Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning.
With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs.
This article dives deep into ShortEmAll’s capabilities, from its robust features and installation process to practical usage tips, ensuring readers can leverage this tool to its fullest potential.
Short’Em All is a Python-based tool that automates the process of scanning URLs.
It utilizes various techniques to gather information about short URLs, such as taking screenshots of landing pages, checking for the existence of URLs, and filtering results based on user preferences.
To install Short’Em All, follow these steps:
gh repo clone osintmatter/shortemall
2. Install dependencies:
pip install -r requirements.txt
Before You Begin:
credentials.json
in the main folder – follow this step-by-step guideconfig.py
file to set variables such as my_email
, to_email
.config.ini
and gmail.pickle
) in the current directory.To use Short’Em All, follow the steps below:
short_em_all.py
script.Short’Em All provides several command-line options to customize the scanning process:
-t, --target
: Insert the target keyword for this scan.-d, --dictionary
: Use a stable dictionary for this scan.-n, --notifications
: Disable email notifications on found results.-z, --zero
: Disable taking screenshots on URLs landing pages.-f, --found
: Show only found scan results.-r, --singlescan
: Use single scan mode (no data retention).-e, --email
: Receive email notification on the target scan.-s, --screenshot
: Enable taking screenshots on found results.-v, --verbose
: Enable verbose mode.python short_em_all.py
2. Perform a scan with custom options:
python short_em_all.py -t example_target -s -e
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…