Categories: Kali Linux

Pastego : Scrape/Parse Pastebin Using GO And Expression Grammar

Pastego is a scrape/Parse Pastebin using GO and grammar expression (PEG).

Installation

$ go get -u github.com/notdodo/pastego

Usage

Search keywords are case sensitive

pastego -s "password,keygen,PASSWORD"

You can use boolean operators to reduce false positive

pastego -s "quake && ~earthquake, password && ~(php || sudo || Linux || '<body>')"

This command will search for bins with quake but not earthquake words and for bins with password but not php, sudo, Linux, <body> words.

Usage: pastego []

Flags:
–help Show context-sensitive help (also try –help-long and –help-man).
-s, –search=”pass” Strings to search, i.e: “password,ssh”
-o, –output=”results” Folder to save the bins
-i, –insensitive Search for case-insensitive strings

Supported expression/operators:

`&&` – and

`||` – or

`~` – not `

‘string with space’`

`(myexpression && ‘with operators’)`

Keybindings

q, ctrl+c: quit pastego
k, : show previous bin
j, : show next bin
n: jump forward by 15 bins
p: jump backward by 15 bins
N: move to the next block of findings (in alphabet order)
P: move to the previous block of findings (in alphabet order)
d: delete file from file system
HOME: go to top

Requirements

go get -u "github.com/PuerkitoBio/goquery"

go get -u "gopkg.in/alecthomas/kingpin.v2"

go get -u "github.com/jroimartin/gocui"

  • To create the code from PEG use pigeon:

go get -u github.com/mna/pigeon

Disclaimer

You need a PRO account to use this: pastebin will block/blacklist your IP.

pastebin PRO

  • Or….
    • increase the time between each request
    • create a script to restart your router when pastebin warns you
  • In progress…
    • Add flag to pass/read a list of proxies to avoid IP ban/throttle for free users
R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

6 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

6 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

6 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago