https://github.com/copyleftdev/paramhunter
HTTP Hidden Parameters Hunter
https://github.com/copyleftdev/paramhunter
owasp security-tools web-security
Last synced: 3 months ago
JSON representation
HTTP Hidden Parameters Hunter
- Host: GitHub
- URL: https://github.com/copyleftdev/paramhunter
- Owner: copyleftdev
- License: gpl-3.0
- Created: 2023-08-27T19:48:37.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-08-27T19:59:19.000Z (over 1 year ago)
- Last Synced: 2023-08-27T21:02:35.421Z (over 1 year ago)
- Topics: owasp, security-tools, web-security
- Language: Python
- Homepage:
- Size: 17.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ParamHunter
Discover hidden parameters in web applications using brute force, archives from the Wayback Machine, and by analyzing JavaScript files.
## Features
- **Brute Force Parameters**: Uses a wordlist to brute force potential parameters on the target website.
- **Search Archives**: Check the Wayback Machine to find old parameters that might have been used on the website in previous versions.
- **Analyze JavaScript**: Scrutinizes JavaScript files linked in the webpage to find potential parameters.## Prerequisites
Before you can run ParamHunter, you need the following installed:
- Python 3.x
- `requests` and `beautifulsoup4` Python packages. Install them using:```
pip install requests beautifulsoup4
```## Usage
```bash
python ParamHunter.py -u [OPTIONS]
```**Options**:
- `-u` or `--url`: The target URL to scan. **(Required)**
- `-w` or `--wordlist`: Path to the wordlist used for brute forcing. Default is `default_wordlist.txt`.
- `-t` or `--type`: Request type (either `GET` or `POST`). Default is `GET`.
- `-a` or `--archives`: Search the Wayback Machine for old parameters.
- `-j` or `--javascript`: Analyze linked JavaScript files for parameters.## Caution
1. **Permissions**: Always ensure you have permission to test or scan any target. Unauthorized scanning and testing can be illegal.
2. **Rate Limiting**: Websites might have rate limits or might block IP addresses sending too many requests in a short amount of time.
3. **Concurrency**: The current implementation uses threading for brute forcing parameters. Consider monitoring your system's resources when using large wordlists.## Example
To scan `https://example.com` using a wordlist named `params.txt`, searching archives and analyzing JavaScript, use:
```bash
python ParamHunter.py -u https://example.com -w params.txt -a -j
```## Contributing
Feel free to fork this repository and submit pull requests for enhancements, bug fixes, or additional features. All contributions are welcome!