modes of SourceWolf
1. Crawl response mode: In this Mode, the hidden endpoints are discovered and saved in the text file format.
python3 sourcewolf.py -l domains.txt -o output/ -c crawl_output
2. Brute force mode: In this Mode Brute Forcing attack is done for the detection of files and directories on the target domain. A wordlist is used to brute force.
python3 sourcewolf.py -b https://w3wiki.org/FUZZ -w /usr/share/wordlists/dirb/common.txt -s status
3. Probing mode: In this Mode, the activeness of the target domain is checked. Whether is target host is live or not is verified in this mode.
python3 sourcewolf.py -l domains.txt -s live
SourceWolf – A CLI Web Crawler Tool in Linux
Web crawling is the process of indexing data on web pages by using a program or automated script and these automated scripts or programs are known by multiple names, that includes web crawler, spider, spider bot, and often shortened to the crawler. Manual crawling consumes a lot of time if the scope of the target is more. SourceWolf is an automated script developed in the Python Language that crawls the directories from the domain server and the status code. This can help the tester to test the pages whose responses are 200 or 301 quickly. SourceWolf is an open-source and free-to-use tool. SourceWolf tool supports custom word lists for brute-forcing. The output feature of SourceWolf is excellent as the output is stored in the leading directory, and the main directory contains sub-directories with separates status code directories.