Subover is a Hostile Subdomain Takeover tool designed in Python. From start, it has been aimed with speed and efficiency in mind. Till date, SubOver detects 36 services which is much more than any other tool out there. The tool is multithreaded and hence delivers good speed. It can easily detect and report potential subdomain takeovers that exist. The list of potentially hijackable services is very comprehensive and it is what makes this tool so powerful.
You need to have Python 2.7 installed on your machine. The following additional requirements are required -
git clone https://github.com/Ice3man543/SubOver.git .
# consider installing virtualenv
pip install -r requirements.txt
python subover.py -h
python subover.py -l subdomains.txt -o output_takeovers.txt
-l subdomains.txtis the list of target subdomains. These can be discovered using various tool such as sublist3r or others.
-o output_takeovers.txtis the name of the output file. (Optional & Currently not very well formatted)
-t20 is the default number of threads that SubOver will use. (Optional)
-Vis the switch for showing verbose output. (Optional, Default=False)
Currently Checked Services
Q: What should my wordlist look like?
A: Your wordlist should include a list of subdomains you're checking and should look something like:
Your tool sucks!
Yes, you're probably correct. Feel free to:
- Not use it.
- Show me how to do it better.
- Subdomain Takeover Scanner by 0x94
- subjack : Hostile Subdomain Takeover Tool Written In GO
- Anshumanbh : tko-subs
Hostile Subdomain Takeover Linux multithreaded Pentesting Python Scanner Subdomain Subdomain Takeover Sublist3R SubOver Takeover Wordlist