Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault’s OTX, Common Crawl, URLScan, Github and the Wayback Machine.
Usage
sigurlfind3r -h
This will display help for the tool.
() _ _ _ _ _ | |/ ()_ | | / _
/ | |/ | | | | '__| | |_| | '_ \ / _ | | | ‘|
__ \ | (| | || | | | | | | | | | (| |) | | |/|_, |__,|| ||| ||| ||_,|/|_| v1.2.0
|/
USAGE:
sigurlfind3r [OPTIONS]
OPTIONS:
-d, –domain domain to fetch urls for
-eS, –exclude-sources comma(,) separated list of sources to exclude
-f, –filter URL filtering regex
-iS, –include-subs include subdomains’ urls
-lS, –list-sources list all the available sources
-nC, –no-color no color mode
-s –silent silent mode: output urls only
-uS, –use-sources comma(,) separated list of sources to use
Examples
Basic
sigurlfind3r -d tesla.com
Include Subdomains
sigurlfind3r -d tesla.com -is
Regex filter out URLs
sigurlfind3r -d tesla.com -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”
Installation
From Binary
You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATHand you’re ready to go.
sigurlfind3r requires go1.14+ to install successfully. Run the following command to get the repo
GO111MODULE=on go get -u -v github.com/signedsecurity/sigurlfind3r/cmd/sigurlfind3r
git clone https://github.com/signedsecurity/sigurlfind3r.git && \
cd sigurlfind3r/cmd/sigurlfind3r/ && \
go build; mv sigurlfind3r /usr/local/bin/ && \
sigurlfind3r -h
Post Installation
sigurlfind3r will work after installation. However, to configure sigurlfind3r to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurlfind3r/conf.yaml file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.
Example:
version: 1.1.0
sources:
– commoncrawl
– github
– otx
– urlscan
– wayback
keys:
github:
– d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
– asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…