What info you can find on digbit github page: BitSquatting is not new but it’s relatively new. This type of attack relies on a random bit that switches from 0 to 1 or from 1 to 0 inside a RAM. Because of this even though you try to access domain like cnn.com, in fact your computer is requesting ann.com. It’s rare but it happens. It can be caused by a cosmic radiation or overheated memory modules.
In this post you fill find small guide how to install this tool. There is two possibilities. Install digbit on your local host or choose docker with pre-installed tool. Tested on Ubuntu 16.04 LTS
Docker image you can find here https://hub.docker.com/r/szalek/pentest-tools/
docker pull szalek/pentest-tools docker run -it szalek/pentest-tools
How to use
If you prefer installation, here is what I using too add this tool to docker
apt-get update && \ apt-get install -y git && \ apt-get install -y python3 && \ git clone https://github.com/szalek/digbit.git /home/digbit && \ chmod +x /home/digbit/src/digbit.sh && \ chmod +x /home/digbit/src/digbit.py && \ ln -s /home/digbit/src/digbit.sh /usr/bin/digbit && \ ln -s /home/digbit/src/digbit.py /usr/bin/digbit.py