you want to find (sub)domains.
-l–listfileFile which contain list of URL’s needs to be scanned.
-o–outputOutput file name in which you need to save the results.
-c–cookieCookies which needs to be sent with request.
-h–helpshow the help message and exit.
-cop–cloudopGive file name in which you need to store cloud services results.
-d–domainsGive TLD (eg. for www.example.com you have to give example.com) to find subdomain for given TLD seperated by comma (no spaces b/w comma).
-g–gitscanNeeded if you want to get things via Github too.
-gt–gittokenGithub API token is needed, if want to scan (also needed -g also).
-gop–gitsecretopSaving secrets to a file found in github.
-k–nosslUse this to bypass the verification of SSL certificate.
-f–folderRoot folder which contains files/folder.
-san–subject_alt_nameFind Subject Alternative Names for all found subdomains, Options: ‘all’, ‘same’.

SAN options description:

  • all - This option will find all domains and subdomains.
  • same - This will only find subdomains for specific subdomains.

Examples

  • To list help about the tool:
python3 SubDomainizer.py -h
  • To find subdomains, s3 buckets, and cloudfront URL’s for given single URL:
python3 SubDomainizer.py -u http://www.example.com
  • To find subdomains from given list of URL (file given):
python3 SubDomainizer.py -l list.txt
  • To save the results in (output.txt) file:
python3 SubDomainizer.py -u https://www.example.com -o output.txt
  • To give cookies:
python3 SubDomainizer.py -u https://www.example.com -c "test=1; test=2"
  • To scan via github:
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g 
  • No SSL Certificate Verification:
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g  -k
  • Folder Scanning:
python3 SubDomainizer.py -f /path/to/root/folder/having/files/and/folders/  -d example.com  -gt <github_token> -g  -k
  • Subject Alternative Names:
python3 SubDomainizer.py -u https://www.example -san all
  • Saving secrets to a file scan found in github:
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g -gop filename_to_save

Difference in results (with cookies and without cookies on facebook.com):

Results before using facebook cookies in SubDomainizer:

BeforeCookies

Results after using facebook cookies in SubDomainizer:

AfterCookies

Changes:

In the latest version (2.0) following important features are added:

  1. Find Subject Alternative Names for the found subdomains.
  2. Added where the secrets were found.

License

This tools is licensed under the MIT license. take a look at the LICENSE for information about it.

Want to Help?

Want to help if you like features and tools? or Liked this tool? Help Here