Open In App

sigurlfind3r – Passive reconnaissance tool for known URLs discovery

Last Updated : 30 Jan, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

URLs can be beneficial to security researchers for getting a valid bug. URLs carry the information from the client to the server. Various parameters are been used in the URL. These parameters can be used to inject XSS malicious code, Open Redirection check, and many more. So to discover these URLs, we need an automated tool. Sigurlfind3r is an automated cyber security tool developed in the Golang language which discovers the URLs of the target domain from open sources. We can filter out the important URLs by applying the essential regex function. This tool is also available on the Github platform for free.

Note: Make Sure You have Golang Installed on your System, as this is a golang-based tool. Click to check the Installation process: Golang Installation Steps on Linux

Installation of Sigurlfind3r Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/signedsecurity/sigurlfind3r.git

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd sigurlfind3r/cmd/sigurlfind3r

Step 3: You are in the directory of the sigurlfind3r. Now you have to install the tool by using the following command.

go build; mv sigurlfind3r /usr/local/bin/

Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

sigurlfind3r -h

Working with Sigurlfind3r Tool on Kali Linux OS

Example 1: Basic Usage

sigurlfind3r -d geeksforgeeks.org

In this example, we will be scanning the geeksforgeeks.org target domain.

We have got the results of our basic scan on the target domain geeksforgeeks.org.

Example 2: Regex filter URLs

sigurlfind3r -d geeksforgeeks.org -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”

In this example, we will be filtering URLs by their media type in URL.

We have got the output as per the regex used in the command.

Example 3: Include Subdomains’ URLs

sigurlfind3r -d geeksforgeeks.org -iS

In this example, we will be including subdomains for URL discovery.

We have got the results of our scan.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads