Loading...
Browse 13 subdomain takeover tools
Managed attack surface mgmt service combining automated discovery & expert testing
Managed attack surface mgmt service combining automated discovery & expert testing
Monitors internet-facing subdomains for vulnerabilities and misconfigurations
Monitors internet-facing subdomains for vulnerabilities and misconfigurations
Platform for external attack surface management and application security testing
Platform for external attack surface management and application security testing
DAST scanner that identifies web app vulnerabilities and attack surfaces
DAST scanner that identifies web app vulnerabilities and attack surfaces
SOCRadar Digital Footprint provides comprehensive discovery and monitoring of an organization's external digital assets and attack surface from an attacker's perspective.
SOCRadar Digital Footprint provides comprehensive discovery and monitoring of an organization's external digital assets and attack surface from an attacker's perspective.
A powerful tool for finding and exploiting subdomain takeover vulnerabilities
A powerful tool for finding and exploiting subdomain takeover vulnerabilities
A tool for detecting and taking over subdomains with dead DNS records
A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.
A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.
A tool for testing subdomain takeover possibilities at a mass scale.
Assesses AWS accounts for subdomain hijacking via Route53/CloudFront
Assesses AWS accounts for subdomain hijacking via Route53/CloudFront
A multi-cloud DNS security tool that detects dangling DNS records and potential subdomain takeover vulnerabilities by scanning cloud infrastructure and DNS zones.
A multi-cloud DNS security tool that detects dangling DNS records and potential subdomain takeover vulnerabilities by scanning cloud infrastructure and DNS zones.
A Python utility that identifies and exploits domains vulnerable to AWS name server takeover attacks by detecting misconfigured DNS settings.
A Python utility that identifies and exploits domains vulnerable to AWS name server takeover attacks by detecting misconfigured DNS settings.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance