Sigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTX

Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault’s OTXCommon CrawlURLScanGithub and the Wayback Machine.

Usage

sigurlfind3r -h

This will display help for the tool.

() _ _ _ _ _ | |/ ()_ | | / _
/ | |/ | | | | '__| | |_| | '_ \ / _ | | | ‘|
__ \ | (| | || | | | | | | | | | (| |) | | |/|_, |__,|| ||| ||| ||_,|/|_| v1.2.0
|
/
USAGE:
sigurlfind3r [OPTIONS]
OPTIONS:
-d, –domain domain to fetch urls for
-eS, –exclude-sources comma(,) separated list of sources to exclude
-f, –filter URL filtering regex
-iS, –include-subs include subdomains’ urls
-lS, –list-sources list all the available sources
-nC, –no-color no color mode
-s –silent silent mode: output urls only
-uS, –use-sources comma(,) separated list of sources to use

Examples

Basic

sigurlfind3r -d tesla.com

Include Subdomains

sigurlfind3r -d tesla.com -is

Regex filter out URLs

sigurlfind3r -d tesla.com -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”

Installation

From Binary

You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATHand you’re ready to go.

From Source

sigurlfind3r requires go1.14+ to install successfully. Run the following command to get the repo

GO111MODULE=on go get -u -v github.com/signedsecurity/sigurlfind3r/cmd/sigurlfind3r

From Github

git clone https://github.com/signedsecurity/sigurlfind3r.git && \
cd sigurlfind3r/cmd/sigurlfind3r/ && \
go build; mv sigurlfind3r /usr/local/bin/ && \
sigurlfind3r -h

Post Installation

sigurlfind3r will work after installation. However, to configure sigurlfind3r to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurlfind3r/conf.yaml file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.

Example:

version: 1.1.0
sources:
– commoncrawl
– github
– otx
– urlscan
– wayback
keys:
github:
– d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
– asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago