<div align="center">
<img src="https://raw.githubusercontent.com/Ayanrajpoot10/bugscanx/refs/heads/main/assets/logo.png" width="128" height="128"/>
<h1>BugScanX</h1>
<p><b>All-in-One Tool for Finding SNI Bug Hosts</b></p>
<p>🔍 Bug Host Discovery • 🌐 SNI Host Scanning • 🛡️ HTTP Analysis • 📊 Host Intelligence</p>
</div>
<p align="center">
<img src="https://img.shields.io/github/stars/Ayanrajpoot10/bugscanx?color=e57474&labelColor=1e2528&style=for-the-badge"/>
<img src="https://img.shields.io/pypi/dm/bugscan-x?color=67b0e8&labelColor=1e2528&style=for-the-badge"/>
<img src="https://img.shields.io/pypi/v/bugscan-x?color=8ccf7e&labelColor=1e2528&style=for-the-badge"/>
<img src="https://img.shields.io/github/license/Ayanrajpoot10/bugscanx?color=f39c12&labelColor=1e2528&style=for-the-badge"/>
<img src="https://img.shields.io/github/last-commit/Ayanrajpoot10/bugscanx?color=9b59b6&labelColor=1e2528&style=for-the-badge"/>
</p>
<p align="center">
<img src="https://img.shields.io/badge/Python-3.7+-3776ab?style=for-the-badge&logo=python&logoColor=white"/>
<img src="https://img.shields.io/badge/Platform-Windows%20%7C%20Linux%20%7C%20macOS%20%7C%20Android-lightgrey?style=for-the-badge"/>
</p>
## 📋 Table of Contents
- [🎯 Overview](#-overview)
- [✨ Features](#-features)
- [⚡ Quick Start](#-quick-start)
- [🔧 Installation](#-installation)
- [🛠️ Tools Documentation](#️-tools-documentation)
- [🏗️ Architecture](#️-architecture)
- [🤝 Contributing](#-contributing)
- [⚠️ Disclaimer](#️-disclaimer)
- [📞 Support](#-support)
## 🎯 Overview
**BugScanX** is a specialized bug host discovery tool designed for finding working SNI/HTTP hosts that are suitable for tunneling applications. This tool helps users discover bug hosts that can be used to create configurations for various tunneling and VPN applications to enable unrestricted internet access.
## ✨ Features
### 🎯 Host Scanner
Advanced multi-mode bug host scanning with specialized capabilities:
- **Direct Scanning**: HTTP/HTTPS bug host discovery with custom methods
- **DirectNon302**: Specialized scanning that excludes redirect responses (essential for bug hosts)
- **SSL/SNI Analysis**: TLS/SSL configuration analysis for SNI bug hosts
- **Proxy Testing**: Comprehensive proxy validation for tunneling compatibility
- **Ping Scanning**: Connectivity testing for discovered hosts
- Support for all HTTP methods and custom payload injection
- Multi-threaded concurrent processing
### 🔍 Subdomain Enumeration
Professional subdomain discovery for expanding bug host lists:
- **Passive Discovery**: Leverages multiple API providers and search engines
- **Batch Processing**: Mass domain enumeration from target lists
### 🌐 IP Lookup & Reverse DNS
Comprehensive IP intelligence for bug host clustering:
- **Reverse IP Lookup**: Discover all domains hosted on target IPs
- **CIDR Range Processing**: Bulk analysis of IP ranges
- **Multi-Source Aggregation**: Combines data from multiple sources
### 🚪 Port Scanner
Advanced port scanning for service discovery with common tunneling ports (80, 443, 8080, 8443).
### 🔎 DNS & SSL Analysis
Comprehensive analysis for SNI bug hosts including DNS records and SSL certificate validation.
### 📁 File Management & Processing
Professional-grade file processing with smart splitting, merging, deduplication, and filtering tools.
