CloudSquatting Catc7er is a tool designed to detect potential vulnerabilities caused by dangling DNS records. Dangling DNS records occur when a domain points to an IP address that is no longer in use by the intended service, often due to misconfigurations or decommissioned cloud resources. This can lead to cloud squatting, where an attacker can take control of the IP address and potentially serve malicious content. Read more.
The tool covers the following cloud providers:
- Amazon Web Services (AWS)
- Microsoft Azure
- Google Cloud Platform (GCP)
- Oracle Cloud Infrastructure (OCI)
- Yandex Cloud
- Linode
- Cloudflare
-
Clone the repository:
git clone https://github.com/ahussam/CloudSquatting-Catc7er.git cd CloudSquatting-Catc7er -
Create virtual enviroment:
python3 -m venv .env source .env/bin/activate -
Install dependencies:
pip install -r requirements.txt
python catc7er.py <DOMAIN_OR_FILE>- Check a single domain:
python catc7er.py google.com- Check multiple domains from a file:
python catc7er.py domains.txt- Update cloud provider IP ranges:
python catc7er.py updateThe tool will output the results directly to the console, indicating whether each domain is vulnerable or not.
Contributions are welcome! Please fork the repository and submit a pull request for any improvements or bug fixes.
This project is licensed under the MIT License.
- Developed by Abdullah Al-Sultani
