Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning.
With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs.
This article dives deep into ShortEmAll’s capabilities, from its robust features and installation process to practical usage tips, ensuring readers can leverage this tool to its fullest potential.
Short’Em All is a Python-based tool that automates the process of scanning URLs.
It utilizes various techniques to gather information about short URLs, such as taking screenshots of landing pages, checking for the existence of URLs, and filtering results based on user preferences.
To install Short’Em All, follow these steps:
gh repo clone osintmatter/shortemall
2. Install dependencies:
pip install -r requirements.txt
Before You Begin:
credentials.json
in the main folder – follow this step-by-step guideconfig.py
file to set variables such as my_email
, to_email
.config.ini
and gmail.pickle
) in the current directory.To use Short’Em All, follow the steps below:
short_em_all.py
script.Short’Em All provides several command-line options to customize the scanning process:
-t, --target
: Insert the target keyword for this scan.-d, --dictionary
: Use a stable dictionary for this scan.-n, --notifications
: Disable email notifications on found results.-z, --zero
: Disable taking screenshots on URLs landing pages.-f, --found
: Show only found scan results.-r, --singlescan
: Use single scan mode (no data retention).-e, --email
: Receive email notification on the target scan.-s, --screenshot
: Enable taking screenshots on found results.-v, --verbose
: Enable verbose mode.python short_em_all.py
2. Perform a scan with custom options:
python short_em_all.py -t example_target -s -e
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…