Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning.
With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs.
This article dives deep into ShortEmAll’s capabilities, from its robust features and installation process to practical usage tips, ensuring readers can leverage this tool to its fullest potential.
Short’Em All is a Python-based tool that automates the process of scanning URLs.
It utilizes various techniques to gather information about short URLs, such as taking screenshots of landing pages, checking for the existence of URLs, and filtering results based on user preferences.
To install Short’Em All, follow these steps:
gh repo clone osintmatter/shortemall
2. Install dependencies:
pip install -r requirements.txt
Before You Begin:
credentials.json
in the main folder – follow this step-by-step guideconfig.py
file to set variables such as my_email
, to_email
.config.ini
and gmail.pickle
) in the current directory.To use Short’Em All, follow the steps below:
short_em_all.py
script.Short’Em All provides several command-line options to customize the scanning process:
-t, --target
: Insert the target keyword for this scan.-d, --dictionary
: Use a stable dictionary for this scan.-n, --notifications
: Disable email notifications on found results.-z, --zero
: Disable taking screenshots on URLs landing pages.-f, --found
: Show only found scan results.-r, --singlescan
: Use single scan mode (no data retention).-e, --email
: Receive email notification on the target scan.-s, --screenshot
: Enable taking screenshots on found results.-v, --verbose
: Enable verbose mode.python short_em_all.py
2. Perform a scan with custom options:
python short_em_all.py -t example_target -s -e
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…