5 async Python tools for bug bounty & authorized pentesting — subdomain enum, port scanner, CVE lookup, recon, and report generator.
$ python subenum.py target.com
[+] Enumerating subdomains for target.com...
[+] Found: api.target.com
[+] Found: staging.target.com
[+] Found: dev.target.com
[+] Found: admin.target.com
[✓] 12 subdomains discovered
$ python portscan.py 192.168.1.1
[+] Scanning top 100 ports...
[+] 22/tcp open SSH
[+] 80/tcp open Apache/2.4
[+] 443/tcp open nginx
[✓] Scan complete in 2.3s
$ _
For bug bounty hunters, CTF players, and authorized pentesters.
ASYNC SUBDOMAIN ENUMERATOR
Discover hidden subdomains via fast DNS resolution. Built-in 80+ wordlist. Custom wordlist support. Saves results.
TCP PORT SCANNER + BANNER GRAB
Async I/O — scans 1000 ports in seconds. Auto-detects services. Top 100 mode. Clean output.
CVE & VULNERABILITY SEARCH
Queries NIST's NVD database in real time. Search by software name or specific CVE ID. Filter by severity. Export to JSON.
AUTOMATED RECONNAISSANCE
DNS records, HTTP headers, technology detection, missing security headers, interesting file discovery, and quick port scan. All in one command.
PROFESSIONAL HTML REPORT GENERATOR
Feed in your findings and get a clean, dark-themed pentest report. Interactive mode or JSON input. Ready to send to clients or bug bounty programs.
No obfuscation. Read, modify, and learn from every line.
Get up and running in minutes with clear documentation.
Pre-built template to generate professional pentest reports instantly.
Buy once, receive all future improvements and new features.
Streamline your recon workflow. Enumerate subdomains, scan ports, and generate professional reports faster than ever.
Get an edge in competitions. Fast port scanning and CVE lookups help you identify vulnerabilities quickly.
From reconnaissance to reporting, automate the tedious parts of authorized penetration testing engagements.
5 production-ready Python scripts. Full source code. Future updates included. One-time payment.
Secure checkout via Gumroad
For authorized penetration testing, bug bounty programs, CTF competitions, and educational use only. Only use on systems you own or have explicit written permission to test. You are responsible for your actions.