## ⚡ Quick Start
### 🚀 Installation
```bash
# Install from PyPI
pip install bugscan-x
```
### 🎮 Launch BugScanX
```bash
# Primary command
bugscanx
# Alternative commands
bugscan-x
bx
```
### 🎯 Interactive Menu
```
╔╗ ╦ ╦╔═╗╔═╗╔═╗╔═╗╔╗╔═╗ ╦
╠╩╗║ ║║ ╦╚═╗║ ╠═╣║║║╔╩╦╝
╚═╝╚═╝╚═╝╚═╝╚═╝╩ ╩╝╚╝╩ ╚═
[1] HOST SCANNER # Advanced bug host scanner with multiple modes
[2] SUBFINDER # Subdomain enumeration with passive discovery modes
[3] IP LOOKUP # Reverse IP lookup
[4] FILE TOOLKIT # Bug host list management
[5] PORT SCANNER # Port scanner to discover open ports
[6] DNS RECORD # DNS record gathering
[7] HOST INFO # Detailed bug host analysis
[8] HELP # Documentation and usage examples
[9] UPDATE # Self-update tool
[0] EXIT # Quit application
```
### 📱 Using Discovered Bug Hosts
Once you discover working bug hosts using BugScanX, you can use them to create configurations for various tunneling and VPN applications to bypass network restrictions.
## 🔧 Installation
### 📋 System Requirements
- **Python**: 3.7 or higher
- **Operating System**: Windows, Linux, macOS, Android (Termux)
- **Network**: Internet connection
### 🔨 Installation Methods
#### PyPI Installation (Recommended)
```bash
# Install latest stable version
pip install bugscan-x
# Install beta version
pip install --pre bugscan-x
```
#### Development Installation
```bash
# Clone repository
git clone https://github.com/Ayanrajpoot10/bugscanx.git
cd bugscanx
# Install in development mode
pip install -e .
```
### 🔗 Dependencies
BugScanX automatically installs the following dependencies:
```text
beautifulsoup4 # HTML parsing and web scraping
dnspython # DNS resolution and analysis
InquirerPy # Interactive CLI prompts
packaging # Version management
pyfiglet # ASCII art generation
requests # HTTP client library
rich # Rich console output
tqdm # Progress bars
```
## 🛠️ Tools Documentation
### 1️⃣ Host Scanner
Advanced bug host discovery with multiple scanning modes:
- **Direct Mode**: Standard HTTP/HTTPS bug host scanning
- **DirectNon302 Mode**: Excludes redirect responses (essential for clean bug hosts)
- **SSL/SNI Mode**: SNI hostname verification and TLS analysis
- **Proxy Mode**: Websocket upgrade testing and proxy validation
### 2️⃣ Subfinder
Professional subdomain enumeration using multiple sources:
- Certificate Transparency logs
- Search engines and APIs
- DNS records analysis
- Batch processing for multiple domains
### 3️⃣ IP Lookup
Reverse IP analysis for related bug host discovery:
- Multi-source domain lookup
- CIDR range processing
- Historical hosting data
### 4️⃣ File Toolkit
Advanced file processing operations:
```bash
[1] SPLIT FILE # Divide large bug host lists
[2] MERGE FILES # Combine multiple discoveries
[3] CLEAN FILE # Extract clean domains
[4] DEDUPLICATE # Remove duplicates
[5] FILTER BY TLD # Filter by domain extension
[6] FILTER BY KEYWORD # Filter by criteria
[7] CIDR TO IP # Expand network ranges
[8] DOMAIN TO IP # Resolve to IP addresses
```
### 5️⃣ Port Scanner
High-performance port enumeration:
- Common tunneling ports (80, 443, 8080, 8443, 8888)
- Full range scanning
- Service detection and connection testing
### 6️⃣ DNS Record Analyzer
Comprehensive DNS intelligence:
- A, AAAA, CNAME, MX, NS, TXT records
- IPv4/IPv6 address resolution
- Name server analysis
### 7️⃣ Host Info
Detailed host analysis and intelligence gathering:
- Network information and geolocation
- Web server analysis and fingerprinting
- SSL/TLS certificate analysis
- Security assessment and vulnerability detection
## ⚙️ Configuration
### 🛠️ Scanning Parameters
- **Thread Count**: Adjust concurrent threads (default: 50)
- **Timeout Settings**: Configure connection timeouts
- **Port Lists**: Customize target ports
- **HTTP Methods**: Select specific methods for discovery
### 📂 Output Configuration
- **File Formats**: TXT, JSON, CSV output options
- **Result Filtering**: Filter by response codes and content types
- **Logging Levels**: Adjust verbosity for debugging
### 🌐 Network Settings
- **Proxy Configuration**: Use proxy servers for scanning
- **DNS Settings**: Configure custom DNS servers
- **User Agent**: Customize HTTP user agent strings
### 🎯 Advanced Settings
- **DirectNon302 Mode**: Exclude redirect responses for clean bug hosts
- **SSL/SNI Configuration**: TLS version preferences and certificate validation
- **Timeout Settings**: SSL handshake and connection timeouts
## 🏗️ Architecture
BugScanX is built with a modular architecture for extensibility and performance:
### 🔧 Core Components
- **Module Handler**: Dynamic module loading and execution
- **Concurrency Engine**: Multi-threaded processing with ThreadPoolExecutor
- **Rich Console Interface**: Advanced console output with progress tracking
- **File Management**: Smart file operations and processing
- **Network Layer**: HTTP/HTTPS requests with proxy support
## 🤝 Contributing
We welcome contributions from the security community!
