All Projects → LukaSikic → Subzy

LukaSikic / Subzy

Licence: gpl-2.0
Subdomain takeover vulnerability checker

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to Subzy

Zile
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-78.75%)
Mutual labels:  cybersecurity, bugbounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-72.47%)
Mutual labels:  cybersecurity, bugbounty
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2981.53%)
Mutual labels:  cybersecurity, security-vulnerability
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-36.59%)
Mutual labels:  security-vulnerability, bugbounty
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+164.81%)
Mutual labels:  cybersecurity, bugbounty
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+5.92%)
Mutual labels:  cybersecurity, bugbounty
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.11%)
Mutual labels:  cybersecurity, bugbounty
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+20.21%)
Mutual labels:  security-vulnerability, bugbounty
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-84.32%)
Mutual labels:  cybersecurity, bugbounty
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-70.73%)
Mutual labels:  cybersecurity, bugbounty
Crlf Injection Scanner
Command line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-68.29%)
Mutual labels:  security-vulnerability, bugbounty
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-91.64%)
Mutual labels:  security-vulnerability, bugbounty
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-78.4%)
Mutual labels:  security-vulnerability, bugbounty
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+88.5%)
Mutual labels:  cybersecurity, bugbounty
Command Injection Payload List
🎯 Command Injection Payload List
Stars: ✭ 658 (+129.27%)
Mutual labels:  security-vulnerability, bugbounty
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+579.09%)
Mutual labels:  cybersecurity, bugbounty
SuperLibrary
Information Security Library
Stars: ✭ 60 (-79.09%)
Mutual labels:  cybersecurity, bugbounty
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-70.38%)
Mutual labels:  cybersecurity, bugbounty
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+87.46%)
Mutual labels:  cybersecurity, bugbounty
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-68.29%)
Mutual labels:  cybersecurity

Subzy

Subdomain takeover tool which works based on matching response fingerprings from can-i-take-over-xyz

follow on Twitter

Subzy subdomain takeover

Installation

go get -u -v github.com/lukasikic/subzy
go install -v github.com/lukasikic/subzy

If $GOBIN and $GOPATH are properly set, execute the program as:

subzy

If you get an error exec format error: ./subzy, you need to install Golang for your OS and compile the program by running go build subzy.go which will generate new subzy binary file

Options

Only required flag is either --target or --targets

--target (string) - Set single or multiple (comma separated) target subdomain/s
--targets (string) - File name/path to list of subdomains
--concurrency (integer) - Number of concurrent checks (default 10)
--hide_fails (boolean) - Hide failed checks and invulnerable subdomains (default false)
--https (boolean) - Use HTTPS by default if protocol not defined on targeted subdomain (default false)
--timeout (integer) - HTTP request timeout in seconds (default 10)
--verify_ssl (boolean) - If set to true, it won't check site with invalid SSL

Usage

Target subdomain can have protocol defined, if not http:// will be used by default if --https not specifically set to true.

  • List of subdomains

    • ./subzy -targets list.txt
  • Single or multiple targets

    • ./subzy -target test.google.com
    • ./subzy -target test.google.com,https://test.yahoo.com
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].