DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Tool

Subzy

Reading Time: 2 mins read
in Software, Tool

Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz. 

How to install: HERE

Use

An only required flag is either –target or –targets

–target (string) – Set single or multiple (comma separated) target subdomain/s
–targets (string) – File name/path to the list of subdomains
–concurrency (integer) – Number of concurrent checks (default 10)
–hide_fails (boolean) – Hide failed checks and invulnerable subdomains (default false)
–https (boolean) – Use HTTPS by default if protocol not defined on a targeted subdomain (default false)
–timeout (integer) – HTTP request timeout in seconds (default 10)
–verify_ssl (boolean) – If set to true, it won’t check the site with invalid SSL

Target subdomain can have a protocol defined, if not http:// will be used by default if –https not specifically set to true.

  • List of subdomains
    • ./subzy –targets=list.txt
  • Single or few subdomains
    • ./subzy –target=test.google.com
    • ./subzy –target=test.google.com,https://test.yahoo.com

Copyright (C) 2019 LukaSikic

Source: https://github.com/LukaSikic/

Tags: LinuxPenTesting
ADVERTISEMENT

Related Posts

Microsoft and MITRE Create Arsenal Plug-in

Microsoft and MITRE Create Arsenal Plug-in

March 7, 2023
CISA Launches Tool for Cyber Threat Mapping

CISA Launches Tool for Cyber Threat Mapping

March 2, 2023
Shodan – Tool

Mine – Tool

February 5, 2023
Shodan – Tool

Shodan – Tool

February 5, 2023

More Articles

Alerts

Updates to Cybersecurity Performance Goals

March 22, 2023

Cyber Risk Management Podcast

May 6, 2022
Alerts

Malware on Google Play store leads to harmful phishing sites

November 2, 2022
Alerts

[Control Systems] Schneider Electric Security Advisory

December 14, 2021
Alerts

Ubuntu security advisory (AV22-523)

September 20, 2022
Documentary

Revolution OS (2001)

September 27, 2020
Blog

Cybersecurity KRIs to track

June 21, 2022
Incidents

Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor

September 26, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.