### 🐛 Bug Reports
Create an issue with:
- Clear description of the issue
- Steps to reproduce
- Environment details (OS, Python version, BugScanX version)
- Expected vs actual behavior
### 💡 Feature Requests
Include:
- Feature description and use case
- Implementation ideas
## ⚠️ Disclaimer
### 🚨 Important Notice
BugScanX is designed for **educational purposes** and **legitimate testing** only:
- ✅ **Learning**: Understanding tunneling and bypass techniques
- ✅ **Personal Use**: Testing your own networks and systems
- ✅ **Research**: Academic and educational research
- ✅ **Legal Testing**: Authorized penetration testing
### ⚠️ Responsible Usage
- **🔒 Legal Compliance**: Always comply with local laws
- **📋 Permission Required**: Only test systems you own or have permission to test
- **🤝 Respect Networks**: Avoid overwhelming target servers
- **🛡️ Ethical Use**: Use discovered bug hosts responsibly
- **❌ No Unauthorized Testing**: Never scan without proper authorization
### 📝 Usage Agreement
By using BugScanX, you agree to use the tool only for legitimate purposes and take full responsibility for your actions.
### 🚨 Legal Warning
**The developers are not responsible for any misuse of this tool. Users must ensure compliance with all applicable laws.**
## 📞 Support
### 💬 Community Support
- **Telegram**: [@BugScanX](https://t.me/BugScanX) - Community discussions
- **GitHub Issues**: [Report bugs and request features](https://github.com/Ayanrajpoot10/bugscanx/issues)
- **GitHub Discussions**: [Community Q&A](https://github.com/Ayanrajpoot10/bugscanx/discussions)
### 📚 Documentation
- **Built-in Help**: Use option `[10] HELP` in the application
- **Wiki**: [Comprehensive documentation](https://github.com/Ayanrajpoot10/bugscanx/wiki)
---
<div align="center">
<h3>Built with ❤️ for the Free Internet Community</h3>
<p>
<a href="https://github.com/Ayanrajpoot10">👨💻 Developer</a> •
<a href="https://t.me/BugScanX">💬 Telegram</a> •
<a href="https://github.com/Ayanrajpoot10/bugscanx/issues">🐛 Issues</a> •
<a href="https://pypi.org/project/bugscan-x/">📦 PyPI</a>
</p>
<p><sub>⚠️ This tool is intended for educational and authorized testing purposes only. Use responsibly and legally.</sub></p>
</div>
Raw data
{
"_id": null,
"home_page": null,
"name": "bugscan-x",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.7",
"maintainer_email": null,
"keywords": "sni, scanning-tool, subdomain-enumeration, bughost, cidr-scanning, reverse-ip-lookup",
"author": null,
"author_email": "Ayan Rajpoot <ayanrajpoot2004@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/8e/cf/9a5c76a2804c470ddb10c07e74e16861c25584b2b9b4cd86234d15dc25da/bugscan_x-2.0.7.tar.gz",
"platform": null,
"description": "<div align=\"center\">\n <img src=\"https://raw.githubusercontent.com/Ayanrajpoot10/bugscanx/refs/heads/main/assets/logo.png\" width=\"128\" height=\"128\"/>\n <h1>BugScanX</h1>\n <p><b>All-in-One Tool for Finding SNI Bug Hosts</b></p>\n <p>\ud83d\udd0d Bug Host Discovery \u2022 \ud83c\udf10 SNI Host Scanning \u2022 \ud83d\udee1\ufe0f HTTP Analysis \u2022 \ud83d\udcca Host Intelligence</p>\n</div>\n\n<p align=\"center\">\n <img src=\"https://img.shields.io/github/stars/Ayanrajpoot10/bugscanx?color=e57474&labelColor=1e2528&style=for-the-badge\"/>\n <img src=\"https://img.shields.io/pypi/dm/bugscan-x?color=67b0e8&labelColor=1e2528&style=for-the-badge\"/>\n <img src=\"https://img.shields.io/pypi/v/bugscan-x?color=8ccf7e&labelColor=1e2528&style=for-the-badge\"/>\n <img src=\"https://img.shields.io/github/license/Ayanrajpoot10/bugscanx?color=f39c12&labelColor=1e2528&style=for-the-badge\"/>\n <img src=\"https://img.shields.io/github/last-commit/Ayanrajpoot10/bugscanx?color=9b59b6&labelColor=1e2528&style=for-the-badge\"/>\n</p>\n\n<p align=\"center\">\n <img src=\"https://img.shields.io/badge/Python-3.7+-3776ab?style=for-the-badge&logo=python&logoColor=white\"/>\n <img src=\"https://img.shields.io/badge/Platform-Windows%20%7C%20Linux%20%7C%20macOS%20%7C%20Android-lightgrey?style=for-the-badge\"/>\n</p>\n\n\n## \ud83d\udccb Table of Contents\n\n- [\ud83c\udfaf Overview](#-overview)\n- [\u2728 Features](#-features)\n- [\u26a1 Quick Start](#-quick-start)\n- [\ud83d\udd27 Installation](#-installation)\n- [\ud83d\udee0\ufe0f Tools Documentation](#\ufe0f-tools-documentation)\n- [\ud83c\udfd7\ufe0f Architecture](#\ufe0f-architecture)\n- [\ud83e\udd1d Contributing](#-contributing)\n- [\u26a0\ufe0f Disclaimer](#\ufe0f-disclaimer)\n- [\ud83d\udcde Support](#-support)\n\n\n## \ud83c\udfaf Overview\n\n**BugScanX** is a specialized bug host discovery tool designed for finding working SNI/HTTP hosts that are suitable for tunneling applications. This tool helps users discover bug hosts that can be used to create configurations for various tunneling and VPN applications to enable unrestricted internet access.\n\n## \u2728 Features\n\n### \ud83c\udfaf Host Scanner\nAdvanced multi-mode bug host scanning with specialized capabilities:\n- **Direct Scanning**: HTTP/HTTPS bug host discovery with custom methods\n- **DirectNon302**: Specialized scanning that excludes redirect responses (essential for bug hosts)\n- **SSL/SNI Analysis**: TLS/SSL configuration analysis for SNI bug hosts\n- **Proxy Testing**: Comprehensive proxy validation for tunneling compatibility\n- **Ping Scanning**: Connectivity testing for discovered hosts\n- Support for all HTTP methods and custom payload injection\n- Multi-threaded concurrent processing\n\n### \ud83d\udd0d Subdomain Enumeration\nProfessional subdomain discovery for expanding bug host lists:\n- **Passive Discovery**: Leverages multiple API providers and search engines\n- **Batch Processing**: Mass domain enumeration from target lists\n\n### \ud83c\udf10 IP Lookup & Reverse DNS\nComprehensive IP intelligence for bug host clustering:\n- **Reverse IP Lookup**: Discover all domains hosted on target IPs\n- **CIDR Range Processing**: Bulk analysis of IP ranges\n- **Multi-Source Aggregation**: Combines data from multiple sources\n\n### \ud83d\udeaa Port Scanner\nAdvanced port scanning for service discovery with common tunneling ports (80, 443, 8080, 8443).\n\n### \ud83d\udd0e DNS & SSL Analysis\nComprehensive analysis for SNI bug hosts including DNS records and SSL certificate validation.\n\n### \ud83d\udcc1 File Management & Processing\nProfessional-grade file processing with smart splitting, merging, deduplication, and filtering tools.