🏴 Subdomain Takeover Scanner

Discover subdomains and check for dangling CNAME records pointing to unclaimed cloud services. Identifies potential subdomain takeover vulnerabilities across GitHub Pages, Heroku, S3, Netlify, Shopify, and 10+ other services.

Last updated:

What Is Subdomain Takeover?

A subdomain takeover occurs when a DNS CNAME record points to a third-party service that has been deprovisioned. Because the DNS record still exists but the service is unclaimed, an attacker can register the target service and serve arbitrary content on the victim's subdomain. This enables phishing, session hijacking via shared cookies, and reputational damage.

How It Works

Subdomain Discovery
The scanner enumerates subdomains using HackerTarget's host search API and Certificate Transparency logs (crt.sh). Combined, these sources typically reveal the majority of a domain's publicly-visible subdomains.
CNAME Resolution
Each discovered subdomain is resolved via Cloudflare DNS-over-HTTPS to check for CNAME records. CNAMEs pointing to known cloud service patterns (*.github.io, *.herokuapp.com, *.s3.amazonaws.com, etc.) are flagged for analysis.
Vulnerability Assessment
Flagged CNAMEs are checked to determine if the target service still resolves. A CNAME pointing to a service that returns NXDOMAIN or SERVFAIL indicates the service may be unclaimed, creating a takeover opportunity.

🏴 Subdomain Takeover Scanner — Frequently Asked Questions

What is a subdomain takeover?

A subdomain takeover occurs when a subdomain's DNS CNAME record points to a third-party service (like GitHub Pages or Heroku) that the domain owner no longer controls. An attacker can claim the abandoned service and serve their own content on the victim's subdomain, enabling phishing, cookie theft, or reputation damage.

How does this scanner detect takeover vulnerabilities?

The scanner discovers subdomains via HackerTarget and Certificate Transparency logs, then resolves each subdomain's CNAME record via Cloudflare DNS-over-HTTPS. CNAMEs pointing to known cloud services (GitHub Pages, Heroku, S3, Netlify, etc.) are flagged. The tool then checks if the CNAME target actually resolves, as unresolvable targets indicate potential takeover.