Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns.
Objective
Assist security researchers, bug bounty hunters, and web pentesters in the reconnaissance phase by incorporating an AI agent that generates additional potential subdomains. This enables discovery of assets outside the scope of traditional scans and expands the analyzable attack surface.
How it works
- The user uploads a list of domains to scan (scope).
- The workflow performs a passive, comprehensive scan using four sources (subfinder, assetfinder, crt.sh, Wayback Machine).
- The scan results and detected technologies are passed to an AI agent.
- The agent runs in a loop up to 20 iterations, generating new subdomains each pass (average output depends on input and model).
- Generated subdomains are validated and deduplicated. Syntax is checked and availability is tested (host active / httpx).
Requirements
- SSH access with a root user and the following tools:
- Subfinder
- Assetfinder
- HTTPX
It is recommended to use a VPS with SSH because if the scope is very large the workflow will take a long time.