\n\n\n## \u26a1 Quick Start\n\n### \ud83d\ude80 Installation\n\n```bash\n# Install from PyPI\npip install bugscan-x\n```\n\n### \ud83c\udfae Launch BugScanX\n\n```bash\n# Primary command\nbugscanx\n\n# Alternative commands\nbugscan-x\nbx\n```\n\n### \ud83c\udfaf Interactive Menu\n\n```\n \u2554\u2557 \u2566 \u2566\u2554\u2550\u2557\u2554\u2550\u2557\u2554\u2550\u2557\u2554\u2550\u2557\u2554\u2557\u2554\u2550\u2557 \u2566\n \u2560\u2569\u2557\u2551 \u2551\u2551 \u2566\u255a\u2550\u2557\u2551 \u2560\u2550\u2563\u2551\u2551\u2551\u2554\u2569\u2566\u255d\n \u255a\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d\u255a\u2550\u255d\u2569 \u2569\u255d\u255a\u255d\u2569 \u255a\u2550\n\n[1] HOST SCANNER # Advanced bug host scanner with multiple modes\n[2] SUBFINDER # Subdomain enumeration with passive discovery modes\n[3] IP LOOKUP # Reverse IP lookup\n[4] FILE TOOLKIT # Bug host list management\n[5] PORT SCANNER # Port scanner to discover open ports\n[6] DNS RECORD # DNS record gathering\n[7] HOST INFO # Detailed bug host analysis\n[8] HELP # Documentation and usage examples\n[9] UPDATE # Self-update tool\n[0] EXIT # Quit application\n```\n\n### \ud83d\udcf1 Using Discovered Bug Hosts\n\nOnce you discover working bug hosts using BugScanX, you can use them to create configurations for various tunneling and VPN applications to bypass network restrictions.\n\n\n## \ud83d\udd27 Installation\n\n### \ud83d\udccb System Requirements\n\n- **Python**: 3.7 or higher\n- **Operating System**: Windows, Linux, macOS, Android (Termux)\n- **Network**: Internet connection\n\n### \ud83d\udd28 Installation Methods\n\n#### PyPI Installation (Recommended)\n\n```bash\n# Install latest stable version\npip install bugscan-x\n\n# Install beta version\npip install --pre bugscan-x\n```\n\n#### Development Installation\n\n```bash\n# Clone repository\ngit clone https://github.com/Ayanrajpoot10/bugscanx.git\ncd bugscanx\n\n# Install in development mode\npip install -e .\n```\n\n### \ud83d\udd17 Dependencies\n\nBugScanX automatically installs the following dependencies:\n\n```text\nbeautifulsoup4 # HTML parsing and web scraping\ndnspython # DNS resolution and analysis\nInquirerPy # Interactive CLI prompts\npackaging # Version management\npyfiglet # ASCII art generation\nrequests # HTTP client library\nrich # Rich console output\ntqdm # Progress bars\n```\n\n## \ud83d\udee0\ufe0f Tools Documentation\n\n### 1\ufe0f\u20e3 Host Scanner\n\nAdvanced bug host discovery with multiple scanning modes:\n\n- **Direct Mode**: Standard HTTP/HTTPS bug host scanning\n- **DirectNon302 Mode**: Excludes redirect responses (essential for clean bug hosts)\n- **SSL/SNI Mode**: SNI hostname verification and TLS analysis\n- **Proxy Mode**: Websocket upgrade testing and proxy validation\n\n### 2\ufe0f\u20e3 Subfinder\n\nProfessional subdomain enumeration using multiple sources:\n- Certificate Transparency logs\n- Search engines and APIs\n- DNS records analysis\n- Batch processing for multiple domains\n\n### 3\ufe0f\u20e3 IP Lookup\n\nReverse IP analysis for related bug host discovery:\n- Multi-source domain lookup\n- CIDR range processing\n- Historical hosting data\n\n### 4\ufe0f\u20e3 File Toolkit\n\nAdvanced file processing operations:\n```bash\n[1] SPLIT FILE # Divide large bug host lists\n[2] MERGE FILES # Combine multiple discoveries\n[3] CLEAN FILE # Extract clean domains\n[4] DEDUPLICATE # Remove duplicates\n[5] FILTER BY TLD # Filter by domain extension\n[6] FILTER BY KEYWORD # Filter by criteria\n[7] CIDR TO IP # Expand network ranges\n[8] DOMAIN TO IP # Resolve to IP