All Projects → r3curs1v3-pr0xy → sub404

r3curs1v3-pr0xy / sub404

Licence: GPL-3.0 License
A python tool to check subdomain takeover vulnerability

Programming Languages

python
139335 projects - #7 most used programming language
Dockerfile
14818 projects

Projects that are alternatives of or similar to sub404

Subjack
Subdomain Takeover tool written in Go
Stars: ✭ 1,194 (+482.44%)
Mutual labels:  subdomain, bug-bounty, pentesting, bugbounty
Subover
A Powerful Subdomain Takeover Tool
Stars: ✭ 607 (+196.1%)
Mutual labels:  subdomain, bug-bounty, pentesting, bugbounty
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+148.29%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+3434.63%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+140%)
Mutual labels:  subdomain, pentesting, bugbounty
Commix
Automated All-in-One OS Command Injection Exploitation Tool.
Stars: ✭ 3,016 (+1371.22%)
Mutual labels:  pentesting, bugbounty, vulnerability-scanner
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+60%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+1949.76%)
Mutual labels:  subdomain, bugbounty, subdomain-takeover
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+1577.56%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Acamar
A Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-56.59%)
Mutual labels:  subdomain, pentesting, bugbounty
Subtake
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-49.27%)
Mutual labels:  subdomain, bug-bounty, pentesting
Burpbounty
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+400.49%)
Mutual labels:  bug-bounty, bugbounty, vulnerability-scanner
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+133.17%)
Mutual labels:  subdomain, bugbounty, bugbounty-tool
VPS-Bug-Bounty-Tools
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (-78.54%)
Mutual labels:  bug-bounty, bugbounty, bugbounty-tool
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-65.85%)
Mutual labels:  subdomain, bug-bounty, bugbounty
continuous-nuclei
Running nuclei Continuously
Stars: ✭ 45 (-78.05%)
Mutual labels:  bugbounty, bugbounty-tool
Nightingale
It's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-41.95%)
Mutual labels:  bug-bounty, bugbounty
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+162.44%)
Mutual labels:  pentesting, bugbounty
cf-check
CloudFlare Checker written in Go
Stars: ✭ 147 (-28.29%)
Mutual labels:  bugbounty, bugbounty-tool
Passivehunter
Subdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (-59.51%)
Mutual labels:  bugbounty, bugbounty-tool

Sub404: A Fast Tool To Check Subdomain Takeover Vulnerability

Banner

What is Sub 404

Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerability and it is fast as it is asynchronous.

Why

During recon process you might get a lot of subdomains(e.g more than 10k). It is not possible to test each manually or with traditional requests or urllib method as it is very slow. Using Sub 404 you can automate this task in much faster way. Sub 404 uses aiohttp/asyncio which makes this tool asynchronous and faster.

How it works

Sub 404 uses subdomains list from text file and checks for url of 404 Not Found status code and in addition it fetches CNAME(Canonical name) and removes those URL which have target domain name in CNAME. It also combines result from subfinder and sublist3r(subdomain enumeration tool) if you don't have target subdomains as two is better than one. But for this sublist3r and subfinder tools must be installed in your system. Sub 404 is able to check 7K subdomains in less than 5 minutes.

Key Features:

- Fast (as it is asynchronous)
- Uses two more tools to increase efficiency
- Saves result in a text file for future reference
- Umm thats it, nothing much !

How to use:

Note: Only works on Python3.7+

Using docker

As an alternative, it is also possible to build a Docker image, so no prerequisites are necessary.

$ docker build -t sub404 .
$ docker run --rm sub404 -h

Usage example:

Note: If subfinder and sublist3r is installed.
This combines result from sublist3r and subfinder tool and checks for possibility of takeover.
$ python3 sub404.py -d anydomain.com

Example


- If subfinder and sublist3r is not installed, provide subdomains in text file
$ python3 sub404.py -f subdomain.txt

Example

Note:

This tool is mostly tested in linux but should works on other OS too.

Usage options:

$ python3 sub404.py -h

This will display help for the tool. Here are all the switches it supports.

Flag Description Example
-d Domain name of the taget. python3 sub404.py -d noobarmy.tech
-f Provide location of subdomain file to check for takeover if subfinder is not installed. python3 sub404.py -f subdomain.txt
-p Set protocol for requests. Default is "http". python3 sub404.py -f subdomain.txt -p https or python3 sub404.py -d noobarmy.tech -p https
-o Output unique subdomains of sublist3r and subfinder to text file. Default is "uniqueURL.txt" python3 sub404.py -d noobarmy.tech -o output.txt
-h show this help message and exit python3 sub404.py -h

Note:

This tool fetches CNAME of 404 response code URL and removes all URL which have target domain in CNAME. So chances of false positives are high.

Contributing to Sub 404:

- Report bugs, missing best practices
- DM me with new ideas
- Help in Fixing bugs

My Twitter:

Say Hello r3curs1v3_pr0xy

Credits:

Ice3man543 - Projectdiscovery's subfinder tool is used to enumerate subdomains
aboul3la - aboul3la's sublist3r tool is used to enumerate subdomains

Current version is 1.0

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].