Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License
FEATURES
SIMILAR TOOLS
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
Exterro is a data risk management platform that optimizes e-discovery, digital forensics, and cybersecurity compliance operations.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.