Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning.
With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs.
This article dives deep into ShortEmAll’s capabilities, from its robust features and installation process to practical usage tips, ensuring readers can leverage this tool to its fullest potential.
Short’Em All is a Python-based tool that automates the process of scanning URLs.
It utilizes various techniques to gather information about short URLs, such as taking screenshots of landing pages, checking for the existence of URLs, and filtering results based on user preferences.
To install Short’Em All, follow these steps:
gh repo clone osintmatter/shortemall
2. Install dependencies:
pip install -r requirements.txt
Before You Begin:
credentials.json
in the main folder – follow this step-by-step guideconfig.py
file to set variables such as my_email
, to_email
.config.ini
and gmail.pickle
) in the current directory.To use Short’Em All, follow the steps below:
short_em_all.py
script.Short’Em All provides several command-line options to customize the scanning process:
-t, --target
: Insert the target keyword for this scan.-d, --dictionary
: Use a stable dictionary for this scan.-n, --notifications
: Disable email notifications on found results.-z, --zero
: Disable taking screenshots on URLs landing pages.-f, --found
: Show only found scan results.-r, --singlescan
: Use single scan mode (no data retention).-e, --email
: Receive email notification on the target scan.-s, --screenshot
: Enable taking screenshots on found results.-v, --verbose
: Enable verbose mode.python short_em_all.py
2. Perform a scan with custom options:
python short_em_all.py -t example_target -s -e
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…