Working with Sigurlfind3r Tool on Kali Linux OS
Example 1: Basic Usage
sigurlfind3r -d w3wiki.org
In this example, we will be scanning the w3wiki.org target domain.
We have got the results of our basic scan on the target domain w3wiki.org.
Example 2: Regex filter URLs
sigurlfind3r -d w3wiki.org -f “.(jpg|jpeg|gif|png|ico|css|eot|tif|tiff|ttf|woff|woff2)”
In this example, we will be filtering URLs by their media type in URL.
We have got the output as per the regex used in the command.
Example 3: Include Subdomains’ URLs
sigurlfind3r -d w3wiki.org -iS
In this example, we will be including subdomains for URL discovery.
We have got the results of our scan.
sigurlfind3r – Passive reconnaissance tool for known URLs discovery
URLs can be beneficial to security researchers for getting a valid bug. URLs carry the information from the client to the server. Various parameters are been used in the URL. These parameters can be used to inject XSS malicious code, Open Redirection check, and many more. So to discover these URLs, we need an automated tool. Sigurlfind3r is an automated cyber security tool developed in the Golang language which discovers the URLs of the target domain from open sources. We can filter out the important URLs by applying the essential regex function. This tool is also available on the Github platform for free.
Note: Make Sure You have Golang Installed on your System, as this is a golang-based tool. Click to check the Installation process: Golang Installation Steps on Linux