Subdomain Takeover Finder is a Python tool designed to streamline the discovery and validation of subdomains for potential takeover threats. It automates key processes using assetfinder and subzy, allowing users to effortlessly check subdomain vulnerabilities with minimal input.
Subdomain Takeover Finder is a powerful Python tool designed to streamline the identification and validation of subdomains with a focus on uncovering potential takeover vulnerabilities. This tool harnesses the capabilities of assetfinder and subzy, automating the process of subdomain enumeration, cleaning, validation, and associated checks for easy and effective use.
Key Features
- Automated Subdomain Discovery: Automatically collects subdomains using assetfinder, saving you time and effort.
- Subdomain Cleaning and Validation: Efficiently filters out invalid or wildcard subdomains, ensuring that only valid domains are processed for deeper analysis.
- Subdomain Takeover Checks: Leverages subzy to systematically check for any takeover vulnerabilities within the discovered subdomains.
- User-Friendly Execution: Minimal input is required upon execution, and the tool manages file creation and processing seamlessly.
Requirements
To utilize Subdomain Takeover Finder, ensure you have the following installed:
- Python 3.6 or later.
- The essential tools: assetfinder and subzy.
You will also need to set your environment variables for GOPATH and GOBIN:
export GOPATH=$HOME/go
export GOBIN=$GOPATH/bin
export PATH=$PATH:$GOBIN
Usage Instructions
To run the tool, simply execute the following command:
python subdomain_takeover_finder.py
Follow the prompt to enter the target domain, for example:
Enter the domain (e.g., example.com): example.com
Once executed, the tool will:
- Utilize assetfinder to enumerate subdomains, saving them in a file named
<domain>_raw.txt
. - Clean and validate these subdomains, with results stored in
<domain>_cleaned.txt
. - Check for subdomain takeover vulnerabilities, with outputs displayed in your terminal.
Output Files
The tool generates several outputs:
- Raw Subdomains are saved in the file
<domain>_raw.txt
. - Cleaned Subdomains are documented in
<domain>_cleaned.txt
. - Subzy Output is directly displayed for immediate review in the terminal.
Contributing
We welcome contributions! Feel free to submit issues or pull requests to enhance the functionality of the tool.
Disclaimer
This tool is strictly for educational and ethical purposes. The author disclaims any responsibility for misuse. Always seek proper authorization before scanning or testing any domain.
No comments yet.
Sign in to be the first to comment.