.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.3. .TH KNOCKPY "1" "February 2017" "knockpy 4.0.0" "User Commands" .SH NAME knockpy \- Python tool designed to enumerate subdomains on a target domain .SH DESCRIPTION usage: knockpy [\-h] [\-v] [\-w WORDLIST] [\-r] [\-c] [\-j] domain .PP ___________________________________________ .PP knock subdomain scan knockpy v.4.0 Author: Gianni 'guelfoweb' Amato Github: https://github.com/guelfoweb/knock ___________________________________________ .SS "positional arguments:" .TP domain target to scan, like domain.com .SS "optional arguments:" .TP \fB\-h\fR, \fB\-\-help\fR show this help message and exit .TP \fB\-v\fR, \fB\-\-version\fR show program's version number and exit .TP \fB\-w\fR WORDLIST specific path to wordlist file .TP \fB\-r\fR, \fB\-\-resolve\fR resolve ip or domain name .TP \fB\-c\fR, \fB\-\-csv\fR save output in csv .TP \fB\-j\fR, \fB\-\-json\fR export full report in JSON .SS "example:" .IP knockpy domain.com knockpy domain.com \fB\-w\fR wordlist.txt knockpy \fB\-r\fR domain.com or IP knockpy \fB\-c\fR domain.com knockpy \fB\-j\fR domain.com