https://github.com/machine1337/jsscanner
An Efficent tool to find juicy secrets in javascript source code. Automate Your Javascript hunting using this tool.
https://github.com/machine1337/jsscanner
bugbounty bugbounty-tool hackerone hacking javascript-recon jsscanner machine1337 reconn
Last synced: 10 months ago
JSON representation
An Efficent tool to find juicy secrets in javascript source code. Automate Your Javascript hunting using this tool.
- Host: GitHub
- URL: https://github.com/machine1337/jsscanner
- Owner: machine1337
- License: gpl-3.0
- Created: 2021-09-24T16:22:06.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2021-09-24T16:24:47.000Z (over 4 years ago)
- Last Synced: 2025-04-03T16:52:32.081Z (11 months ago)
- Topics: bugbounty, bugbounty-tool, hackerone, hacking, javascript-recon, jsscanner, machine1337, reconn
- Language: Shell
- Homepage:
- Size: 18.6 KB
- Stars: 9
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# JSScanner

# Prequisite:
Make sure GO language is installed and setup correctly.
or check my recon-automation repo, i have already given command there.
# Installation:
1. git clone https://github.com/machine1337/jsrecon .
2. chmod +x install.sh .
3. chmod +x jsrecon.sh
# Usage:
./jsrecon.sh
# Note :
Q: what should my domains.txt look like?.
Ans:
testphp.vulnweb.com
google.com
# Future Feature:
1. Will extract API Key from SecretFinder and save them in seperate file.
2. then will used the API key for authorization.
# Tools Used:
SubJs
LinkFinder
SecretFinder
httpx
# Special Thanks To:
@tomnomnom .
other InfoSec Researcher
# Author:
{Facebook} (https://facebook.com/unknownclay)
{Twitter} (https://twitter.com/whoami4041)