Subzy is a CLI tool that detects subdomain takeover vulnerabilities by matching response fingerprints against known takeover signatures.
Subdomain takeover vulnerability checker
Security professionals and penetration testers use Subzy to identify subdomain takeover risks in their infrastructure by scanning single or multiple subdomains. It automates the detection process, helping teams quickly find and remediate vulnerable subdomains before attackers exploit them.
Subzy requires a properly configured Go environment for installation and execution. Users should ensure SSL verification settings match their target environment to avoid false negatives. The tool relies on known fingerprint signatures, so keeping it updated or cross-referencing with other tools is recommended for comprehensive coverage.
Ensure Go environment variables $GOBIN and $GOPATH are properly set
Run `go install -v github.com/PentestPad/subzy@latest` to install the tool
If encountering `exec format error`, install Golang for your OS
Compile the program manually by running `go build -o subzy main.go` to generate the binary
subzy --help
Displays help information and available commands for Subzy
subzy run --target test.google.com
Runs a subdomain takeover scan on a single target subdomain
subzy run --target test.google.com,https://test.yahoo.com
Runs a scan on multiple comma-separated target subdomains
subzy run --targets list.txt
Runs a scan on a list of subdomains provided in a file
subzy version
Prints the current version of Subzy
subzy v
Short alias for displaying the version
subzy r --target example.com --concurrency 20 --hide_fails true
Runs a scan with 20 concurrent checks and hides failed or invulnerable results