Here is a Subdomain Takeover sample report:
Allows you to discover subdomains of a target organization which point to external services (ex. Amazon S3, Heroku, Github, etc) and are not claimed - leaving them vulnerable to hostile takeover.
Subdomain Takeover is a classic well paid vulnerability in Bug Bounty programs. This tool allows you to discover such vulnerabilities and get paid for them.
As a system administrator, you can use this tool to perform an external inventary of the existing DNS entries of your organization.
Since it also discovers the subdomains of the target domain, this tool allows you to have a better view of the attack surface of your target organization.
|Target domain||This is a domain name (ex. yahoo.com) which will be searched for subdomains vulnerable to takeover.|