AUTOOUES is a powerful and automated Bash script designed to identify potential subdomain takeover vulnerabilities. It streamlines the process by first enumerating all subdomains for a given target, then performing intelligent CNAME record checks, and finally leveraging the nuclei tool with specialized templates for deeper validation on potentially vulnerable targets. All scan results are neatly organized into a dedicated directory named after the target domain.
-
Automated Subdomain Enumeration: Discovers subdomains using
subfinder. -
Intelligent CNAME Analysis: Identifies CNAME records pointing to external services and checks if those services are unresolved or potentially available for registration (via
digandwhois). -
Targeted Nuclei Scanning: Automatically feeds potentially vulnerable CNAME targets to
nucleiusing specific subdomain takeover templates for precise validation. -
Organized Output: Creates a dedicated directory for each scan, saving all results (discovered subdomains, CNAME analysis, Nuclei findings) within it.
-
Interactive Menu: Provides an easy-to-use menu for initiating scans.
-
Clone the repository (once uploaded to GitHub) or download the script:
git clone https://github.com/ethical-kunal/AUTOOUES.git cd AUTOOUES(For now, you'll just copy the script content into a file.)
-
Make the script and requirement file executable:
chmod +x auto_takeover_scanner.sh
chmod +x requirements.sh
-
Run
requirements.shto get Web Security Scanner Toolkit Prerequisites:./requirements.sh
Run the script without any arguments to enter the interactive menu:
./auto_takeover_scanner.shYou will be greeted with the tool's banner and a menu:
█████╗ ██╗ ██╗████████╗ ██████╗ ██████╗ ██╗ ██╗███████╗███████╗
██╔══██╗██║ ██║╚══██╔══╝██╔═══██╗██╔═══██╗██║ ██║██╔════╝██╔════╝
███████║██║ ██║ ██║ ██║ ██║██║ ██║██║ ██║█████╗ ███████╗
██╔══██║██║ ██║ ██║ ██║ ██║██║ ██║██║ ██║██╔══╝ ╚════██║
██║ ██║╚██████╔╝ ██║ ╚██████╔╝╚██████╔╝╚██████╔╝███████╗███████║
╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═════╝ ╚══════╝╚══════╝
Automated Subdomain Takeover Scanner
--------------------------------------
Made by @ethical_kunal & @itshiddeneye
Main Menu:
1. Scan a new domain
2. Exit
Enter your choice (1 or 2):
Choose option 1 and follow the prompts to enter your target domain.
You can also provide the target domain directly as a command-line argument for a one-time scan:
./auto_takeover_scanner.sh example.com(Replace example.com with your actual target domain.)
For each scan, a new directory will be created in the format yourdomain_com_scan_results (e.g., example_com_scan_results/). This directory will contain the following files:
-
yourdomain_com_discovered_subdomains.txt: A list of all subdomains found bysubfinder. -
yourdomain_com_cname_takeover_results.txt: Detailed output of the CNAME checks, including potential takeover flags and WHOIS information. -
yourdomain_com_potential_takeover_targets.txt: A temporary file listing only the CNAME targets identified as potentially vulnerable, used as input for Nuclei. -
yourdomain_com_nuclei_takeover_results.txt: The results from thenucleiscan, indicating confirmed subdomain takeover vulnerabilities.
This tool was created by:
@ethical_kunal & @itshiddeneye
Contributions are welcome! If you have suggestions for improvements, new features, or bug fixes, please feel free to:
-
Fork the repository.
-
Create a new branch (
git checkout -b feature/YourFeature). -
Make your changes.
-
Commit your changes (
git commit -m 'Add some feature'). -
Push to the branch (
git push origin feature/YourFeature). -
Open a Pull Request.
This project is open-source and available under the MIT License.