A Fast, Professional Subdomain & Recon Tool for Kali Linux and Termux
DomainHunter is a lightweight, maintenance-friendly reconnaissance helper for Kali Linux and Termux. It provides a simple TUI (terminal user interface) to run common reconnaissance primitives and save organized, timestamped results per target. DomainHunter is intended as a pragmatic wrapper around commonly-used recon tools β not a replacement for a full pentest suite
All artifacts are stored under:
results/<target>_<YYYYMMDD_HHMMSS>/Typical files produced (if corresponding tools are installed):
-subdomains.txt β subfinder
-nmap_top1000.txt β nmap summary
-dirs.txt β gobuster results
-whatweb.json or whatweb.txt β whatweb output / curl headers
-nikto.txt β nikto results
git clone https://github.com/hackops-academy/DomainHunter
cd DomainHunter
chmod +x DomainHunter.shStarting the tool
./DomainHunter.sh (Domain Name) ________ .__ ___ ___ __
\______ \ ____ _____ _____ |__| ____ / | \ __ __ _____/ |_ ___________
| | \ / _ \ / \\__ \ | |/ \/ ~ \ | \/ \ __\/ __ \_ __ \
| ` ( <_> ) Y Y \/ __ \| | | \ Y / | / | \ | \ ___/| | \/
/_______ /\____/|__|_| (____ /__|___| /\___|_ /|____/|___| /__| \___ >__|
\/ \/ \/ \/ \/ \/ \/
>> Environment: Termux (Mobile)
>> Target: target.com
---------------------------------------------------------------
[1] Full Recon Scan (All Tools)
[2] Subdomain Enumeration Only
[3] Port Scan (Nmap)
[4] Directory Bruteforce
[I] Install/Update Dependencies
[0] Exit
---------------------------------------------------------------
Selection >