This Metasploit auxiliary module scans a list of subdomains to check for active hosts, takeover vulnerabilities, and potential XSS flaws.
- Scans subdomains from a file
- Detects potential subdomain takeovers
- Checks for XSS vulnerabilities using a set of payloads
- Saves results to an output file
Ensure you have Metasploit Framework installed on your system.
msfconsole
use auxiliary/scanner/subdomain_xss
set FILE subdomains.txt
set OUTPUT results.txt
run
Option | Description |
---|---|
FILE |
Path to the subdomain list file (required) |
OUTPUT |
Path to save results (default: results.txt ) |
[*] Checking example.com
[+] Active: example.com (200)
[!] Potential Takeover: takeover.example.com
[!] XSS Vulnerable: vulnerable.example.com with payload: <script>alert('XSS')</script>
[+] Scan completed! Results saved in results.txt
- Ensure your subdomain list file contains one subdomain per line.
- The module checks for takeover by detecting unconfigured domains.
- XSS detection is based on reflected payloads in HTTP responses.
This project is licensed under the MIT License.
- HAMZA EL-HAMDAOUI