Categories: Kali Linux

CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates To Find Potential HostNames

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or given a IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for a API key.

Also Read Hcxdumptool – Small Tool To Capture Packets From WLAN Devices

How To Install CertCrunchy

git clone https://github.com/joda32/CertCrunchy.git
cd CertCrunchy
sudo pip3 install -r requirements.txt

How to use it?

Very simply -d to get hostnames for specific domain

  • -D to get hostnames for a list of domains (just stuff it in a line delimited text file)
  • -i to retrieve and parse certificates from hosts in a netblock / ip range (e.g. 192.168.0.0/24)
  • -T the thread count, makes stuff faster, but don’t over do it
  • -O to set the timeout on HTTP api requests in seconds (default is 3 seconds)
  • -o Output file name
  • -f Output format csv or json, csv is the default

API Keys & Configs

All API keys are stored in the api_keys.py file, below is a list of supported APIs requiring API keys.

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

16 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

17 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

19 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

19 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

19 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago