Categories: Kali Linux

CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates To Find Potential HostNames

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or given a IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for a API key.

Also Read Hcxdumptool – Small Tool To Capture Packets From WLAN Devices

How To Install CertCrunchy

git clone https://github.com/joda32/CertCrunchy.git
cd CertCrunchy
sudo pip3 install -r requirements.txt

How to use it?

Very simply -d to get hostnames for specific domain

  • -D to get hostnames for a list of domains (just stuff it in a line delimited text file)
  • -i to retrieve and parse certificates from hosts in a netblock / ip range (e.g. 192.168.0.0/24)
  • -T the thread count, makes stuff faster, but don’t over do it
  • -O to set the timeout on HTTP api requests in seconds (default is 3 seconds)
  • -o Output file name
  • -f Output format csv or json, csv is the default

API Keys & Configs

All API keys are stored in the api_keys.py file, below is a list of supported APIs requiring API keys.

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

2 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

2 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

4 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago