A Tribute to The Hacker's Choice Legacy
We want to express our deepest gratitude to The Hacker's Choice (THC) - one of the oldest and most respected hacker groups in the infosec community. Since 1995, THC has been pioneering security research, developing legendary tools, and sharing knowledge with the community.
Their latest contribution, ip.thc.org, is a game-changer for reconnaissance operations. This service provides:
- π Reverse DNS lookups across the entire internet
- π Subdomain enumeration from massive datasets
- π CNAME tracking for infrastructure mapping
- π¦ Monthly bulk dumps with ~4.75 billion records
What makes it truly remarkable? It's completely free and open. No "$199/month OSINT-as-a-Service" nonsense. This is how OSINT tools should look in 2025.
π― Introducing THC Scalpel
THC Scalpel is our contribution to the community - a toolkit that automates reconnaissance workflows using the ip.thc.org API with advanced stealth capabilities.
β‘ Key Features
- Reverse DNS Resolution - IP to hostname mapping for single IPs or entire subnets
- Subdomain Discovery - Comprehensive subdomain enumeration
- CNAME Lookup - Find domains pointing to your target
- Bulk Operations - Parallel processing with configurable threading
- Stealth Mode - Customizable delays and rate limiting
- Smart Filtering - Keyword-based filtering for interesting targets (admin, dev, staging, etc.)
- Multiple Output Formats - JSON, CSV, XML support
- Cross-Platform - Python and PowerShell implementations
π¦ What We're Open-Sourcing
For ethical and operational security reasons, we're releasing only 2 out of 4 tools from our internal toolkit:
β Public Release (GitHub)
-
thc-scalpel.py- Python-based reconnaissance tool -
thc-scalpel.ps1- PowerShell version for Windows environments
π Private (Internal Use Only)
The following remain proprietary to hackteam.red:
- Bulk dump analyzer - DuckDB-powered analysis of 4.75B+ records
- Framework integration module - Metasploit, Nuclei, Amass, etc.
- Advanced automation scripts - Custom workflows and OPSEC features
These tools are too powerful for public release and are reserved for our authorized red team engagements.
π Quick Start
Python Version
# Installation
git clone https://github.com/toxy4ny/thc-scalpel
cd thc-scalpel
pip install -r requirements.txt
# Basic usage
python thc-scalpel.py -i 140.82.121.3 # Single IP
python thc-scalpel.py -s 140.82.121.0/24 # Subnet scan
python thc-scalpel.py -d github.com # Subdomain enum
python thc-scalpel.py -c pages.github.com # CNAME lookup
# Bulk reconnaissance
python thc-scalpel.py -f targets.txt -t ip -o results.json
# Stealth mode with filtering
python thc-scalpel.py -d example.com \
-k admin,dev,test,staging \
--delay 2.0 \
--threads 3 \
-o interesting.json
PowerShell Version
# Basic usage
.\thc-scalpel.ps1 -Target "140.82.121.3" -Type rdns
# Subdomain discovery with output
.\thc-scalpel.ps1 -Target "github.com" -Type subdomain -OutputFile results.json
# Bulk operations
.\thc-scalpel.ps1 -InputFile targets.txt -Type rdns -Delay 1 -Threads 3
# Stealth mode
.\thc-scalpel.ps1 -InputFile domains.txt -Type subdomain -Stealth
π Real-World Red Team Scenarios
Scenario 1: Attack Surface Expansion
# Step 1: Discover subdomains
python thc-scalpel.py -d target-company.com -o subdomains.json
# Step 2: Filter interesting targets
python thc-scalpel.py -d target-company.com \
-k admin,dev,test,staging,api,internal \
-o high_value_targets.json
# Step 3: Map infrastructure
python thc-scalpel.py -f high_value_targets.json -t domain -o infrastructure.json
Scenario 2: Shadow Infrastructure Discovery
# Find forgotten/legacy systems
python thc-scalpel.py -d target.com \
-k old,legacy,backup,archive,deprecated \
-o shadow_infra.json
# Discover dev/test environments (often poorly secured)
python thc-scalpel.py -d target.com \
-k dev,test,staging,qa,demo,sandbox \
-o dev_environments.json
Scenario 3: Bug Bounty Reconnaissance
# Comprehensive subdomain discovery
python thc-scalpel.py -d bugbounty-target.com -o api_results.json
