NtHiM : Super Fast Sub-domain Takeover Detection

NtHiM is a super Fast Sub-domain Takeover Detection.

Installation

Method 1: Using Pre-compiled Binaries

The pre-compiled binaries for different systems are available in the Releases page. You can download the one suitable for your system, unzip the file and start using NtHiM.

Method 2: Using Crates.io

NtHiM is available on Crates.io. So, if you have Rust installed on your system, you can simply install NtHiM with the following command:

cargo install NtHiM

Method 3: Manual Build

You will need Cargo to perform the manual build for NtHiM. If you have Cargo installed, you can simply follow the steps below:

  • Clone this repository, git clone https://github.com/TheBinitGhimire/NtHiM;
  • Go inside the folder, cd NtHiM;
  • Use the cargo build command,
  • Go inside the newly-created target folder, and open the debug folder inside it, cd target/debug;
  • You will find NtHiM.exe (on Microsoft Windows) or NtHiM binary (on Linux).

The installation walkthrough for NtHiM has been uploaded to YouTube, covering all of these three methods, and you can watch the video here: How to Install and Use NtHiM (Now, the Host is Mine!)? Super Fast Sub-domain Takeover Detection!

Usage

FlagDescriptionExample
-hDisplay help related to usage!NtHiM -h
-tScan a single target!NtHiM -t https://example.example.com
-fScan a list of targets from a file!NtHiM -f hostnames.txt
-cNumber of Concurrent Threads!NtHiM -c 100 -f hostnames.txt
-VDisplay the version information!NtHiM -V

Use Case 1 (Single Target):

NtHiM -t https://example.example.com

Use Case 2 (Multiple Targets):

NtHiM -f hostnames.txt

Usage Demonstration

Examples

Single Target

Multiple Targets using Concurrent Threads

R K

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

1 week ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 weeks ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 weeks ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

2 weeks ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

2 months ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

2 months ago