This script will scan all domains with TLS 1.3
and h2
enabled on your VPS IP address range. These domains are useful for SNI domain names in various configurations and tests.
When you begin the scan, two files are created: results.txt
contains the output log, while domains.txt
only contains the domain names.
It is recommended to run this scanner locally (with your residential internet). It may cause VPS to be flagged if you run a scanner in the cloud.
Be careful when choosing an architecture, all binaries are available in two versions - amd64
and arm64
.
-
wget "https://github.com/hawshemi/SNI-Finder/releases/latest/download/SNI-Finder-$(uname -s | tr A-Z a-z)-amd64" -O SNI-Finder && chmod +x SNI-Finder
-
./SNI-Finder -addr ip
- Download from Releases.
- Open
CMD
orPowershell
in the directory. -
.\SNI-Finder-windows-amd64.exe -addr ip
sudo apt install -y wget
wget "https://raw.githubusercontent.com/hawshemi/SNI-Finder/main/install-go.sh" -O install-go.sh && chmod +x install-go.sh && bash install-go.sh
- Reboot is recommended.
git clone https://github.com/hawshemi/SNI-Finder.git
cd SNI-Finder
go get github.com/sirupsen/logrus
CGO_ENABLED=0 go build