https://github.com/yogsec/alive
Alive is a fast and concurrent URL checker that identifies live domains returning HTTP 200 OK status. It supports single URLs and bulk lists, bypasses WAF protections using random user agents, and offers optional saving of results.
https://github.com/yogsec/alive
200ok alive assetfinder bugbounty bugbounty-tools cybersecurity-tool ethical-hacking-tool ethical-hacking-tools http-response http-response-codes http-response-ok http-response-status-codes kali-linux kali-linux-tools osint subfinder yogsec
Last synced: 3 months ago
JSON representation
Alive is a fast and concurrent URL checker that identifies live domains returning HTTP 200 OK status. It supports single URLs and bulk lists, bypasses WAF protections using random user agents, and offers optional saving of results.
- Host: GitHub
- URL: https://github.com/yogsec/alive
- Owner: yogsec
- License: mit
- Created: 2025-03-12T15:53:42.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2025-03-12T16:04:59.000Z (3 months ago)
- Last Synced: 2025-03-12T16:41:02.545Z (3 months ago)
- Topics: 200ok, alive, assetfinder, bugbounty, bugbounty-tools, cybersecurity-tool, ethical-hacking-tool, ethical-hacking-tools, http-response, http-response-codes, http-response-ok, http-response-status-codes, kali-linux, kali-linux-tools, osint, subfinder, yogsec
- Language: Python
- Homepage: https://linktr.ee/yogsec
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Alive 🚀
Alive is a fast and concurrent **URL checker** that identifies live domains returning **HTTP 200 OK** status. It supports **single URLs and bulk lists**, bypasses **WAF protections** using random user agents, and offers **optional saving** of results. 🛡️

## Features ✨
- 🔄 **Concurrent requests** for faster processing
- 🌐 **Supports single URLs and bulk lists**
- 🛑 **Random user agents** for WAF bypass
- 💾 **Save results to a file**
- 🆘 **Help menu for usage guidance**## Installation 💻
```bash
# Clone the repository
git clone https://github.com/yogsec/Alive.git
cd Alive# Install dependencies
pip install -r requirements.txt
```## Usage 🚀
```bash
# Check a single URL
python alive.py -u https://example.com# Check a list of domains from a file
python alive.py -l domains.txt# Save results to a file
python alive.py -l domains.txt -s results.txt# Display help menu
python alive.py -h
```## Example Output 📜
```
_______ _____ _ _ _______
|_____| | | \ / |______
| | |_____ __|__ \/ |______GitHub - https://github.com/yogsec
Donate ❤️🩹 - https://buymeacoffee.com/yogsechttps://example.com
https://alive.com
```---
## 🌟 Let's Connect!
Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:
🌐 **Website:** [https://yogsec.github.io/yogsec/](https://yogsec.github.io/yogsec/)
📜 **Linktree:** [https://linktr.ee/yogsec](https://linktr.ee/yogsec)
🔗 **GitHub:** [https://github.com/yogsec](https://github.com/yogsec)
💼 **LinkedIn (Company):** [https://www.linkedin.com/company/yogsec/](https://www.linkedin.com/company/yogsec/)
📷 **Instagram:** [https://www.instagram.com/yogsec.io/](https://www.instagram.com/yogsec.io/)
🐦 **Twitter (X):** [https://x.com/yogsec](https://x.com/yogsec)
👨💼 **Personal LinkedIn:** [https://www.linkedin.com/in/cybersecurity-pentester/](https://www.linkedin.com/in/cybersecurity-pentester/)
📧 **Email:** [email protected]---
## ☕ Buy Me a Coffee
If you find our work helpful and would like to support us, consider buying us a coffee. Your support keeps us motivated and helps us create more awesome content. ❤️
☕ **Support Us Here:** [https://buymeacoffee.com/yogsec](https://buymeacoffee.com/yogsec)