subzy
by PentestPad
Subzy is a CLI tool that detects subdomain takeover vulnerabilities by matching response fingerprints against known takeover signatures.
Subdomain takeover vulnerability checker
Primary Use Case
Security professionals and penetration testers use Subzy to identify subdomain takeover risks in their infrastructure by scanning single or multiple subdomains. It automates the detection process, helping teams quickly find and remediate vulnerable subdomains before attackers exploit them.
- Detects subdomain takeover vulnerabilities using response fingerprint matching
- Supports scanning single or multiple subdomains via command line
- Allows input of targets through direct flags or file lists
- Configurable concurrency for parallel scanning
- Option to hide failed or invulnerable subdomains in output
- Supports HTTP and HTTPS protocols with SSL verification options
- Customizable HTTP request timeout settings
- Lightweight CLI tool written in Go
Installation
- Ensure Go environment variables $GOBIN and $GOPATH are properly set
- Run `go install -v github.com/PentestPad/subzy@latest` to install the tool
- If encountering `exec format error`, install Golang for your OS
- Compile the program manually by running `go build -o subzy main.go` to generate the binary
Usage
>_ subzy --helpDisplays help information and available commands for Subzy
>_ subzy run --target test.google.comRuns a subdomain takeover scan on a single target subdomain
>_ subzy run --target test.google.com,https://test.yahoo.comRuns a scan on multiple comma-separated target subdomains
>_ subzy run --targets list.txtRuns a scan on a list of subdomains provided in a file
>_ subzy versionPrints the current version of Subzy
>_ subzy vShort alias for displaying the version
>_ subzy r --target example.com --concurrency 20 --hide_fails trueRuns a scan with 20 concurrent checks and hides failed or invulnerable results
- Integrate Subzy scans into CI/CD pipelines to automate early detection of subdomain takeover risks before deployment.
- Use Subzy results to prioritize patching and remediation efforts in vulnerability management workflows.
- Combine Subzy with DNS monitoring tools to detect changes that might indicate takeover attempts.
- Leverage Subzy in red team exercises to identify exploitable subdomains and simulate realistic attack paths.
- Incorporate Subzy findings into purple team collaboration sessions to improve detection and response strategies for subdomain takeovers.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about subzy. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
PayloadsAllTheThings
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF

hoppscotch
hoppscotch/hoppscotch
Open source API development ecosystem - https://hoppscotch.io (open-source alternative to Postman, Insomnia)
ImHex
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

termux-app
termux/termux-app
Termux - a terminal emulator application for Android OS extendible by variety of packages.

sentry
getsentry/sentry
Developer-first error tracking and performance monitoring
CheatSheetSeries
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
