URLFinder: No More Active Scanning for URL Gathering
URLFinder
URLFinder is a high-speed, passive URL discovery tool designed to simplify and accelerate web asset discovery, ideal for penetration testers, security researchers, and developers looking to gather URLs without active scanning.
Feature
- Curated Passive Sources to maximize comprehensive URL discovery
- Supports multiple output formats (JSON, file, stdout)
- Optimized for Speed and resource efficiency
- STDIN/OUT support for easy integration into existing workflows
Use
Basic Usage
urlfinder -d tesla.com
This command enumerates URLs for the target domain tesla.com.
Filtering Options
Use the -m
(match) and -f
(filter) options to refine results based on URL patterns.
Examples
Include URLs Matching Specific Patterns
To include only URLs containing “shop” or “model”:
urlfinder -d tesla.com -m shop,model
Exclude URLs Matching Specific Patterns
To exclude URLs containing “privacy” or “terms”:
urlfinder -d tesla.com -f privacy,terms
Combined Match and Filter
To find URLs containing “support” but exclude those with “faq”:
urlfinder -d tesla.com -m support -f faq
Using Files for Matching and Filtering
Provide patterns in files:
urlfinder -d tesla.com -m include-patterns.txt -f exclude-patterns.txt
JSONL Output Example
Use the -j
or --jsonl
flag to output results in JSONL (JSON Lines) format, where each line is a separate JSON object. This format is useful for processing large outputs in a structured way.
Command Example
urlfinder -d tesla.com -j
Example JSONL Output
url
: The discovered URL.input
: The target domain (e.g.,tesla.com
).source
: The data source for the URL discovery (e.g.,waybackarchive
).