11/12 free views
Tool
CLI
Web Security

VHostScan

by codingo

1.3Kstars
239forks
37watchers
Updated about 1 month ago
About

VHostScan is an advanced virtual host scanner designed to discover and analyze web server configurations, including catch-all scenarios, wildcards, and aliases.

A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.

Primary Use Case

This tool is invaluable for penetration testers and security researchers who need to identify all virtual hosts hosted on a single IP address. It helps uncover hidden or misconfigured subdomains by intelligently testing potential hostnames against a target, aiding in the discovery of new attack surfaces.

Key Features
  • Detects catch-all scenarios and outliers with dynamic content
  • Identifies aliases by adjusting unique match depth
  • Supports wordlists with variable substitution for base hostnames
  • Scans over both HTTP and HTTPS
  • Allows setting the real webserver port for headers when pivoting
  • Can add simple response headers to bypass some WAFs
  • Utilizes reverse lookups to identify new targets and append to wordlists
  • Modernized codebase with Python 3.8+ and type hints

Installation

  • Clone the repository: `git clone https://github.com/codingo/VHostScan.git`
  • Navigate to the directory: `cd VHostScan`
  • Install using pip: `pip install VHostScan`
  • Or install from source: `pip install .`
  • For development, install in editable mode: `pip install -e .`
  • Install on Docker: `docker build -t vhostscan .`

Usage

>_ docker run --rm -it vhostscan -t

Run VHostScan using Docker against a target.

>_ vhostscan -t TARGET_HOSTS

Scan the specified target host(s).

>_ vhostscan -b BASE_HOST

Set the base host for wordlist substitution.

>_ vhostscan -w WORDLISTS

Specify one or more wordlists (comma-delimited).

>_ vhostscan -p PORT

Set the port to scan (default 80).

>_ vhostscan -r REAL_PORT

Set the real webserver port for headers.

>_ vhostscan --ignore-http-codes IGNORE_HTTP_CODES

Specify HTTP status codes to ignore.

>_ vhostscan --ignore-content-length IGNORE_CONTENT_LENGTH

Ignore content lengths of a specific amount.

Security Frameworks
Reconnaissance
Discovery
Credential Access
Lateral Movement
Collection
Usage Insights
  • Integrate VHostScan with pivoting tools (e.g., SSH tunnels, netcat) to enhance lateral movement simulation during red team exercises.
  • Use the tool's catch-all detection and alias identification features to uncover hidden or shadow IT assets during blue team threat hunting.
  • Automate virtual host enumeration as part of continuous vulnerability scanning in CI/CD pipelines to detect misconfigurations early.
  • Leverage custom response headers to bypass WAFs and simulate advanced adversary evasion techniques for purple team training.
  • Combine reverse DNS lookups with dynamic wordlists to expand target discovery and improve reconnaissance coverage.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about VHostScan. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team85%
Blue Team40%
Purple Team60%
Details
LicenseGNU General Public License v3.0
LanguagePython
Open Issues54
Topics
security-audit
penetration-testing
penetration-test
virtual-hosts
web-application-security
discovery-service
hacking
hacking-tool
virtual-host
vhost