https://github.com/Mesh3l911/Sub_Analyser
https://github.com/Mesh3l911/Sub_Analyser
Last synced: 4 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/Mesh3l911/Sub_Analyser
- Owner: Mesh3l911
- Created: 2021-02-03T23:39:21.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2021-12-01T17:33:20.000Z (almost 4 years ago)
- Last Synced: 2024-11-21T19:38:47.241Z (12 months ago)
- Language: Python
- Size: 3.79 MB
- Stars: 15
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Mesh3l911/Sub_Analyser - (Python)
README

# Sub_Analyser v1.0 :
It's a tool that automates the process of testing websites against Sub-Domain TakeOver vulnerabilities.It's provided with 36 different services from @EdOverflow repo [ can-i-take-over-xyz ] and others that I've collected throughout my own experience ^_^
# Installation :
git clone https://github.com/Mesh3l911/Sub_Analyser.git
# Requirements :
pip install -r requirements.txt
# Usage :
1-Collect alive SubDomains by ur own way
2-Fire up the script
python3 Sub_Analyser.py
3- Write ur alive sub domains list path
4- The output ( Vulnerable sub-domains ) will be saved in a txt file called (Vulnerable_SubDomains.txt)

Full output

Output's Report

Vulnerable_SubDomains.txt

Demo

# P.s :
This is the 1st version of this tool. We can all improve it together and I'll tell you how :
I've collected 36 different services so what we can do is collecting more and more services
when ever you face a new service that you could TakOver any of its subdomain and you would like to share it with the community you can DM me in twitter @Mesh3l_911
and give me the name of that service so that I add it up to the list of the next vesrion INSHAALLAH ^_^
دعواتكم لي ولوالدي ولمن أحب
# Happy Hunting ^_^