Sigurls is a reconnaissance tool, it fetches URLs from AlienVault’s OTX, Common Crawl, URLScan, Github and the Wayback Machine.
DiSCLAIMER: fetching urls from github is a bit slow.
Usage
To display help message for sigurls use the -h
flag:
$ sigurls -h
USAGE:
sigurls [OPTIONS]
OPTIONS:
-d domain to fetch urls for
-sE comma(,) separated list of sources to exclude
-iS include subdomains’ urls
-sL list all the available sources
-nC no color mode
-silent silent mode: output urls only
-sU comma(,) separated list of sources to use
Installation
You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATH
and you’re ready to go.
sigurls requires go1.14+ to install successfully. Run the following command to get the repo
$ GO111MODULE=on go get -u -v github.com/drsigned/sigurls/cmd/sigurls
$ git clone https://github.com/drsigned/sigurls.git; cd sigurls/cmd/sigurls/; go build; mv sigurls /usr/local/bin/; sigurls -h
Post Installation
sigurls will work after installation. However, to configure sigurls to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurls/conf.yaml
file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.
Example
version: 1.3.1 sources: - commoncrawl - github - otx - urlscan - wayback keys: github: - d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39 - asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…