# Find interesting endpoints
python thc-scalpel.py -d target.com -k api,admin,upload -o endpoints.json
# CNAME lookup for subdomain takeover opportunities
for subdomain in $(cat api_results.json | jq -r '.[] | .data[]' | awk '{print $2}'); do
python thc-scalpel.py -c $subdomain -o "cname_${subdomain}.json"
done
π‘οΈ OPSEC & Stealth Considerations
Built-in Stealth Features
# Increase delays between requests
python thc-scalpel.py -f targets.txt --delay 2.0 --threads 2
# Use minimal threading
python thc-scalpel.py -f large_list.txt --threads 1 --delay 3.0
Best Practices
β DO:
- Use stealth mode for sensitive engagements
- Vary your User-Agent strings
- Route through VPN/Tor for API requests
- Split large target lists across multiple IPs
- Use time-based distribution (spread over hours/days)
β DON'T:
- Hammer the API without delays
- Run bulk scans from corporate IPs
- Use default User-Agents
- Ignore rate limiting
π Output Examples
JSON Output
{
"github.com": {
"success": true,
"data": [
"140.82.121.3 github.com",
"140.82.121.4 api.github.com",
"140.82.121.5 assets-cdn.github.com"
],
"count": 3
}
}
CSV Output
Target,IP,Hostname
github.com,140.82.121.3,github.com
github.com,140.82.121.4,api.github.com
github.com,140.82.121.5,assets-cdn.github.com
π Legal & Ethical Use
β οΈ IMPORTANT: THC Scalpel is designed EXCLUSIVELY for:
- β Authorized penetration testing engagements
- β Bug bounty programs with explicit permission
- β Educational labs and CTF competitions
- β Analysis of your own infrastructure
Unauthorized use is illegal and punishable by law.
Before Using This Tool:
- Ensure you have written authorization for testing
- Verify the target is within the scope of your engagement
- Follow all rules of engagement and legal requirements
- Respect rate limits and terms of service
π’ About hackteam.red
hackteam.red is a boutique offensive security firm specializing in:
- π― Advanced Persistent Threat (APT) simulation
- π΄ Full-spectrum Red Team operations
- π‘οΈ Purple Team exercises
- π Security research and tool development
We maintain a private arsenal of proprietary tools for authorized client engagements. THC Scalpel represents our commitment to giving back to the community while maintaining operational security for our clients.
Interested in our services? Contact us at: b0x@hackteam.red
π€ Contributing
While the bulk analyzer and framework integrations remain private, we welcome contributions to the public tools:
- π Bug reports and fixes
- π Documentation improvements
- β¨ Feature suggestions (within ethical boundaries)
- π Translations
Pull requests are welcome!
π Additional Resources
- ip.thc.org Documentation
- THC Archive
- OWASP Testing Guide
- MITRE ATT&CK - Reconnaissance
- PTES Technical Guidelines
π Acknowledgments
Massive respect to:
- The Hacker's Choice (THC) - For 30 years of legendary contributions to the security community
- van Hauser & THC Team - For creating and maintaining ip.thc.org
- The OSINT Community - For continuous innovation in reconnaissance techniques
- Bug Bounty Hunters - For pushing the boundaries of ethical hacking
π License
THC Scalpel is released under the MIT License.
Copyright (c) 2025 hackteam.red
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
π Links
- GitHub Repository: github.com/toxy4ny/thc-scalpel
- Company Website: hackteam.red
- Twitter: @hackteam_red
π¬ Final Thoughts
The security community thrives on knowledge sharing and collaboration. THC has exemplified this ethos for three decades, and we're honored to contribute our small part.
Remember: With great power comes great responsibility. Use these tools ethically, legally, and always with proper authorization.
Stay curious. Stay ethical. Stay sharp. πͺ
Article written by the hackteam.red offensive security research team
Special thanks to THC for inspiring a generation of security researchers
π’ Spread the Word
If you find THC Scalpel useful, please:
- β Star the repository
- π Share with your network
- π¬ Provide feedback
- π Report issues
Let's build better security tools together!
Top comments (0)