Subdomain enumeration & visualization tool for api.c99.nl. Written in PowerShell for Linux & Neo4J AuraDB.
Created for external penetration testers, red team operators, & network security engineers.
- Clone the C99DomainHunter repository
git clone https://github.com/ndr-repo/C99DomainHunter.git
- Add your C99.nl API key to the .key file
- Run the collection & enrichment script for your target domain.
pwsh ./C99DomainHunter.ps1 targetDomain.tld
- Downloads results from C99.nl Subdomain Finder API.
- Enriches results with DNS type ALL resolutions via DoH.
- Parses results and saves enriched data to CSV.
- Results are saved to the log folder inside your C99DomainHunter directory
- Import the enriched CSV results using the included DoH graph model
- Create a dashboard using the included Cypher queries


- Displays top 10 hosts with most unique resolved DNS entries
MATCH (n:Name)-[r:Resolves]->(d:Data)
RETURN d.data as name, count(DISTINCT n.name) AS uniqueResolvedCount
ORDER BY uniqueResolvedCount DESC LIMIT 10
