Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License
FEATURES
SIMILAR TOOLS
Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.
Digital investigation tool for extracting forensic data from computers and managing investigations.
A tool for fixing acquired .evt Windows Event Log files in digital forensics.
Tool for parsing Android logs events and protobuf data
Web interface for the Volatility Memory Analysis framework with advanced features.
Open source digital forensics tools for analyzing disk images and recovering files.
A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.