Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zblurx/jsloot
Looting juicy stuff in JS files
https://github.com/zblurx/jsloot
Last synced: 1 day ago
JSON representation
Looting juicy stuff in JS files
- Host: GitHub
- URL: https://github.com/zblurx/jsloot
- Owner: zblurx
- License: gpl-3.0
- Created: 2021-05-26T16:01:52.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-11-06T14:03:14.000Z (about 3 years ago)
- Last Synced: 2024-06-20T04:23:55.963Z (5 months ago)
- Language: Go
- Homepage:
- Size: 38.1 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# JSLoot
Looting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript
## Install
```bash
go get -u github.com/zblurx/jsloot
```## Use
```bash
$ jsloot -h
JSLoot by zblurxLooting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript
-- WHERE TO LOOT ? --
-u, --url Loot from on the URL
-f, --file Loot from a local file
-d, --directory Loot from a directory
-r, --recurse To combine with -d option. Loot recursively
-s, --stdin Loot from URLs given by Stdin-- HOW TO LOOT ? --
-H, --header Specify header. Can be used multiple times
-c, --cookies Specify cookies
-x, --proxy Specify proxy
-k, --insecure Allow insecure server connections when using SSL-- WHAT TO LOOT ? --
-e, --regexp Loot with a custom pattern
-g, --grep-pattern <1,2,...> When specified, custom the looting patterns :
- 1 : Looting URLs
- 2 : Looting AWS Keys
- 3 : Looting Base64 artifacts
- 4 : Looting IPv4 addresses
- 5 : Looting nothing on the default patterns
Can be used in complement with -e-- SHOW THE LOOT --
-o, --output-file Write down result to file
-w, --with-filename Show filename/URL of loot location
-v, --verbose Print with detailed output and colors
```## Happy Looting :)