https://github.com/anmolksachan/TheTimeMachine
Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not
https://github.com/anmolksachan/TheTimeMachine
automate bugbounty fuzzer fuzzing jira lfi openredirect osint parameter scanner xss
Last synced: 2 months ago
JSON representation
Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not
- Host: GitHub
- URL: https://github.com/anmolksachan/TheTimeMachine
- Owner: anmolksachan
- License: gpl-3.0
- Created: 2022-01-23T17:34:25.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2025-08-18T05:58:09.000Z (3 months ago)
- Last Synced: 2025-08-18T07:26:59.734Z (3 months ago)
- Topics: automate, bugbounty, fuzzer, fuzzing, jira, lfi, openredirect, osint, parameter, scanner, xss
- Language: Python
- Homepage: https://anmolksachan.medium.com/the-time-machine-weaponizing-waybackurls-for-recon-bugbounties-osint-sensitive-endpoints-and-40889a03feeb
- Size: 935 KB
- Stars: 436
- Watchers: 7
- Forks: 66
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - anmolksachan/TheTimeMachine - Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not (Python)
- osint_stuff_tool_collection - The Time Machine - fetches subdomains from waybackurl; - search for /api/JSON/Configuration endpoints and many more (view pic) | ([](#table-of-contents) Table of contents / [](#tools-for-working-with-web-archives)Tools for working with web archives)
- awesome - anmolksachan/TheTimeMachine - Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not (Python)
README
---
# π TheTimeMachine v3.0 - Weaponizing Wayback for Recon, BugBounties, OSINT & More!

Youβve heard of time travel in movies and comics, right? Well, this isnβt fiction anymore π. *TheTimeMachine* lets you dig through the past of any web app by scraping archived URLs from the Wayback Machine β and helps you find sensitive, forgotten, or deprecated endpoints for further exploitation.
Whether youβre into bug bounty, red teaming, or just love good olβ recon, this tool was built to make my recon workflow faster, cleaner, and more effective. No more juggling multiple scripts β TheTimeMachine does it all in one shot.
---
## π§© Featured At
| Conference | Year | Track / Showcase | |
|-------------------|------|---------------------------|---|
| [Defcon33- Las Vegas, NV](https://defcon.org/html/defcon-33/dc-33-demolabs.html#content_60874) | 2025 | Demo Labs |
|
| [BSides Mumbai](https://www.linkedin.com/feed/update/urn:li:activity:7339908506176618497/) | 2025 | Tools Arsenal Showcase |
|
| [OSINT Conference](https://osintconference.com/speakers) | 2025 | OSINT Conference |
|
| [Announcing Soon!](#) | 20XX | Announcing Soon! |
|
---
## π‘ What It Does
This isn't just another Wayback scraper. Here's what TheTimeMachine brings to the table:
- π **Archived URL Fetching** β Pull historical URLs from Wayback Machine.
- πΎ **Backup File Detection** β Find `.zip`, `.bak`, `.sql`, `.tar.gz`, `.old`, and other juicy files.
- βοΈ **Historical Backups** - Looks for historical backups for the identified backup files.
- βοΈ **Attack Mode** β Scan for vulnerable endpoints using patterns/signatures:
- XSS
- SQLi
- LFI
- Open Redirects
- WordPress Vulns
- JIRA-based misconfig
- π§ **GET Parameter Mapping** β Map every GET parameter to where it appears. (Great for fuzzing automation.)
- π§ͺ **JWT Detection** β Detect and decode JWTs embedded in archived URLs.
- π **Directory Listing Detection** β Find open indexed directories.
- π΅οΈ **Subdomain Enumeration** β Pull subdomains seen in archived data.
- π **Keyword Search** β Search custom keywords like `config`, `backup`, `.log`, etc.
- π§© **Custom Payload Lists** β Use your own fuzz list or signatures for custom scans.
---
## βοΈ Installation
Tested on **Python 3** across Ubuntu/Kali/Windows.
```bash
git clone https://github.com/anmolksachan/TheTimeMachine
````
```bash
cd TheTimeMachine
````
```bash
pip3 install -r requirements.txt
````
---
## π Usage
```bash
python3 thetimemachine.py [OPTIONS]
```
**Note:** Don't use `http://` or `https://` in the domain β just pass `domain.com` or `sub.domain.com`.
---
## π Options
| Option | Description |
| ----------------- | ------------------------------------------------------------ |
| `--fetch` | Fetch archived URLs from Wayback |
| `--backups` | Scan for exposed backup/config files |
| `--attack [type]` | Run attack mode (xss, sqli, lfi, redirect, jira, wp, custom) |
| `--jwt` | Detect & decode JWT tokens |
| `--subdomains` | Extract subdomains from historical URLs |
| `--parameters` | Extract GET parameters & map them to URLs |
| `--listings` | Detect open directory listings |
---
## π Example Workflows
#### Fetch all Wayback URLs
```bash
python3 thetimemachine.py example.com --fetch
```
#### Look for exposed backup files
```bash
python3 thetimemachine.py example.com --backups
```
#### Look for directory listing
```bash
python3 thetimemachine.py example.com --listings
```
#### Scan for possible XSS points
```bash
python3 thetimemachine.py example.com --attack xss
```
#### Map parameters from archived data
```bash
python3 thetimemachine.py example.com --parameters
```
### Extract JWTs
```bash
python3 thetimemachine.py example.com --jwt
```
### And much more
```bash
usage: thetimemachine.py [-h] [--fetch] [--jwt] [--backups] [--subdomains] [--listings] [--attack {xss,sqli,lfi,redirect,jira,wp,fuzz}] [--menu]
[--parameters]
target
```
---
## π Output Structure
All results are neatly saved under the `content/` directory:
```
content/
βββ example.com/
βββ example.com_URLs.txt
βββ example.com_xss.txt
βββ example.com_sqli.txt
βββ example.com_parameters.txt
βββ example.com_subdomain.txt
βββ ...
```
---
## βοΈ Add Your Own Payloads
You can fully customize the payloads for XSS, SQLi, fuzzing, etc. Just edit the respective `.txt` files inside the repo and fire away!
---
## π§ Why I Built This
I'm not a full-time bug bounty hunter, but I needed a tool thatβd do fast recon, find juicy endpoints, and give me enough leads to manually dig deeper. Got my HOF on multiple VDPs and bugbounty, including **NOKIA**, **Mediatek**, and more.
---
## πΈ Demo
https://github.com/user-attachments/assets/e07155ed-52b5-45e4-91aa-297a5caeac3a
#### Note: This is just a demo and doesn't cover full potential of the tool.
---
## π Shoutouts
* [@nihitjain11](https://github.com/nihitjain11)
* [@Shivam Saraswat](https://github.com/shivamsaraswat)
* [@thecyberneh](https://github.com/thecyberneh$0)
* [PushkraJ99](https://github.com/PushkraJ99$0)
---
## π Blogs
1. [The Time Machine β Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not v1.0](https://medium.com/@anmolksachan/the-time-machine-weaponizing-waybackurls-for-recon-bugbounties-osint-sensitive-endpoints-and-40889a03feeb)
2. [Time Traveling for Bugs: How The Time Machine v3.0 Uncovered an XSS on REDACTED.com](https://medium.com/@anmolksachan/time-traveling-for-bugs-how-the-time-machine-uncovered-an-xss-on-redacted-com-92e3662a50e4)
---
## π Community
1. [Simple Recon on Android using TheTimeMachine + Dirsearch (Medium)](https://alpinnnnnn13.medium.com/simple-recon-di-android-menggunakan-tools-thetimemachine-dan-dirsearch-3384aad17c15)
2. [Michel Kartner β YouTube](https://youtu.be/gh2DdRjK4BY?t=1888)
3. [@cyb\_detectiveβs Tweet](https://x.com/cyb_detective/status/1581324309108510721)
4. [@cyb\_detectiveβs Tweet v3.0](https://x.com/cyb_detective/status/1943789270726324606)
5. [The Ultimate Guide to the Time Machine Way Back URL Crawler for OSINT](https://www.youtube.com/watch?v=eguWHDfV-W0)
6. [OSINT resources](https://sizeof.cat/post/osint-resources/)
7. [Cyber Detective's OSINT tools collection](https://github.com/cipher387/osint_stuff_tool_collection)
8. [Unlock the Full Potential of the Wayback Machine for Bug Bounty](https://infosecwriteups.com/unlock-the-full-potential-of-the-wayback-machine-for-bug-bounty-8b6f57e2637d)
9. [TheTimeMachine for Bug Bounties & OSINT](https://medium.com/@XEyeSecurity/thetimemachine-for-bug-bounties-osint-39bded4bc78f)
---
## π¬ Contact
DMs are open β reach out to me on [@FR13ND0x7F](https://twitter.com/fr13nd0x7f)
---
## βοΈ Support
If this tool helped you, drop a star on the repo or follow me on Twitter β thatβs all I ask π
---
## π¨βπ» Author
Author: **Anmol K. Sachan** | Twitter/ X: [@FR13ND0x7F](https://x.com/fr13nd0x7f)
Co-author: **Chaudhary\_S4h4b** | Twitter/ X: [@Chaudhary\_S4h4b](https://x.com/)
---
## βοΈ Issues
Version 3.0 is under development. If you see any issues please open an issues and we are happy to take a look and fix that.
- `--menu` work is under progress you can directly use `--attack` instead.
- `listings` enhanced detection capability with aggresive mode.
---