CyberCrowl – Python based Web Path Scanner Tool
Directories on the target domain can contain some sensitive information about the Web-Application which should not be revealed. We can discover this hidden directory by automating our task. CyberCrowl tool is a crawler that crawls the hidden directories from the targeted domain server and lists out the Status code of each directory with the response message. CyberCrowl tool is developed in the Python-Language available on GitHub. CyberCrowl tool is open-source and free to use. We can specify our custom word list for performing brute-forcing of the directories.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Installation of CyberCrowl Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/tnmch/CyberCrowl.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
Step 3: You are in the directory of the CyberCrowl. Now you have to install a dependency of the CyberCrowl using the following command.
sudo pip install -r requirements.txt
CyberCrowl – Python based Web Path Scanner Tool image widget
Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check help section.
python3 cybercrowl.py -h
Working with CyberCrowl Tool on Kali Linux OS
Example 1: Finding Directories on the Target Domain.
python3 cybercrowl.py -u http://geeksforgeeks.org
In this example, we are finding directories on our target domain.
We have got directors with their status codes and the status message.
Example 2: Using Custom Wordlists
python3 cybercrowl.py -u http://geeksforgeeks.org -w /usr/share/wordlists/dirb/small.txt
In this example, we will be using a custom wordlist for brute-forcing
We have specified the absolute path of the word-list file in the -w tag.
Tool has started its work for finding the directories.