can-i-take-over-xyz 
 Vulnerability scanner
 A resource to guide security researchers on identifying subdomain takeover vulnerabilities in web services.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
5k stars
 126 watching
 724 forks
 
Language: Python 
last commit: 12 months ago 
Linked from   1 awesome list  
  bugbountyinfoseclistsecuritysubdomainsubdomain-takeovers 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|    |  A tool for automating the discovery of subdomains and DNS records by using open resolvers as a proxy to circumvent rate limiting. | 3,372 | 
|    |  Identifies potential subdomain takeover issues in cloud DNS environments | 49 | 
|    |  Detects DNS record misconfigurations that could be exploited by attackers | 135 | 
|    |  A tool for detecting potential subdomain takeovers in web services | 936 | 
|    |  Automates subdomain discovery through permutations and alterations of known domain patterns and words. | 2,344 | 
|    |  A tool to detect sub-domain takeovers by scanning targets and checking DNS information. | 357 | 
|    |  An automated tool to identify subdomain vulnerabilities in web applications | 354 | 
|    |  Automates subdomain takeover vulnerability checks | 1,091 | 
|    |  A tool to quickly identify if a subdomain is vulnerable to takeover by scanning target domains | 58 | 
|    |  Automated tool to detect and prevent domain-based cyber threats by generating permutations of domain names | 4,949 | 
|    |  A tool for automatically discovering subdomains of given domains | 3,502 | 
|    |  A proof-of-concept code execution project exploiting an unpatched vulnerability in Google Compute Engine's ISC DHCP software to gain root access via SSH keys added by the google_guest_agent. | 534 | 
|    |  Tools and scripts for discovering hidden sub-domains on the internet | 635 | 
|    |  A fast and concurrent DNS/network scanner that identifies subdomains and their corresponding IPs. | 890 | 
|    |  Automatically identifies potential bypass points around web application firewalls (WAFs) by analyzing DNS history records and HTTP responses. | 1,202 |