addresses\n```\n\n### 5\ufe0f\u20e3 Port Scanner\n\nHigh-performance port enumeration:\n- Common tunneling ports (80, 443, 8080, 8443, 8888)\n- Full range scanning\n- Service detection and connection testing\n\n### 6\ufe0f\u20e3 DNS Record Analyzer\n\nComprehensive DNS intelligence:\n- A, AAAA, CNAME, MX, NS, TXT records\n- IPv4/IPv6 address resolution\n- Name server analysis\n\n### 7\ufe0f\u20e3 Host Info\n\nDetailed host analysis and intelligence gathering:\n- Network information and geolocation\n- Web server analysis and fingerprinting\n- SSL/TLS certificate analysis\n- Security assessment and vulnerability detection\n\n\n## \u2699\ufe0f Configuration\n\n### \ud83d\udee0\ufe0f Scanning Parameters\n- **Thread Count**: Adjust concurrent threads (default: 50)\n- **Timeout Settings**: Configure connection timeouts\n- **Port Lists**: Customize target ports\n- **HTTP Methods**: Select specific methods for discovery\n\n### \ud83d\udcc2 Output Configuration\n- **File Formats**: TXT, JSON, CSV output options\n- **Result Filtering**: Filter by response codes and content types\n- **Logging Levels**: Adjust verbosity for debugging\n\n### \ud83c\udf10 Network Settings\n- **Proxy Configuration**: Use proxy servers for scanning\n- **DNS Settings**: Configure custom DNS servers\n- **User Agent**: Customize HTTP user agent strings\n\n### \ud83c\udfaf Advanced Settings\n- **DirectNon302 Mode**: Exclude redirect responses for clean bug hosts\n- **SSL/SNI Configuration**: TLS version preferences and certificate validation\n- **Timeout Settings**: SSL handshake and connection timeouts\n\n\n## \ud83c\udfd7\ufe0f Architecture\n\nBugScanX is built with a modular architecture for extensibility and performance:\n\n### \ud83d\udd27 Core Components\n\n- **Module Handler**: Dynamic module loading and execution\n- **Concurrency Engine**: Multi-threaded processing with ThreadPoolExecutor\n- **Rich Console Interface**: Advanced console output with progress tracking\n- **File Management**: Smart file operations and processing\n- **Network Layer**: HTTP/HTTPS requests with proxy support\n\n\n## \ud83e\udd1d Contributing\n\nWe welcome contributions from the security community!\n\n### \ud83d\udc1b Bug Reports\n\nCreate an issue with:\n- Clear description of the issue\n- Steps to reproduce\n- Environment details (OS, Python version, BugScanX version)\n- Expected vs actual behavior\n\n### \ud83d\udca1 Feature Requests\n\nInclude:\n- Feature description and use case\n- Implementation ideas\n\n\n## \u26a0\ufe0f Disclaimer\n\n### \ud83d\udea8 Important Notice\n\nBugScanX is designed for **educational purposes** and **legitimate testing** only:\n\n- \u2705 **Learning**: Understanding tunneling and bypass techniques\n- \u2705 **Personal Use**: Testing your own networks and systems\n- \u2705 **Research**: Academic and educational research\n- \u2705 **Legal Testing**: Authorized penetration testing\n\n### \u26a0\ufe0f Responsible Usage\n\n- **\ud83d\udd12 Legal Compliance**: Always comply with local laws\n- **\ud83d\udccb Permission Required**: Only test systems you own or have permission to test\n- **\ud83e\udd1d Respect Networks**: Avoid overwhelming target servers\n- **\ud83d\udee1\ufe0f Ethical Use**: Use discovered bug hosts responsibly\n- **\u274c No Unauthorized Testing**: Never scan without proper authorization\n\n### \ud83d\udcdd Usage Agreement\n\nBy using BugScanX, you agree to use the tool only for legitimate purposes and take full responsibility for your actions.\n\n### \ud83d\udea8 Legal Warning\n\n**The developers are not responsible for any misuse of this tool. Users must ensure compliance with all applicable laws.**\n\n\n## \ud83d\udcde Support\n\n### \ud83d\udcac Community Support\n\n- **Telegram**: [@BugScanX](https://t.me/BugScanX) - Community discussions\n- **GitHub Issues**: [Report bugs and request features](https://github.com/Ayanrajpoot10/bugscanx/issues)\n- **GitHub Discussions**: [Community Q&A](https://github.com/Ayanrajpoot10/bugscanx/discussions)\n\n### \ud83d\udcda Documentation\n\n- **Built-in Help**: Use option `[10] HELP` in the application\n- **Wiki**: [Comprehensive documentation](https://github.com/Ayanrajpoot10/bugscanx/wiki)\n\n\n---\n\n\n<div align=\"center\">\n <h3>Built with \u2764\ufe0f for the Free Internet Community</h3>\n <p>\n <a href=\"https://github.com/Ayanrajpoot10\">\ud83d\udc68\u200d\ud83d\udcbb Developer</a> \u2022\n <a href=\"https://t.me/BugScanX\">\ud83d\udcac Telegram</a> \u2022\n <a href=\"https://github.com/Ayanrajpoot10/bugscanx/issues\">\ud83d\udc1b Issues</a> \u2022\n <a href=\"https://pypi.org/project/bugscan-x/\">\ud83d\udce6 PyPI</a>\n </p>\n <p><sub>\u26a0\ufe0f This tool is intended for educational and authorized testing purposes only. Use responsibly and legally.</sub></p>\n</div>\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "All-in-one tool for SNI discovery",
"version": "2.0.7",
"project_urls": {
"Homepage": "https://github.com/Ayanrajpoot10/bugscanx"
},
"split_keywords": [
"sni",
" scanning-tool",
" subdomain-enumeration",
" bughost",
" cidr-scanning",
" reverse-ip-lookup"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "17837d9919e376e99d33c0ec7d81ca059918bc48d4cd490647e0931fac5cb68b",
"md5": "49168abbd7fb54145a42aa9251856e34",
"sha256": "36378e49182ade85c46adc0bc0352259818a68b94b074e018404686c4945f072"
},
"downloads": -1,
"filename": "bugscan_x-2.0.7-py3-none-any.whl",
"has_sig": false,
"md5_digest": "49168abbd7fb54145a42aa9251856e34",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7",
"size": 51522,
"upload_time": "2025-07-10T05:42:12",
"upload_time_iso_8601": "2025-07-10T05:42:12.907626Z",
"url": "https://files.pythonhosted.org/packages/17/83/7d9919e376e99d33c0ec7d81ca059918bc48d4cd490647e0931fac5cb68b/bugscan_x-2.0.7-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "8ecf9a5c76a2804c470ddb10c07e74e16861c25584b2b9b4cd86234d15dc25da",
"md5": "3e2bce89309e89d3aeb87c9f1574a129",
"sha256": "f51e412ae2178ca0cc37057293fe80350de30adbfb68b705e65d1da2272612a1"
},
"downloads": -1,
"filename": "bugscan_x-2.0.7.tar.gz",
"has_sig": false,
"md5_digest": "3e2bce89309e89d3aeb87c9f1574a129",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7",
"size": 38282,
"upload_time": "2025-07-10T05:42:14",
"upload_time_iso_8601": "2025-07-10T05:42:14.207915Z",
"url": "https://files.pythonhosted.org/packages/8e/cf/9a5c76a2804c470ddb10c07e74e16861c25584b2b9b4cd86234d15dc25da/bugscan_x-2.0.7.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-10 05:42:14",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "Ayanrajpoot10",
"github_project": "bugscanx",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"lcname": "bugscan-x"
}