Sigurls : A Reconnaissance Tool & It Fetches URLs From AlienVault’s OTX

Sigurls is a reconnaissance tool, it fetches URLs from AlienVault’s OTX, Common Crawl, URLScan, Github and the Wayback Machine.

DiSCLAIMER: fetching urls from github is a bit slow.

Usage

To display help message for sigurls use the -h flag:

$ sigurls -h
USAGE:
sigurls [OPTIONS]
OPTIONS:
-d domain to fetch urls for
-sE comma(,) separated list of sources to exclude
-iS include subdomains’ urls
-sL list all the available sources
-nC no color mode
-silent silent mode: output urls only
-sU comma(,) separated list of sources to use

Installation

  • From Binary

You can download the pre-built binary for your platform from this repository’s releases page, extract, then move it to your $PATHand you’re ready to go.

  • From Source

sigurls requires go1.14+ to install successfully. Run the following command to get the repo

$ GO111MODULE=on go get -u -v github.com/drsigned/sigurls/cmd/sigurls

  • From Github

$ git clone https://github.com/drsigned/sigurls.git; cd sigurls/cmd/sigurls/; go build; mv sigurls /usr/local/bin/; sigurls -h

Post Installation

sigurls will work after installation. However, to configure sigurls to work with certain services – currently github – you will need to have setup API keys. The API keys are stored in the $HOME/.config/sigurls/conf.yaml file – created upon first run – and uses the YAML format. Multiple API keys can be specified for each of these services.

Example

version: 1.3.1
sources:
    - commoncrawl
    - github
    - otx
    - urlscan
    - wayback
keys:
    github:
        - d23a554bbc1aabb208c9acfbd2dd41ce7fc9db39
        - asdsd54bbc1aabb208c9acfbd2dd41ce7fc9db39

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

11 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

11 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

11 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

11 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

11 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

14 hours ago