Cyber security

Gouge – The Essential Burp Suite Extension For URL Extraction

Gouge is a Burp Suite extension to extract or GOUGE all URLs. It is a Burp Suite extension written in Python and uses the Burp Suite API to extract URLs from a webpage & all its JS files too!

How To Use Gouge?

  1. Download the latest release of Gouge from the releases page.
  2. Extract the Gouge zip file to a directory of your choice.
  3. Open Burp Suite and go to the Extender tab.
  4. Click on the “Add” button and select the Gouge.py file from the extracted Gouge directory.
  5. Go to the Gouge tab and click on the “Gouge” button to start Gouging.

How To Build Gouge?

Gouge is written in Python and uses the Burp Suite API to extract URLs from JS files.

To build Gouge, you need to have Python installed on your computer. You can download Python from the official Python website.

Once you have Python installed, you can build Gouge by following these steps:

  1. Open a terminal or command prompt and navigate to the directory where you have extracted the Gouge source code.
  2. Run the following command to install the required dependencies:
pip install -r requirements.txt
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

12 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

12 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

12 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

12 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

12 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

15 hours ago