.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.2. .TH KNOCKPY "1" "December 2015" "knockpy 3.0.0" "User Commands" .SH NAME knockpy \- Python tool designed to enumerate subdomains on a target domain .SH DESCRIPTION usage: knockpy [\-h] [\-v] [\-w WORDLIST] [\-r] [\-z] domain .IP ___________________________________________ .IP knock subdomain scan (aka knockpy) | v.3.0 Author: Gianni 'guelfoweb' Amato Github: https://github.com/guelfoweb/knock ___________________________________________ .SS "positional arguments:" .TP domain specific target domain, like domain.com .SS "optional arguments:" .TP \fB\-h\fR, \fB\-\-help\fR show this help message and exit .TP \fB\-v\fR, \fB\-\-version\fR show program's version number and exit .TP \fB\-w\fR WORDLIST specific path to wordlist file .TP \fB\-r\fR, \fB\-\-resolve\fR resolve ip or domain name .TP \fB\-z\fR, \fB\-\-zone\fR check for zone transfer .PP EXAMPLE: .PP subdomain scan with internal wordlist .IP knockpy domain.com .PP resolve domain name and get response headers .IP knockpy \fB\-r\fR domain.com .PP check zone transfer for domain name .IP knockpy \fB\-z\fR domain.com .PP The ALIAS name is marked in yellow