Working with Sigurlfind3r Tool on Kali Linux OS

Example 1: Basic Usage

sigurlfind3r -d w3wiki.org

In this example, we will be scanning the w3wiki.org target domain.

We have got the results of our basic scan on the target domain w3wiki.org.

Example 2: Regex filter URLs

sigurlfind3r -d w3wiki.org -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”

In this example, we will be filtering URLs by their media type in URL.

We have got the output as per the regex used in the command.

Example 3: Include Subdomains’ URLs

sigurlfind3r -d w3wiki.org -iS

In this example, we will be including subdomains for URL discovery.

We have got the results of our scan.


sigurlfind3r – Passive reconnaissance tool for known URLs discovery

URLs can be beneficial to security researchers for getting a valid bug. URLs carry the information from the client to the server. Various parameters are been used in the URL. These parameters can be used to inject XSS malicious code, Open Redirection check, and many more. So to discover these URLs, we need an automated tool. Sigurlfind3r is an automated cyber security tool developed in the Golang language which discovers the URLs of the target domain from open sources. We can filter out the important URLs by applying the essential regex function. This tool is also available on the Github platform for free.

Note: Make Sure You have Golang Installed on your System, as this is a golang-based tool. Click to check the Installation process: Golang Installation Steps on Linux

Similar Reads

Installation of Sigurlfind3r Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system....

Working with Sigurlfind3r Tool on Kali Linux OS

Example 1: Basic Usage...