Skip to content
/ subzy Public
forked from PentestPad/subzy

Subdomain takeover vulnerability checker

License

Notifications You must be signed in to change notification settings

x0xman/subzy

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Subzy

Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz

follow on Twitter

Subzy subdomain takeover

Installation

go get -u -v github.com/lukasikic/subzy
go install -v github.com/lukasikic/subzy@latest

If $GOBIN and $GOPATH are properly set, execute the program as:

subzy

If you get an error exec format error: ./subzy, you need to install Golang for your OS and compile the program by running go build subzy.go which will generate new subzy binary file

Options

Only required flag is either --target or --targets

--target (string) - Set single or multiple (comma separated) target subdomain/s
--targets (string) - File name/path to list of subdomains
--concurrency (integer) - Number of concurrent checks (default 10)
--hide_fails (boolean) - Hide failed checks and invulnerable subdomains (default false)
--https (boolean) - Use HTTPS by default if protocol not defined on targeted subdomain (default false)
--timeout (integer) - HTTP request timeout in seconds (default 10)
--verify_ssl (boolean) - If set to true, it won't check site with invalid SSL

Usage

Target subdomain can have protocol defined, if not http:// will be used by default if --https not specifically set to true.

  • List of subdomains

    • ./subzy -targets list.txt
  • Single or multiple targets

    • ./subzy -target test.google.com
    • ./subzy -target test.google.com,https://test.yahoo.com

About

Subdomain takeover vulnerability checker

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 79.1%
  • Makefile 20.9%