Skip to main content

Advanced subdomain takeover reconnaissance & safe-vulnerability-detection

Project description

ReClaimor

Advanced subdomain takeover scanner with 20+ provider fingerprints

PyPI version Python License

ReClaimor is a fast, accurate subdomain takeover detection tool with multi-tier analysis (DNS → HTTP → TLS → Fingerprinting) and support for 20+ cloud providers.

⚠️ Legal Notice

Only scan domains you own or have explicit authorization to test. Unauthorized scanning is illegal.

🚀 Quick Start

# Install
pip install reclaimor

# Scan single domain
reclaimor --url subdomain.example.com

# Scan from file
reclaimor --file targets.txt --output results.json

# Generate HTML report
reclaimor --file targets.txt --output report.html --format html

✨ Key Features

  • Multi-tier Detection - DNS, HTTP, TLS, and fingerprint analysis
  • 20+ Providers - GitHub Pages, Heroku, AWS S3, Azure, Netlify, Vercel, Fastly, and more
  • Fast Async Scanning - Concurrent scanning with rate limiting
  • Multiple Formats - JSON, CSV, HTML, and console output
  • Interactive TUI - Manual triage interface
  • Safe by Default - Detection-only mode (optional verification with explicit flags)

📋 Requirements

  • Python 3.10+
  • Internet connection

🔧 Basic Usage

# Verify installation
reclaimor --version
reclaimor --self-check

# Single domain
reclaimor --url subdomain.example.com

# Batch scanning
reclaimor --file targets.txt --concurrency 50

# With output
reclaimor --file targets.txt --output results.json --format json

# Interactive mode
reclaimor --file targets.txt --tui

# Pipe from other tools
subfinder -d example.com | reclaimor --stdin

📊 Supported Providers

GitHub Pages • Heroku • AWS S3 • AWS CloudFront • Azure Blob • Azure CDN • Netlify • Vercel • Fastly • Shopify • Tumblr • WordPress.com • Pantheon • Bitbucket • Ghost • Cargo • Feedpress • Surge.sh • Acquia • Kinsta

🔧 Configuration

Create ~/.reclaimor/config.yaml:

concurrency: 50
timeout: 15
safe_mode: true
rate_limit: 10

🐳 Docker

docker pull letchupkt/reclaimor:latest
docker run -v $(pwd)/targets.txt:/targets.txt letchupkt/reclaimor --file /targets.txt

🧪 Example Workflow

# 1. Enumerate subdomains
subfinder -d target.com -silent > subdomains.txt

# 2. Scan for takeovers
reclaimor --file subdomains.txt --output findings.json

# 3. Review findings
cat findings.json | jq '.results[] | select(.vulnerable==true)'

🛡️ Safety Features

  • Safe mode by default (detection only)
  • Explicit flags required for verification (--auto-exploit --aggressive)
  • Rate limiting to prevent DoS
  • Auto-cleanup after verification
  • Legal notice before scanning

📚 Documentation

🤝 Contributing

Contributions welcome! See CONTRIBUTING.md

📝 Responsible Disclosure

If you find vulnerabilities:

  1. Notify the asset owner privately
  2. Allow 90 days for remediation
  3. Follow responsible disclosure practices

📄 License

MIT License - Copyright (c) 2025 Lakshmikanthan (@letchupkt)

🙏 Credits

Built by @letchupkt for the security research community.


Use responsibly. Only scan authorized targets. 🔍

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reclaimor-0.1.1.tar.gz (25.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

reclaimor-0.1.1-py3-none-any.whl (32.3 kB view details)

Uploaded Python 3

File details

Details for the file reclaimor-0.1.1.tar.gz.

File metadata

  • Download URL: reclaimor-0.1.1.tar.gz
  • Upload date:
  • Size: 25.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.1.tar.gz
Algorithm Hash digest
SHA256 4a6a4f3cbde04a90e442b0e46bfc2c745961f3b46a701957565ed72b75e0feca
MD5 9b6c98c37836285ad5f2b7ebdafe433d
BLAKE2b-256 3801bab3d4e0b8da9900737057421881d4b8e05fc710f35ad4608b93a6f5f89e

See more details on using hashes here.

File details

Details for the file reclaimor-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: reclaimor-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 32.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 abbe27849078a654c27893a2c0459c055e44d2f2787ba452d7d6eb5b0cac7f3a
MD5 b93649eb6af724fa2f1e26350b90347a
BLAKE2b-256 9a6e6ba5a79b8ddd5bf8fd3d766a7c961a2913583b48015b13ae8b3ae3a80ca0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page