recon_vhost
Identify virtual hosts by fuzzing Host headers with a wordlist to discover hidden subdomains and web applications during security testing.
Instructions
Brute-force virtual hosts by fuzzing the Host header. Returns baseline_length, results (vhost/status/length/length_delta), unique_vhosts, and tested count. Read-only, sends one request per wordlist entry.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| target | Yes | Target IP or domain to send requests to | |
| base_domain | Yes | Base domain for vhost names, e.g. hackycorp.com | |
| wordlist | No | Path to wordlist file. Uses built-in common subdomains if not provided. |