Discover ‘httpAlive,’ a powerful URL analysis tool designed for web application penetration testing.
With features like user-agent rotation, multithreading, and colorized output, this versatile tool efficiently probes for alive subdomains and URLs. In this article, we’ll explore its capabilities, installation, and usage, empowering you with a valuable asset for enhancing your web application security assessments.
colorama library to provide colorized and visually appealing output.concurrent.futures module for concurrent execution of HTTP requests.httpx library as the HTTP client with SSL certificate verification disabled.argparse module for easy configuration.KeyboardInterrupt.
git clone https://github.com/aashish36/httpAlive.git
cd httpAlive
pip install -r requirements.txt
git clone https://github.com/aashish36/httpAlive.git
cd httpAlive
pip install .
██╗░░██╗████████╗████████╗██████╗░░░░░░░░█████╗░██╗░░░░░██╗██╗░░░██╗███████╗
██║░░██║╚══██╔══╝╚══██╔══╝██╔══██╗░░░░░░██╔══██╗██║░░░░░██║██║░░░██║██╔════╝
███████║░░░██║░░░░░░██║░░░██████╔╝█████╗███████║██║░░░░░██║╚██╗░██╔╝█████╗░░
██╔══██║░░░██║░░░░░░██║░░░██╔═══╝░╚════╝██╔══██║██║░░░░░██║░╚████╔╝░██╔══╝░░
██║░░██║░░░██║░░░░░░██║░░░██║░░░░░░░░░░░██║░░██║███████╗██║░░╚██╔╝░░███████╗
╚═╝░░╚═╝░░░╚═╝░░░░░░╚═╝░░░╚═╝░░░░░░░░░░░╚═╝░░╚═╝╚══════╝╚═╝░░░╚═╝░░░╚══════╝
Author : Aashish
Github : https://github.com/aashish36
httpAlive is a tool designed to efficiently probe for alive subdomains and Urls from a provided list.
usage: httpalive-Mark9.py [-h] -l list [-o output] [-c CONCURRENCY] [-t THREADS]
options:
-h, --help show this help message and exit.
-l list, --DomainList list
[INFO]: List of Subdomains or URLs.
-o output, --output output
[INFO]: File to save our output.
-c CONCURRENCY, --concurrency CONCURRENCY
[INFO]: Concurrency level to make fast process.
-t THREADS, --threads THREADS
[INFO]: Threading level to make fast process.
python ./httpAlive/httpAlive -l subdomainList.txt httpAlive -l subdomainList.txt When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…