Get started with SpyHunt in minutes!
pip install spyhuntThat's it! SpyHunt is now installed and ready to use.
spyhunt --helpYou should see the SpyHunt help menu with all available options.
Find subdomains for a target domain:
spyhunt -s example.com --save subdomains.txtProbe which subdomains are live:
spyhunt -p subdomains.txt --save live_hosts.txtspyhunt --xss "https://example.com/page?param=value"spyhunt --sqli "https://example.com/page?id=1"spyhunt --xxe https://example.com/api/xmlspyhunt --ssrf "https://example.com/api?url=test"spyhunt --ssti "https://example.com/page?template=test"spyhunt --nosqli "https://example.com/api?id=test"spyhunt --crlf "https://example.com/redirect?url=test"Find hidden directories and files:
spyhunt --directorybrute example.com --wordlist /path/to/wordlist.txt --threads 50Scan a CIDR range for open ports:
spyhunt --cidr_notation 192.168.1.0/24 --ports 80,443,8080,8443Scan for exposed AWS S3 buckets:
spyhunt --s3-scan example.comScan for Azure resources:
spyhunt --azure_scan example.comScan for GCP storage:
spyhunt --gcp-scan example.com# Step 1: Enumerate subdomains
spyhunt -s target.com --save subdomains.txt
# Step 2: Find live hosts
spyhunt -p subdomains.txt --save live.txt
# Step 3: Scan for vulnerabilities
spyhunt --xxe https://api.target.com/xml --save xxe.json
spyhunt --ssrf "https://api.target.com/fetch?url=test" --save ssrf.json
spyhunt --xss "https://target.com/search?q=test" --save xss.json
spyhunt --sqli "https://target.com/product?id=1" --save sqli.json
# Step 4: Check for misconfigurations
spyhunt -co live.txt --save cors.txt
spyhunt -hh live.txt --save host_header.txt# Crawl the website
spyhunt -wc https://example.com --depth 3 --save urls.txt
# Find JavaScript files
spyhunt -j example.com --save js_files.txt
# Scan JavaScript for sensitive info
spyhunt -javascript example.com --save js_secrets.txt
# Check security headers
spyhunt -sh example.com
# Test for common vulnerabilities
spyhunt --xss "https://example.com/search?q=test"
spyhunt --sqli "https://example.com/page?id=1"
spyhunt -ph example.com?id= # Path traversal
spyhunt -or example.com # Open redirect# Scan network range
spyhunt --cidr_notation 10.0.0.0/24 --ports 21,22,80,443,3306,3389,8080
# Nmap scan
spyhunt -n example.com
# FTP scanning
spyhunt -fs ftp.example.com --ftp-userlist users.txt --ftp-passlist passwords.txt
# SMB scanning
spyhunt --smb_auto --smb-target 10.0.0.100Get more detailed output:
spyhunt -s example.com -vControl the number of concurrent requests:
spyhunt -s example.com -c 50Route traffic through a proxy:
spyhunt --xss "https://example.com?q=test" --proxy http://proxy.com:8080Or use a proxy file:
spyhunt --brute-user-pass example.com/login --proxy-file proxies.txtAdd custom headers to requests:
spyhunt -ch example.comAlways save your results for later analysis:
spyhunt -s example.com --save results.txtBy default, SSL verification is enabled. To disable for testing:
spyhunt --xxe https://self-signed.local/api --insecureWarning: Only use --insecure in controlled testing environments.
Some SpyHunt features require external tools. Install them using:
# Clone the repository
git clone https://github.com/Pymmdrza/spyhunt.git
cd spyhunt
# Run the installer (requires sudo on Linux/Mac)
sudo python3 install.pyThis installs:
- nuclei
- subfinder
- httpx
- waybackurls
- and other tools
To use Shodan features, set your API key:
spyhunt -s example.com --shodan-api YOUR_SHODAN_KEYFor IP information lookups:
spyhunt --ipinfo example.com --token YOUR_IPINFO_TOKENSpyHunt supports various output formats:
spyhunt -s example.com --save results.txtspyhunt --xxe https://example.com/api --save results.jsonspyhunt --helpspyhunt -upython -c "import spyhunt; print(spyhunt.__version__)"Solution: Make sure pip's bin directory is in your PATH:
# Linux/Mac
export PATH="$HOME/.local/bin:$PATH"
# Add to ~/.bashrc or ~/.zshrc for permanent effect
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrcSolution: Use --user flag during installation:
pip install --user spyhuntSolution: Reinstall with all dependencies:
pip uninstall spyhunt
pip install spyhunt --upgrade- Read the Full Documentation: Check
README.mdfor comprehensive usage examples - Learn About New Features: See what's new in v4.0
- Join the Community: Star the project on GitHub and contribute!
Important: SpyHunt is a powerful security tool. Always:
- ✅ Get proper authorization before scanning
- ✅ Use only on systems you own or have permission to test
- ✅ Follow responsible disclosure practices
- ✅ Comply with local laws and regulations
Unauthorized scanning may be illegal in your jurisdiction.
- GitHub Issues: https://github.com/Pymmdrza/spyhunt/issues
- Documentation: https://github.com/Pymmdrza/spyhunt
Happy Hunting! 🕵️