Pidrila is a Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team for all ethical netstalkers.
Installation & Usage
git clone https://github.com/enemy-submarine/pidrila.git
cd pidrila
python3 pidrila.py -u
Options
Usage: pidrila.py [OPTIONS]
Options:
-U, –user-agent TEXT User-Agent
-t, –timeout INTEGER Request timeout [default: 30]
-A, –auth TEXT Basic HTTP auth, i.e. login:password
-M, –max-connections-per-host INTEGER
How many simultaneous connections should we
open (per each host) [default: 16]
-m, –max-connections INTEGER How many simultaneous connections should we
open [default: 128]
-p, –proxy TEXT Proxy address, like socks5h://127.0.0.1:9050
-p, –pathlist FILENAME Path list
-L, –url-list FILENAME Target URL list
-u, –url TEXT Target URL, option is mutually exclusive
with url_list [required]
-l, –logs DIRECTORY Destination directory for the logs
–http-method [head|get] HTTP method: GET or HEAD [default: get]
–help Show this message and exit.
Features
Screenshot
Usage Examples
python3 ./pidrila.py -u http://silenthouse.yoba -M 128
python3 ./pidrila.py -u http://zqktlwi4fecvo6ro.onion -m 16 -M 16 –proxy=socks5h://127.0.0.1:9050
python3 ./pidrila.py -m 2048 -L darkweb_sites_list.txt –user-agent “Pantusha/2.0 (4.2BSD)”
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…