Kali Linux

SourceLeakHacker : A Multi Threads Web Application Source Leak Scanner

SourceLeakHacker is a multi-threads web directories scanner.

Installation

pip install -r requirements.txt

Usage

usage: SourceLeakHacker.py [options]
optional arguments:
-h, –help show this help message and exit
–url URL url to scan, eg: ‘http://127.0.0.1/’
–urls URLS file contains urls to scan, one line one url.
–scale {full,tiny} build-in dictionary scale
–output OUTPUT output folder, default: result/YYYY-MM-DD hh:mm:ss
–threads THREADS, -t THREADS
threads numbers, default: 4
–timeout TIMEOUT HTTP request timeout
–level {CRITICAL,ERROR,WARNING,INFO,DEBUG}, -v {CRITICAL,ERROR,WARNING,INFO,DEBUG}
log level
–version, -V show program’s version number and exit

Example

$ python SourceLeakHacker.py –url=http://baidu.com –threads=4 –timeout=8
[302] 0 3.035766 text/html; charset=iso-8859-1 http://baidu.com//_index.php [302] 0 3.038096 text/html; charset=iso-8859-1 http://baidu.com//__index.php.bak

[302] 0 0.063973 text/html; charset=iso-8859-1 http://baidu.com/_adm/_index.php
[302] 0 0.081672 text/html; charset=iso-8859-1 http://baidu.com/_adm/_index.php.bak
Result save in file: result/2020-02-27 07:07:47.csv

$ cat url.txt
http://baidu.com/
http://google.com/
$ python SourceLeakHacker.py –urls=url.txt –threads=4 –timeout=8
[302] 0 2.363600 text/html; charset=iso-8859-1 http://baidu.com/_/__index.php.bak
[302] 0 0.098417 text/html; charset=iso-8859-1 http://baidu.com/_adm/__index.php.bak

[302] 0 0.060524 text/html; charset=iso-8859-1 http://google.com/_adm/_index.php.bak
[302] 0 0.075042 text/html; charset=iso-8859-1 http://baidu.com/_adm/_index.php.back
Result save in file: result/2020-02-27 07:08:54.csv

Demo

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

23 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago