SamuelrgIT / Vulncher

a simple bash and go script to find where a website has possibly been listed using attachments

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Vulncher

a simple bash and go script to find where a website has possibly been listed using attachments

written by

______     ______     ______     ______     ______     ______     ______     ______     __  __     ______     ______     __  __     ______     ______     ______    
/\  ___\   /\  ___\   /\  __ \   /\  == \   /\  ___\   /\  ___\   /\  ___\   /\  ___\   /\ \_\ \   /\  __ \   /\  ___\   /\ \/ /    /\  ___\   /\  == \   /\  ___\   
\ \___  \  \ \ \____  \ \  __ \  \ \  __<   \ \  __\   \ \___  \  \ \  __\   \ \ \____  \ \  __ \  \ \  __ \  \ \ \____  \ \  _"-.  \ \  __\   \ \  __<   \ \___  \  
 \/\_____\  \ \_____\  \ \_\ \_\  \ \_\ \_\  \ \_____\  \/\_____\  \ \_____\  \ \_____\  \ \_\ \_\  \ \_\ \_\  \ \_____\  \ \_\ \_\  \ \_____\  \ \_\ \_\  \/\_____\ 
  \/_____/   \/_____/   \/_/\/_/   \/_/ /_/   \/_____/   \/_____/   \/_____/   \/_____/   \/_/\/_/   \/_/\/_/   \/_____/   \/_/\/_/   \/_____/   \/_/ /_/   \/_____/ 

Install

git clone https://github.com/ArkAngeL43/Vulncher.git ; cd Vulncher ; chmod +x ./domain-hunter.sh ; clear ; echo usage: ./domain-hunter.sh <url> <domain>

EXAMPLES

────────────────────────

 __   __   __  __     __         __   __     ______     __  __     ______     ______    
/\ \ / /  /\ \/\ \   /\ \       /\ "-.\ \   /\  ___\   /\ \_\ \   /\  ___\   /\  == \   
\ \ \'/   \ \ \_\ \  \ \ \____  \ \ \-.  \  \ \ \____  \ \  __ \  \ \  __\   \ \  __<   
 \ \__|    \ \_____\  \ \_____\  \ \_  "\_\  \ \_____\  \ \_\ \_\  \ \_____\  \ \_\ \_\ 
  \/_/      \/_____/   \/_____/   \/_/ \/_/   \/_____/   \/_/\/_/   \/_____/   \/_/ /_/ 
────────────────────────
[~] Targeting Domain ->  http://testphp.vulnweb.com/listproducts.php?cat=1
[~] Fixed URL -> http://testphp.vulnweb.com/listproducts.php?cat=1 item_id=15
[!] Trying Payload item_id=15
SExtraction -> Extracted 24 urls and listed them in '/home/arkangel/Desktop/domain-hunter/urls' file for reference.

http://testphp.vuln
http
http
http
http-testphp-vulnweb-com-listproducts-php-cat-1
http
http
http
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=vid&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBSgB
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=nws&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBigC
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBygD
https://dba.stackexchange.com/q/269259&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAEQAg&usg=AOvVaw1QGkl0-TRNMf0GYAT1LCzd
http://cn-sec.com/archives/261613.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAkQAg&usg=AOvVaw2iYQhGAmsYWyxx9W-yzOK_
http://tech-anand.blogspot.com/2017/06/basic-sql-injection-tutorial-mysql-php.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAcQAg&usg=AOvVaw2p3qKV1QEEtcGNpE171aRK
https://howtolookatsomeonesprivateinstagra1.blogspot.com/2019/05/hack-in-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAgQAg&usg=AOvVaw25U4V_p7_fIUa7F1HRh8lq
https://followunfollowinstagrammethod.blogspot.com/2019/05/how-to-hack-instagram-password-using.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAUQAg&usg=AOvVaw1ULKt9ptp9IoSU0__LXtTc
https://freeinstagramfollowersnoverificati3.blogspot.com/2019/05/hack-in-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAMQAg&usg=AOvVaw2TZs0Be3fMnVu6X-r_rRpt
http://pitavohn.arobby.site/
http-testphp-vulnweb-com-listproducts-php-cat-1.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAAQAg&usg=AOvVaw1CXCE4knFR2xfLI0q4793n
https://hackinstagramnodownload.blogspot.com/2019/06/hack-instagram-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAYQAg&usg=AOvVaw2UhVG7YK2UkbO0DGPAJGzC
https://www.coursehero.com/file/93212596/ScriptFriotxt/&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAIQAg&usg=AOvVaw0JqqyvfD31TDbNx13YhDUT
https://followusoninstagramimage.blogspot.com/2019/05/cara-hack-instagram-menggunakan-kali.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAQQAg&usg=AOvVaw3KQMnzFO5mUeQEH9tYZ5Gd
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&ei=IIZjYd_UAt6cwbkPtfGt0AI&start=10&sa=N
http://testphp.vulnweb.com/listproducts.php%253Fcat%253D1%2522&hl=en&sa=U&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQxs8CCDk&usg=AOvVaw0XqPzqvehLv8rJa6KCnRcK
[~] Fixed URL -> http://testphp.vulnweb.com/listproducts.php?cat=1 item_id=15
[!] Trying Payload cat=1
SExtraction -> Extracted 24 urls and listed them in '/home/arkangel/Desktop/domain-hunter/urls' file for reference.

http://testphp.vuln
http
http
http
http-testphp-vulnweb-com-listproducts-php-cat-1

About

a simple bash and go script to find where a website has possibly been listed using attachments

License:MIT License


Languages

Language:Shell 92.9%Language:Go 5.0%Language:Python 2.1%