🚨 GitHub 404 Subdomain Checker – A simple Python tool to check if subdomains point to GitHub 404 pages, which may indicate a potential subdomain takeover vulnerability.
- Reads subdomains from
list.txt - Detects and logs subdomains that return a GitHub-branded 404 page
- Saves vulnerable subdomains to
404.txt
-
Clone the repository:
git clone https://github.com/0xBakusedu/Github-404.git cd Github-404 -
Install dependencies: Make sure Python 3 and
pipare installed.pip install -r requirements.txt
Contents of
requirements.txt:requests colorama -
Add your subdomains to
list.txt: Example:example.github.io subdomain.example.com -
Run the script:
python3 checker.py
-
Subdomains returning a GitHub-branded 404 will be saved in
404.txt -
Console output example:
[404] https://example.github.io/ [OK ] https://valid.example.com/
This tool is intended for educational and authorized security testing purposes only. Use it responsibly. The author is not responsible for any misuse or damages caused by this tool.
This project is licensed under the MIT License.