NtHiM : Super Fast Sub-domain Takeover Detection

NtHiM is a super Fast Sub-domain Takeover Detection.

Installation

Method 1: Using Pre-compiled Binaries

The pre-compiled binaries for different systems are available in the Releases page. You can download the one suitable for your system, unzip the file and start using NtHiM.

Method 2: Using Crates.io

NtHiM is available on Crates.io. So, if you have Rust installed on your system, you can simply install NtHiM with the following command:

cargo install NtHiM

Method 3: Manual Build

You will need Cargo to perform the manual build for NtHiM. If you have Cargo installed, you can simply follow the steps below:

  • Clone this repository, git clone https://github.com/TheBinitGhimire/NtHiM;
  • Go inside the folder, cd NtHiM;
  • Use the cargo build command,
  • Go inside the newly-created target folder, and open the debug folder inside it, cd target/debug;
  • You will find NtHiM.exe (on Microsoft Windows) or NtHiM binary (on Linux).

The installation walkthrough for NtHiM has been uploaded to YouTube, covering all of these three methods, and you can watch the video here: How to Install and Use NtHiM (Now, the Host is Mine!)? Super Fast Sub-domain Takeover Detection!

Usage

FlagDescriptionExample
-hDisplay help related to usage!NtHiM -h
-tScan a single target!NtHiM -t https://example.example.com
-fScan a list of targets from a file!NtHiM -f hostnames.txt
-cNumber of Concurrent Threads!NtHiM -c 100 -f hostnames.txt
-VDisplay the version information!NtHiM -V

Use Case 1 (Single Target):

NtHiM -t https://example.example.com

Use Case 2 (Multiple Targets):

NtHiM -f hostnames.txt

Usage Demonstration

Examples

Single Target

Multiple Targets using Concurrent Threads

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

7 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

7 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

7 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago