Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault’s OTX, Common Crawl, URLScan, Github and the Wayback Machine.
Usage
sigurlfind3r -h
This will display help for the tool.
() _ _ _ _ _ | |/ ()_ | | / _
/ | |/ | | | | '__| | |_| | '_ \ / _
| | | ‘|
__ \ | (| | || | | | | | | | | | (| |) | | |/|_, |__,|| ||| ||| ||_,|/|_| v1.2.0
|/
USAGE:
sigurlfind3r [OPTIONS]
OPTIONS:
-d, –domain domain to fetch urls for
-eS, –exclude-sources comma(,) separated list of sources to exclude
-f, –filter URL filtering regex
-iS, –include-subs include subdomains’ urls
-lS, –list-sources list all the available sources
-nC, –no-color no color mode
-s –silent silent mode: output urls only
-uS, –use-sources comma(,) separated list of sources to use
Examples
Basic
sigurlfind3r -d tesla.com
Include Subdomains
sigurlfind3r -d tesla.com -is
Regex filter out URLs
sigurlfind3r -d tesla.com -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”
Installation
From Binary
You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATH
and you’re ready to go.
sigurlfind3r requires go1.14+ to install successfully. Run the following command to get the repo
GO111MODULE=on go get -u -v github.com/signedsecurity/sigurlfind3r/cmd/sigurlfind3r
git clone https://github.com/signedsecurity/sigurlfind3r.git && \
cd sigurlfind3r/cmd/sigurlfind3r/ && \
go build; mv sigurlfind3r /usr/local/bin/ && \
sigurlfind3r -h
Post Installation
sigurlfind3r will work after installation. However, to configure sigurlfind3r to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurlfind3r/conf.yaml
file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.
Example:
version: 1.1.0
sources:
– commoncrawl
– github
– otx
– urlscan
– wayback
keys:
github:
– d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
– asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…