https://github.com/garlic0x1/url-miner
Find hidden GET parameters that get reflected
https://github.com/garlic0x1/url-miner
chromedp
Last synced: about 2 months ago
JSON representation
Find hidden GET parameters that get reflected
- Host: GitHub
- URL: https://github.com/garlic0x1/url-miner
- Owner: garlic0x1
- Created: 2022-04-10T03:29:03.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-04-18T00:08:44.000Z (about 3 years ago)
- Last Synced: 2024-06-19T19:42:05.953Z (12 months ago)
- Topics: chromedp
- Language: Go
- Homepage:
- Size: 242 KB
- Stars: 8
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# url-miner
Finds hidden GET parameters by testing for reflection
By default, 64 parameters are tested per request, this can be increased in some cases to 64,000 to significantly speed up your scan
Use `-chrome` to mine in a headless browser and detect DOM XSS
You can output JSON with `-json` or YAML with `-yaml`# Installation
Source install (Recommended):
```
git clone https://github.com/garlic0x1/url-miner
cd url-miner
go install .
```
Go install (May be out of date):
```
go install github.com/garlic0x1/url-miner@main
```
Docker install (uses default wordlist):
```
git clone https://github.com/garlic0x1/url-miner
cd url-miner
sudo docker build -t "garlic0x1/url-miner" .
echo http://testphp.vulnweb.com/listproducts.php | sudo docker run --rm -i garlic0x1/url-miner
```# Usage
Takes target urls from stdin, and a wordlist using the `-w` flag
Examples:
Single URL, headless mining:
```
$ echo http://testphp.vulnweb.com/listproducts.php | url-miner -w wordlist.txt -chrome
http://testphp.vulnweb.com/listproducts.php?cat=zzx54y
http://testphp.vulnweb.com/listproducts.php?artist=zzx60y
```
Multiple URLs:
```
$ echo http://testphp.vulnweb.com/listproducts.php | hakrawler -u -d 4 | grep -e "vulnweb.com" | url-miner -w wordlist.txt
http://testphp.vulnweb.com/listproducts.php?cat=zzx54y
http://testphp.vulnweb.com/listproducts.php?artist=zzx60y
http://testphp.vulnweb.com/hpp/?pp=zzx25y
http://testphp.vulnweb.com/showimage.php?file=zzx24y
http://testphp.vulnweb.com/hpp/params.php?p=zzx63y
http://testphp.vulnweb.com/hpp/params.php?pp=zzx25y
```# Help
```
$ url-miner -h
Usage of url-miner:
-chrome
Use headless browser to evaluate DOM.
-d Include default GET values from input.
-debug
Disable headless mode when using -chrome.
-head string
Custom header. Example: -head 'Hello: world'
-insecure
Disable TLS verification.
-json
Output injection points as JSON.
-proxy string
Proxy URL. Example: -proxy http://127.0.0.1:8080
-s int
Number of params per request. (default 64)
-t int
Number of threads to use. (default 8)
-timeout int
Request timeout. (default 20)
-w string
Wordlist to mine.
-wait int
Seconds to wait on page after loading in chrome mode. (Use to wait for AJAX reqs)
```