CertCrunchy – Just A Silly Recon Tool That Uses Data From SSL Certificates To Find Potential Host Names

It just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/https://certdb.com/https://sslmate.com/certspotter/ and https://censys.io or given a IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for a API key.
How to install

git clone https://github.com/joda32/CertCrunchy.git
cd CertCrunchy
sudo pip3 install -r requirements.txt

How to use it?
Very simply -d to get hostnames for specific domain
-D to get hostnames for a list of domains (just stuff it in a line delimited text file)
-i to retrieve and parse certificates from hosts in a netblock / ip range (e.g.
-T the thread count, makes stuff faster, but don’t over do it
-o Output file name
-f Output format csv or json, csv is the default
for the rest, I’m still working on those 🙂

API keys and configs
All API keys are stored in the api_keys.py file, below is a list of supported APIs requiring API keys.

  1. Censys.oi https://censys.io
  2. VirusTotal https://www.virustotal.com/en/documentation/public-api/

Download CertCrunchy


This is only an educational purposes only I am not responsible for further activities

Join my forum and learn more ethical hacking and penetration testing


Get me at







Leave a Reply

Your email address will not be published. Required fields are marked *