Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Extracting Targets

The bbscope db get commands extract specific target types from the database, formatted for direct use with recon tools.

Wildcards

# Standard wildcard extraction
bbscope db get wildcards

# Aggressive mode: extracts root domains even from subdomains
bbscope db get wildcards --aggressive

# Filter by platform
bbscope db get wildcards --platform h1

Wildcards are deduplicated and sorted. Shared hosting / cloud provider domains are automatically filtered out (e.g., *.amazonaws.com, *.herokuapp.com, *.azurewebsites.net, and ~20 others).

Piping to recon tools

# Subdomain enumeration
bbscope db get wildcards | subfinder -silent | httpx -silent

# Aggressive mode for broader coverage
bbscope db get wildcards --aggressive | subfinder -silent

Domains

bbscope db get domains

Returns non-URL, non-IP targets that contain a dot (e.g., app.example.com).

URLs

bbscope db get urls

Returns targets starting with http:// or https://.

IPs

bbscope db get ips

Extracts IP addresses, including from URL targets.

CIDRs

bbscope db get cidrs

Returns CIDR ranges and IP ranges from scope entries.

Common flags

All db get subcommands support:

FlagShortDefaultDescription
--platformFilter by platform name
--output-otOutput flags
--delimiter-d" "Delimiter