Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

Subzy

in Software, Tool
2 min read

Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz. 

How to install: HERE

Use

An only required flag is either –target or –targets

–target (string) – Set single or multiple (comma separated) target subdomain/s
–targets (string) – File name/path to the list of subdomains
–concurrency (integer) – Number of concurrent checks (default 10)
–hide_fails (boolean) – Hide failed checks and invulnerable subdomains (default false)
–https (boolean) – Use HTTPS by default if protocol not defined on a targeted subdomain (default false)
–timeout (integer) – HTTP request timeout in seconds (default 10)
–verify_ssl (boolean) – If set to true, it won’t check the site with invalid SSL

Target subdomain can have a protocol defined, if not http:// will be used by default if –https not specifically set to true.

  • List of subdomains
    • ./subzy –targets=list.txt
  • Single or few subdomains
    • ./subzy –target=test.google.com
    • ./subzy –target=test.google.com,https://test.yahoo.com

Copyright (C) 2019 LukaSikic

Source: https://github.com/LukaSikic/

Tags: Google.comLinuxLuka SikicSubdomainSubzy
19
VIEWS

More Tools

SoK: Cryptojacking Malware
Software

SoK: Cryptojacking Malware

April 16, 2021

Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules...

Snort
Software

Snort

April 15, 2021

Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules...

Azure REST API: Access Token Authentication
Software

Azure REST API: Access Token Authentication

April 14, 2021

Azure REST API: Access Token Authentication using PowerShell to perform administrative tasks.

MORE

AR/VR

How Tech Startups Have Been Doing?

December 30, 2020
Book

Book: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

January 25, 2021
Report

How Ransomware Attacks

April 12, 2021
Lexicon

Mutual Authentication

April 1, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.