Skip to main content

Advanced subdomain takeover reconnaissance & safe-vulnerability-detection

Project description

ReClaimor

Advanced subdomain takeover scanner with 20+ provider fingerprints

PyPI version Python License

ReClaimor is a fast, accurate subdomain takeover detection tool with multi-tier analysis (DNS → HTTP → TLS → Fingerprinting) and support for 20+ cloud providers.

⚠️ Legal Notice

Only scan domains you own or have explicit authorization to test. Unauthorized scanning is illegal.

🚀 Quick Start

# Install
pip install reclaimor

# Scan single domain
reclaimor --url subdomain.example.com

# Scan from file
reclaimor --file targets.txt --output results.json

# Generate HTML report
reclaimor --file targets.txt --output report.html --format html

✨ Key Features

  • Multi-tier Detection - DNS, HTTP, TLS, and fingerprint analysis
  • 20+ Providers - GitHub Pages, Heroku, AWS S3, Azure, Netlify, Vercel, Fastly, and more
  • Fast Async Scanning - Concurrent scanning with rate limiting
  • Multiple Formats - JSON, CSV, HTML, and console output
  • Interactive TUI - Manual triage interface
  • Safe by Default - Detection-only mode (optional verification with explicit flags)

📋 Requirements

  • Python 3.10+
  • Internet connection

🔧 Basic Usage

# Verify installation
reclaimor --version
reclaimor --self-check

# Single domain
reclaimor --url subdomain.example.com

# Batch scanning
reclaimor --file targets.txt --concurrency 50

# With output
reclaimor --file targets.txt --output results.json --format json

# Interactive mode
reclaimor --file targets.txt --tui

# Pipe from other tools
subfinder -d example.com | reclaimor --stdin

📊 Supported Providers

GitHub Pages • Heroku • AWS S3 • AWS CloudFront • Azure Blob • Azure CDN • Netlify • Vercel • Fastly • Shopify • Tumblr • WordPress.com • Pantheon • Bitbucket • Ghost • Cargo • Feedpress • Surge.sh • Acquia • Kinsta

🔧 Configuration

Create ~/.reclaimor/config.yaml:

concurrency: 50
timeout: 15
safe_mode: true
rate_limit: 10

🐳 Docker

docker pull letchupkt/reclaimor:latest
docker run -v $(pwd)/targets.txt:/targets.txt letchupkt/reclaimor --file /targets.txt

🧪 Example Workflow

# 1. Enumerate subdomains
subfinder -d target.com -silent > subdomains.txt

# 2. Scan for takeovers
reclaimor --file subdomains.txt --output findings.json

# 3. Review findings
cat findings.json | jq '.results[] | select(.vulnerable==true)'

🛡️ Safety Features

  • Safe mode by default (detection only)
  • Explicit flags required for verification (--auto-exploit --aggressive)
  • Rate limiting to prevent DoS
  • Auto-cleanup after verification
  • Legal notice before scanning

📚 Documentation

🤝 Contributing

Contributions welcome! See CONTRIBUTING.md

📝 Responsible Disclosure

If you find vulnerabilities:

  1. Notify the asset owner privately
  2. Allow 90 days for remediation
  3. Follow responsible disclosure practices

📄 License

MIT License - Copyright (c) 2025 Lakshmikanthan (@letchupkt)

🙏 Credits

Built by @letchupkt for the security research community.


Use responsibly. Only scan authorized targets. 🔍

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reclaimor-0.1.4.tar.gz (25.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

reclaimor-0.1.4-py3-none-any.whl (32.2 kB view details)

Uploaded Python 3

File details

Details for the file reclaimor-0.1.4.tar.gz.

File metadata

  • Download URL: reclaimor-0.1.4.tar.gz
  • Upload date:
  • Size: 25.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.4.tar.gz
Algorithm Hash digest
SHA256 5cbd472a0e9ca026fce0506185fb0b0f70e70d2a70b75a79b36022babd5b9658
MD5 2d19ae83c34b2377f5b5ed8a45003d2b
BLAKE2b-256 ef0ae7d5638ee4dfe6accb348c284d5942acd2df60e3109123a5fe991d8cd239

See more details on using hashes here.

File details

Details for the file reclaimor-0.1.4-py3-none-any.whl.

File metadata

  • Download URL: reclaimor-0.1.4-py3-none-any.whl
  • Upload date:
  • Size: 32.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 398f2fcf8b8c953b87afe86c19c2c0915b2676670044a753585909485b2686dd
MD5 f8dc2b895461e1e3042a10523d085dc0
BLAKE2b-256 bc0d91e311cab56c27332bc10ae6951304f5e6ace97631c6443e990c69040213

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page