Skip to content

manoselva/nuclei-templates

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Subdomain Takeover Detection Nuclei Template

Nuclei Coverage

Advanced detection of vulnerable subdomain takeovers across major cloud providers and SaaS platforms.

📖 Overview

This Nuclei template identifies potential subdomain takeover vulnerabilities by analyzing:

  • Service-specific error patterns
  • HTTP headers
  • Response characteristics
  • CNAME clues

Combines techniques from can-i-take-over-xyz with multi-layer verification for high accuracy.

✨ Key Features

  • 50+ Service Patterns
    AWS, GitHub, Heroku, Firebase, Shopify, Azure, Cloudflare + niche platforms
  • False Positive Reduction
    • Generic error page exclusion
    • Response time/size validation
    • Header verification
  • Smart Fingerprinting
    • Service identification
    • CNAME pattern extraction
  • Multi-Phase Detection
    4-stage verification process

🚀 Usage

Basic Scan

nuclei -t subdomain-takeover-pro-plus.yaml -u target.com

Recommended Flags

nuclei -t subdomain-takeover-pro-plus.yaml \
  -list domains.txt \
  -retries 2 \
  -timeout 5 \
  -rate-limit 150 \
  -headless

📦 Installation

  1. Install Nuclei:
go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
  1. Clone template repository:
git clone https://github.com/yourusername/subdomain-takeover-templates.git
  1. Update regularly:
nuclei -update && nuclei -ut

🔍 Validation Workflow

  1. Verify CNAME Records
dig CNAME vulnerable-subdomain.example.com
  1. Check Service Status
    Use provider dashboards/APIs to confirm resource availability

  2. Cross-Reference
    Consult can-i-take-over-xyz for current vulnerabilities

❗ Ethical Note: Always obtain proper authorization before testing.

🤝 Contributing

Help improve detection:

  1. Report false positives/negatives via Issues
  2. Submit new service patterns via PR
  3. Update existing matchers for service changes
# Template structure
subdomain-takeover-pro-plus.yaml
├── Service patterns
├── Header checks
└── Response validation

❓ FAQ

Q: How to handle false positives?
A: Use the -debug flag and check extracted service/CNAME clues

Q: Which services are covered?
A: AWS, GitHub, Heroku, Firebase, Shopify, Azure + 45+ others (see full list in template)

Q: Support authenticated scans?
A: Add custom headers with -H 'Authorization: Bearer token'

Q: Need manual verification?
A: Always required before reporting vulnerabilities

📚 References

📜 License

MIT License - See LICENSE. Use responsibly.


This README provides:
1. Clear installation/usage instructions
2. Technical implementation details
3. Ethical guidelines
4. Maintenance/contribution info
5. Quick reference sections

Key elements:
- Badges for visual metadata
- Collapsible sections for complex workflows
- Ethical usage emphasis
- Version compatibility notes
- Direct links to resources

Would you like me to add any specific details or modify any sections?

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published