Security through data

CONTENT

  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials

FEATURED

  • CyberAlerts
  • CyberDecoded
  • CyberWeekly
  • CyberStory
  • CyberTips

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
  • CATEGORIES
    • Alerts
    • APIs
    • Apps
    • Blog
    • Cyber101
    • Documents
    • Entertainment
    • Learning
    • Quotes
    • Stats
    • Tools
No Result
View All Result
Contact Us
Newsletter
Cybermaterial
No Result
View All Result

Tool: Subzy

in Software, Tools
2 min read

Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz. 

How to install: HERE

Use

An only required flag is either –target or –targets

–target (string) – Set single or multiple (comma separated) target subdomain/s
–targets (string) – File name/path to the list of subdomains
–concurrency (integer) – Number of concurrent checks (default 10)
–hide_fails (boolean) – Hide failed checks and invulnerable subdomains (default false)
–https (boolean) – Use HTTPS by default if protocol not defined on a targeted subdomain (default false)
–timeout (integer) – HTTP request timeout in seconds (default 10)
–verify_ssl (boolean) – If set to true, it won’t check the site with invalid SSL

Target subdomain can have a protocol defined, if not http:// will be used by default if –https not specifically set to true.

  • List of subdomains
    • ./subzy –targets=list.txt
  • Single or few subdomains
    • ./subzy –target=test.google.com
    • ./subzy –target=test.google.com,https://test.yahoo.com

Copyright (C) 2019 LukaSikic

Source: https://github.com/LukaSikic/

Tags: Google.comLinuxLuka SikicSubdomainSubzy
15
VIEWS

Related Posts

Tools: Cuckoo SandBox
Software

Tools: Cuckoo SandBox

FaceForensics
Software

FaceForensics

Software

Network Security Toolkit (NST)

MORE

Stats

Kaspersky antivirus repelled 975.491.360 attacks launched from online resources located all over the world.

Azure

Database Sharding

Attacking Kerberos

Podcasts

Data Breach Today Podcast

ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Blog
  • Data
  • Directory
  • Events
  • Tutorials
  • CyberDecoded
  • Stats
  • CyberStory
  • CyberTips
  • Cyber Weekly

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.