https://github.com/spinfal/takeover
[ARCHIVAL] - Sub-Domain TakeOver Vulnerability Scanner
https://github.com/spinfal/takeover
Last synced: 3 months ago
JSON representation
[ARCHIVAL] - Sub-Domain TakeOver Vulnerability Scanner
- Host: GitHub
- URL: https://github.com/spinfal/takeover
- Owner: spinfal
- License: mit
- Created: 2024-02-19T00:00:51.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-02-27T13:37:56.000Z (over 1 year ago)
- Last Synced: 2024-12-31T14:48:47.462Z (5 months ago)
- Language: Python
- Homepage:
- Size: 775 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Important
The original repo (`m4ll0k/takeover`) was removed from GitHub, this repo is here to simply act as another archival source to provide users access to this project.\
You can alternatively use Archive.org to access the files, however there will be no git support: https://web.archive.org/web/20221115220732/https://github.com/m4ll0k/takeover# Takeover - Subdomain Takeover Finder v0.2

Sub-domain takeover vulnerability occur when a sub-domain (**subdomain.example.com**) is pointing to a service (e.g: **GitHub**, **AWS/S3**,..) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if **subdomain.example.com** was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a **CNAME** file containing **subdomain.example.com**, and claim **subdomain.example.com**. For more information: [here](https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/)
## Supported Services
```
'Acquia'
'ActiveCampaign'
'Aftership'
'Aha'
'AWS/S3'
'Bigcartel'
'BitBucket'
'Brightcove'
'Campaignmonitor'
'Cargo'
'CloudFront'
'Desk'
'Fastly'
'FeedPress'
'GetResponse'
'Ghost'
'Github'
'Helpjuice'
'Helpscout'
'Heroku'
'Intercom'
'Jetbrains'
'Kajabi'
'Mashery'
'Pantheon'
'Pingdom'
'Proposify'
'S3Bucket'
'Shopify'
'Simplebooklet'
'Smartling'
'StatuPage'
'Surge'
'Surveygizmo'
'Tave'
'TeamWork'
'Thinkific'
'Tictail'
'Tilda'
'Tumbler'
'Unbounce'
'Uservoice'
'Vend'
'Webflow'
'Wishpond'
'Wordpress'
'ZenDesk'
'feedpress'
'readme'
'statuspage'
'zendesk'
'worksites.net'
'smugmug'
```
## Installation:```shell
git clone https://github.com/spinfal/takeover.git
cd takeover
python3 setup.py install
```**or:**
```
wget -q https://raw.githubusercontent.com/spinfal/takeover/master/takeover.py && python3 takeover.py
```## Usage
```
$ python3 takeover.py -d www.domain.com -v
$ python3 takeover.py -d www.domain.com -v -t 30
$ python3 takeover.py -d www.domain.com -p http://127.0.0.1:8080 -v
$ python3 takeover.py -d www.domain.com -o or -v
$ python3 takeover.py -l uber-sub-domains.txt -o output.txt -p http://xxx.xxx.xxx.xxx:8080 -v
$ python3 takeover.py -d uber-sub-domains.txt -o output.txt -T 3 -v
```## Docker support
Build the image:
```
docker build -t takeover .
```Run the container:
```
docker run -it --rm takeover -d www.domain.com -v
```