Skip to main content

Advanced subdomain takeover reconnaissance & safe-vulnerability-detection

Project description

ReClaimor

Advanced subdomain takeover scanner with 20+ provider fingerprints

PyPI version Python License

ReClaimor is a fast, accurate subdomain takeover detection tool with multi-tier analysis (DNS → HTTP → TLS → Fingerprinting) and support for 20+ cloud providers.

⚠️ Legal Notice

Only scan domains you own or have explicit authorization to test. Unauthorized scanning is illegal.

🚀 Quick Start

# Install
pip install reclaimor

# Scan single domain
reclaimor --url subdomain.example.com

# Scan from file
reclaimor --file targets.txt --output results.json

# Generate HTML report
reclaimor --file targets.txt --output report.html --format html

✨ Key Features

  • Multi-tier Detection - DNS, HTTP, TLS, and fingerprint analysis
  • 20+ Providers - GitHub Pages, Heroku, AWS S3, Azure, Netlify, Vercel, Fastly, and more
  • Fast Async Scanning - Concurrent scanning with rate limiting
  • Multiple Formats - JSON, CSV, HTML, and console output
  • Interactive TUI - Manual triage interface
  • Safe by Default - Detection-only mode (optional verification with explicit flags)

📋 Requirements

  • Python 3.10+
  • Internet connection

🔧 Basic Usage

# Verify installation
reclaimor --version
reclaimor --self-check

# Single domain
reclaimor --url subdomain.example.com

# Batch scanning
reclaimor --file targets.txt --concurrency 50

# With output
reclaimor --file targets.txt --output results.json --format json

# Interactive mode
reclaimor --file targets.txt --tui

# Pipe from other tools
subfinder -d example.com | reclaimor --stdin

📊 Supported Providers

GitHub Pages • Heroku • AWS S3 • AWS CloudFront • Azure Blob • Azure CDN • Netlify • Vercel • Fastly • Shopify • Tumblr • WordPress.com • Pantheon • Bitbucket • Ghost • Cargo • Feedpress • Surge.sh • Acquia • Kinsta

🔧 Configuration

Create ~/.reclaimor/config.yaml:

concurrency: 50
timeout: 15
safe_mode: true
rate_limit: 10

🐳 Docker

docker pull letchupkt/reclaimor:latest
docker run -v $(pwd)/targets.txt:/targets.txt letchupkt/reclaimor --file /targets.txt

🧪 Example Workflow

# 1. Enumerate subdomains
subfinder -d target.com -silent > subdomains.txt

# 2. Scan for takeovers
reclaimor --file subdomains.txt --output findings.json

# 3. Review findings
cat findings.json | jq '.results[] | select(.vulnerable==true)'

🛡️ Safety Features

  • Safe mode by default (detection only)
  • Explicit flags required for verification (--auto-exploit --aggressive)
  • Rate limiting to prevent DoS
  • Auto-cleanup after verification
  • Legal notice before scanning

📚 Documentation

🤝 Contributing

Contributions welcome! See CONTRIBUTING.md

📝 Responsible Disclosure

If you find vulnerabilities:

  1. Notify the asset owner privately
  2. Allow 90 days for remediation
  3. Follow responsible disclosure practices

📄 License

MIT License - Copyright (c) 2025 Lakshmikanthan (@letchupkt)

🙏 Credits

Built by @letchupkt for the security research community.


Use responsibly. Only scan authorized targets. 🔍

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reclaimor-0.1.2.tar.gz (25.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

reclaimor-0.1.2-py3-none-any.whl (32.3 kB view details)

Uploaded Python 3

File details

Details for the file reclaimor-0.1.2.tar.gz.

File metadata

  • Download URL: reclaimor-0.1.2.tar.gz
  • Upload date:
  • Size: 25.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.2.tar.gz
Algorithm Hash digest
SHA256 cd1c91a2ca168efd840997b47857bea1151c95f396c41a3f4e799942847e00e4
MD5 812528447ca3cbebb9952446f5c30311
BLAKE2b-256 2a302d1e58822897156c64b8a607a0f17e9f342fcefd3c37d87b45b6affe32ea

See more details on using hashes here.

File details

Details for the file reclaimor-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: reclaimor-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 32.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for reclaimor-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e02f1258d5ed6f5ab36322c6c2e0d25b8ffdef7cd02e5caf6a10822c51a32bec
MD5 444fadc0d08393802e2cfdb093af1117
BLAKE2b-256 480d343e01ee961af8d20d976221f17634fb81cc586abfb03f753cc6dae7fed2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page