Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License
FEATURES
SIMILAR TOOLS
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.