PentestPad / subzy

Subdomain takeover vulnerability checker
https://www.pentestpad.com
GNU General Public License v2.0
1.06k stars 156 forks source link
bugbounty cybersecurity security-research security-vulnerability subdomain-takeover

Subzy

Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz

<img src="https://img.shields.io/twitter/follow/return_0x.svg?style=social&logo=twitter" alt="follow on Twitter">

Subzy subdomain takeover

Installation

go install -v github.com/PentestPad/subzy@latest

If $GOBIN and $GOPATH are properly set, execute the program as:

$ subzy --help
Subdomain takeover tool

Usage:
  subzy [command]

Available Commands:
  help        Help about any command
  run         Run subzy
  version     Print subzy version

Flags:
  -h, --help   help for subzy

Use "subzy [command] --help" for more information about a command.

If you get an error exec format error: ./subzy, you need to install Golang for your OS and compile the program by running go build -o subzy main.go which will generate new subzy binary file

Options

Only required flag for run subcommand(r short version) is either --target or --targets

--target (string) - Set single or multiple (comma separated) target subdomain/s
--targets (string) - File name/path to list of subdomains
--concurrency (integer) - Number of concurrent checks (default 10)
--hide_fails (boolean) - Hide failed checks and invulnerable subdomains (default false)
--https (boolean) - Use HTTPS by default if protocol not defined on targeted subdomain (default false)
--timeout (integer) - HTTP request timeout in seconds (default 10)
--verify_ssl (boolean) - If set to true, it won't check site with invalid SSL

Usage

Target subdomain can have protocol defined, if not http:// will be used by default if --https not specifically set to true.

Command aliases

Each subzy subcommand has its own short version. Running subzy version or subzy v is the same.