Categories: Kali Linux

Curate – A tool for fetching archived URLs

Curate is a tool for fetching archived URLs and to be rewritten in Go.

Curate Initial set-up one-liner

This will clone this repository and then move all scripts to /usr/local/bin.

$ git clone git@github.com:EdOverflow/curate.git \
&& cp curate/curate /usr/local/bin/ \
&& echo "You can delete the ./curate/ folder now."

Once you have are done with this one-liner, make sure to include your VirusTotal API key in your .bashrc file. The variable should be named VIRUS_TOTAL_API_KEY.

Also Read Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Usage

To fetch archived URLs simply run it and specify the target host.

 $ curate <host>
 $ curate example.com

If you want to search for strings straight away in the output you can also specify your search term or regular expression by using the -r flag.

$ curate <host> -r <search term>
$ curate example.com -r example

List of search terms

Curate outputs the results into a curate.txt file which allows you to easily grep through the URLs for keywords. Here are some ideas for things to grep for in curate.txt.

  • admin
  • password
  • key
  • api
  • hmac
  • url
  • path
  • redir
  • php
  • id=

It is advisable to exclude images and stylesheets from your searches by piping everything into ‘grep -v’.

Disclaimer

This project is made for educational and ethical testing purposes
only. Usage of this tool for attacking targets without prior mutual
consent is illegal. Developers assume no liability and are not
responsible for any misuse or damage caused by these scripts.

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

3 hours ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

3 hours ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

1 day ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

3 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

3 days ago