Cyber security

Gouge – The Essential Burp Suite Extension For URL Extraction

Gouge is a Burp Suite extension to extract or GOUGE all URLs. It is a Burp Suite extension written in Python and uses the Burp Suite API to extract URLs from a webpage & all its JS files too!

How To Use Gouge?

  1. Download the latest release of Gouge from the releases page.
  2. Extract the Gouge zip file to a directory of your choice.
  3. Open Burp Suite and go to the Extender tab.
  4. Click on the “Add” button and select the Gouge.py file from the extracted Gouge directory.
  5. Go to the Gouge tab and click on the “Gouge” button to start Gouging.

How To Build Gouge?

Gouge is written in Python and uses the Burp Suite API to extract URLs from JS files.

To build Gouge, you need to have Python installed on your computer. You can download Python from the official Python website.

Once you have Python installed, you can build Gouge by following these steps:

  1. Open a terminal or command prompt and navigate to the directory where you have extracted the Gouge source code.
  2. Run the following command to install the required dependencies:
pip install -r requirements.txt
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 hours ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

23 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 day ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 day ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 day ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 day ago