11/12 free views
Tool
CLI
Application Security

subzy

by PentestPad

1.5Kstars
201forks
22watchers
Updated 3 months ago
About

Subzy is a CLI tool that detects subdomain takeover vulnerabilities by matching response fingerprints against known takeover signatures.

Subdomain takeover vulnerability checker

Primary Use Case

Security professionals and penetration testers use Subzy to identify subdomain takeover risks in their infrastructure by scanning single or multiple subdomains. It automates the detection process, helping teams quickly find and remediate vulnerable subdomains before attackers exploit them.

Key Features
  • Detects subdomain takeover vulnerabilities using response fingerprint matching
  • Supports scanning single or multiple subdomains via command line
  • Allows input of targets through direct flags or file lists
  • Configurable concurrency for parallel scanning
  • Option to hide failed or invulnerable subdomains in output
  • Supports HTTP and HTTPS protocols with SSL verification options
  • Customizable HTTP request timeout settings
  • Lightweight CLI tool written in Go

Installation

  • Ensure Go environment variables $GOBIN and $GOPATH are properly set
  • Run `go install -v github.com/PentestPad/subzy@latest` to install the tool
  • If encountering `exec format error`, install Golang for your OS
  • Compile the program manually by running `go build -o subzy main.go` to generate the binary

Usage

>_ subzy --help

Displays help information and available commands for Subzy

>_ subzy run --target test.google.com

Runs a subdomain takeover scan on a single target subdomain

>_ subzy run --target test.google.com,https://test.yahoo.com

Runs a scan on multiple comma-separated target subdomains

>_ subzy run --targets list.txt

Runs a scan on a list of subdomains provided in a file

>_ subzy version

Prints the current version of Subzy

>_ subzy v

Short alias for displaying the version

>_ subzy r --target example.com --concurrency 20 --hide_fails true

Runs a scan with 20 concurrent checks and hides failed or invulnerable results

Security Frameworks
Reconnaissance
Discovery
Initial Access
Defense Evasion
Impact
Usage Insights
  • Integrate Subzy scans into CI/CD pipelines to automate early detection of subdomain takeover risks before deployment.
  • Use Subzy results to prioritize patching and remediation efforts in vulnerability management workflows.
  • Combine Subzy with DNS monitoring tools to detect changes that might indicate takeover attempts.
  • Leverage Subzy in red team exercises to identify exploitable subdomains and simulate realistic attack paths.
  • Incorporate Subzy findings into purple team collaboration sessions to improve detection and response strategies for subdomain takeovers.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about subzy. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team80%
Blue Team60%
Purple Team70%
Details
LicenseGNU General Public License v2.0
LanguageGo
Open Issues42
Topics
cybersecurity
bugbounty
security-vulnerability
subdomain-takeover
security-research