Skip to main content

Takeover - SubDomain TakeOver Vulnerability Scanner


Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that sub-domain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com. For more information: here



Installation:
# git clone https://github.com/m4ll0k/takeover.git
# cd takeover
# python takeover.py
or:
wget -q https://raw.githubusercontent.com/m4ll0k/takeover/master/takeover.py && python takeover.py


More info


Comments

Popular posts from this blog

9774 hash passwords

blake2b-256(jade41) blake2b-256(jade420) blake2b-256(jade429) blake2b-256(jade44) blake2b-256(jade456) blake2b-256(jade4ever69) blake2b-256(jade50) blake2b-256(jade5264) blake2b-256(jade555) blake2b-256(jade5565) blake2b-256(jade69) blake2b-256(Jade69) blake2b-256(jade98) blake2b-256(jadebaby11121) blake2b-256(jadebink) blake2b-256(jadeblue) blake2b-256(jadecape) blake2b-256(jadeck) blake2b-256(jadeclub) blake2b-256(jaded) blake2b-256(jaded1) blake2b-256(jaded2) blake2b-256(jaded69) blake2b-256(jadedbaby) blake2b-256(jadedd) blake2b-256(jadedragonflower) blake2b-256(jadeds) blake2b-256(jadeduck) blake2b-256(jadeee) blake2b-256(jadeeeee) blake2b-256(jadefox) blake2b-256(jadehungder) blake2b-256(jadejade) blake2b-256(jadejord) blake2b-256(jadejs) blake2b-256(jadeland) blake2b-256(jadelilly) blake2b-256(jadelugo) blake2b-256(jadelyn) blake2b-256(jadelynn) blake2b-256(jadelynp) blake2b-256(jaden) blake2b-256(jaden0) blake2b-256(jaden1) blake2b-2...

The Base Blockchain Airdrop: Hidden Opportunities You Don’t Want to Miss!

The Base blockchain, supported by Coinbase, is making waves in the crypto space with its surging Total Value Locked (TVL) and potential airdrop opportunities. In this article, we'll dive deep into Base's ecosystem, its key protocols, and strategies for maximizing potential rewards. We'll also explore SynFutures, a standout perpetual protocol, and other exciting opportunities that could set the stage for a lucrative airdrop. Base Blockchain: A Rising Star Current Status Base has climbed to the sixth position among blockchains in terms of TVL, surpassing even Arbitrum, the long-time leader in Ethereum Layer 2 solutions. With $4 billion+ in TVL , Base's rapid growth is drawing attention from the crypto community. Why the Excitement Around a Potential Airdrop? Coinbase Backing: As a leading exchange, Coinbase's involvement ensures credibility and innovation. Changing Regulations: With evolving regulatory clarity, there's renewed optimism for potential rewards lik...

5849 hash passwords

sha3-224(080394m) sha3-224(080395) sha3-224(080395n) sha3-224(080396) sha3-224(080397) sha3-224(080398) sha3-224(080399) sha3-224(080399tujh) sha3-224(0803jp) sha3-224(0803ma) sha3-224(0804) sha3-224(08040) sha3-224(080400) sha3-224(080401) sha3-224(080402) sha3-224(080403) sha3-224(080404) sha3-224(080405) sha3-224(080406) sha3-224(080407) sha3-224(080408) sha3-224(08040804) sha3-224(080410) sha3-224(080419) sha3-224(08041931) sha3-224(08041934) sha3-224(08041939) sha3-224(08041942) sha3-224(08041946) sha3-224(08041947) sha3-224(08041948) sha3-224(08041949) sha3-224(08041950) sha3-224(08041951) sha3-224(08041952) sha3-224(08041953) sha3-224(08041954) sha3-224(08041955) sha3-224(08041956) sha3-224(08041957) sha3-224(08041958) sha3-224(08041959) sha3-224(08041960) sha3-224(08041961) sha3-224(08041962) sha3-224(08041963) sha3-224(08041964) sha3-224(08041965) sha3-224(08041966) sha3-224(08041967) sha3-224(08041968) sha3-224(08041969) sh...