.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.6. .TH KNOCKPY "1" "May 2020" "knockpy 4.1.1" "User Commands" .SH NAME knockpy \- Python3 tool designed to enumerate subdomains on a target domain .SH DESCRIPTION usage: knockpy [\-h] [\-\-version] [\-w WORDLIST] [\-r] [\-c] [\-f] [\-j] domain .PP ___________________________________________ .PP knock subdomain scan knockpy v.4.1.1 Author: Gianni 'guelfoweb' Amato Github: https://github.com/guelfoweb/knock ___________________________________________ .SS "positional arguments:" .TP domain target to scan, like domain.com .SS "optional arguments:" .TP \fB\-h\fR, \fB\-\-help\fR show this help message and exit .TP \fB\-\-version\fR show program's version number and exit .TP \fB\-w\fR WORDLIST specific path to wordlist file .TP \fB\-r\fR, \fB\-\-resolve\fR resolve single ip or domain name .TP \fB\-c\fR, \fB\-\-csv\fR save output in csv .TP \fB\-f\fR, \fB\-\-csvfields\fR add fields name to the first row of csv output file .TP \fB\-j\fR, \fB\-\-json\fR export full report in JSON .SS "example:" .IP knockpy domain.com knockpy domain.com \fB\-w\fR wordlist.txt knockpy \fB\-r\fR domain.com or IP knockpy \fB\-c\fR domain.com knockpy \fB\-j\fR domain.com .PP For virustotal subdomains support you can setting your API KEY in the config.json file.