Sigurls : A Reconnaissance Tool & It Fetches URLs From AlienVault’s OTX

Sigurls is a reconnaissance tool, it fetches URLs from AlienVault’s OTX, Common Crawl, URLScan, Github and the Wayback Machine.

DiSCLAIMER: fetching urls from github is a bit slow.

Usage

To display help message for sigurls use the -h flag:

$ sigurls -h
USAGE:
sigurls [OPTIONS]
OPTIONS:
-d domain to fetch urls for
-sE comma(,) separated list of sources to exclude
-iS include subdomains’ urls
-sL list all the available sources
-nC no color mode
-silent silent mode: output urls only
-sU comma(,) separated list of sources to use

Installation

  • From Binary

You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATHand you’re ready to go.

  • From Source

sigurls requires go1.14+ to install successfully. Run the following command to get the repo

$ GO111MODULE=on go get -u -v github.com/drsigned/sigurls/cmd/sigurls

  • From Github

$ git clone https://github.com/drsigned/sigurls.git; cd sigurls/cmd/sigurls/; go build; mv sigurls /usr/local/bin/; sigurls -h

Post Installation

sigurls will work after installation. However, to configure sigurls to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurls/conf.yaml file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.

Example

version: 1.3.1
sources:
    - commoncrawl
    - github
    - otx
    - urlscan
    - wayback
keys:
    github:
        - d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
        - asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39

R K

Recent Posts

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

7 hours ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

21 hours ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

22 hours ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

1 day ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

2 days ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

2 days ago