Categories: Kali Linux

Curate – A tool for fetching archived URLs

Curate is a tool for fetching archived URLs and to be rewritten in Go.

Curate Initial set-up one-liner

This will clone this repository and then move all scripts to /usr/local/bin.

$ git clone git@github.com:EdOverflow/curate.git \
&& cp curate/curate /usr/local/bin/ \
&& echo "You can delete the ./curate/ folder now."

Once you have are done with this one-liner, make sure to include your VirusTotal API key in your .bashrc file. The variable should be named VIRUS_TOTAL_API_KEY.

Also Read Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Usage

To fetch archived URLs simply run it and specify the target host.

 $ curate <host>
 $ curate example.com

If you want to search for strings straight away in the output you can also specify your search term or regular expression by using the -r flag.

$ curate <host> -r <search term>
$ curate example.com -r example

List of search terms

Curate outputs the results into a curate.txt file which allows you to easily grep through the URLs for keywords. Here are some ideas for things to grep for in curate.txt.

  • admin
  • password
  • key
  • api
  • hmac
  • url
  • path
  • redir
  • php
  • id=

It is advisable to exclude images and stylesheets from your searches by piping everything into ‘grep -v’.

Disclaimer

This project is made for educational and ethical testing purposes
only. Usage of this tool for attacking targets without prior mutual
consent is illegal. Developers assume no liability and are not
responsible for any misuse or damage caused by these scripts.

R K

Recent Posts

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

2 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

2 days ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

4 days ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

4 days ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 months ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

3 months ago