Name | wayback-recon JSON |
Version |
0.2.3
JSON |
| download |
home_page | None |
Summary | This tool do a passive recon using Wayback Machine |
upload_time | 2024-07-18 18:40:32 |
maintainer | None |
docs_url | None |
author | Your Name |
requires_python | <4.0,>=3.11 |
license | None |
keywords |
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# WaybackRecon
WaybackRecon is a tool designed to fetch and categorize URLs from the Wayback Machine, allowing users to identify and highlight specific patterns, potential leaks, and other important information from archived web content. This tool supports outputting results to JSON and SQLite databases and offers easy searching and categorization.
## Features
- **Fetch URLs**: Retrieve URLs from the Wayback Machine for a specified target domain.
- **Categorization**: Categorize URLs based on patterns such as APIs, leaks, file extensions, and CMS identifiers.
- **Highlighting**: Highlight keywords in URLs to easily identify important information.
- **Output**: Save results to JSON and SQLite databases.
- **Search**: Search and display specific categories of URLs.
## Installation
```bash
pip install wayback-recon
```
## Usage
### Command-line Arguments
- `-t, --target`: Target domain to fetch URLs for (required).
- `-p, --pattern-file`: Path to the pattern config JSON file (default: `pattern_config.json`).
- `-o, --output-file`: Output file name for the JSON results.
- `-s, --search`: Search and display specific categories (e.g., apis, leaks, extensions, cms).
- `--status-code`: Filter by status codes (e.g., 200, 301, 302).
### Examples
1. Fetch and categorize URLs for a target domain:
```bash
wayback-recon -t example.com
```
2. Search for specific categories in the results:
```bash
wayback-recon -s apis leaks
```
3. Specify a custom pattern configuration file:
```bash
wayback-recon -t example.com -p custom_pattern_config.json
```
4. Output results to a specific JSON file:
```bash
wayback-recon -t example.com -o results.json
```
5. Filter URLs by status codes:
```bash
wayback-recon -t example.com --status-code 200,301
```
## Configuration
The pattern configuration is stored in a JSON file (`pattern_config.json`) and can be customized to include different patterns for categorization. The default configuration includes patterns for APIs, leaks, file extensions, and CMS identifiers.
### Default Configuration
```json
{
"apis": ["/api", "/v1", "/v2", "/services", "/rest", "/graphql", "/json"],
"leaks": ["aws", "apikey", "secret", "password", "auth", "token", "key", "access", "credential", "jwt", "kong", "kong-key", "AIza"],
"extensions": [".js", ".css", ".html", ".php", ".asp", ".aspx", ".jsp", ".json", ".xml", ".txt", ".csv"],
"cms": ["wp-", "wordpress", "joomla", "drupal", "magento", "typo3", "shopify", "prestashop"]
}
```
You can add or remove strings to be filtered.
Raw data
{
"_id": null,
"home_page": null,
"name": "wayback-recon",
"maintainer": null,
"docs_url": null,
"requires_python": "<4.0,>=3.11",
"maintainer_email": null,
"keywords": null,
"author": "Your Name",
"author_email": "dantearcanaelmontford@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/6e/fd/296171a03b7da396a9a1181efbae450b94ed0871e44d4f73c413f1e90b6d/wayback_recon-0.2.3.tar.gz",
"platform": null,
"description": "# WaybackRecon\n\nWaybackRecon is a tool designed to fetch and categorize URLs from the Wayback Machine, allowing users to identify and highlight specific patterns, potential leaks, and other important information from archived web content. This tool supports outputting results to JSON and SQLite databases and offers easy searching and categorization.\n\n## Features\n\n- **Fetch URLs**: Retrieve URLs from the Wayback Machine for a specified target domain.\n- **Categorization**: Categorize URLs based on patterns such as APIs, leaks, file extensions, and CMS identifiers.\n- **Highlighting**: Highlight keywords in URLs to easily identify important information.\n- **Output**: Save results to JSON and SQLite databases.\n- **Search**: Search and display specific categories of URLs.\n\n## Installation\n\n```bash\npip install wayback-recon\n```\n\n## Usage\n\n### Command-line Arguments\n\n- `-t, --target`: Target domain to fetch URLs for (required).\n- `-p, --pattern-file`: Path to the pattern config JSON file (default: `pattern_config.json`).\n- `-o, --output-file`: Output file name for the JSON results.\n- `-s, --search`: Search and display specific categories (e.g., apis, leaks, extensions, cms).\n- `--status-code`: Filter by status codes (e.g., 200, 301, 302).\n\n### Examples\n\n1. Fetch and categorize URLs for a target domain:\n ```bash\n wayback-recon -t example.com\n ```\n\n2. Search for specific categories in the results:\n ```bash\n wayback-recon -s apis leaks\n ```\n\n3. Specify a custom pattern configuration file:\n ```bash\n wayback-recon -t example.com -p custom_pattern_config.json\n ```\n\n4. Output results to a specific JSON file:\n ```bash\n wayback-recon -t example.com -o results.json\n ```\n\n5. Filter URLs by status codes:\n ```bash\n wayback-recon -t example.com --status-code 200,301\n ```\n\n## Configuration\n\nThe pattern configuration is stored in a JSON file (`pattern_config.json`) and can be customized to include different patterns for categorization. The default configuration includes patterns for APIs, leaks, file extensions, and CMS identifiers.\n\n### Default Configuration\n\n```json\n{\n \"apis\": [\"/api\", \"/v1\", \"/v2\", \"/services\", \"/rest\", \"/graphql\", \"/json\"],\n \"leaks\": [\"aws\", \"apikey\", \"secret\", \"password\", \"auth\", \"token\", \"key\", \"access\", \"credential\", \"jwt\", \"kong\", \"kong-key\", \"AIza\"],\n \"extensions\": [\".js\", \".css\", \".html\", \".php\", \".asp\", \".aspx\", \".jsp\", \".json\", \".xml\", \".txt\", \".csv\"],\n \"cms\": [\"wp-\", \"wordpress\", \"joomla\", \"drupal\", \"magento\", \"typo3\", \"shopify\", \"prestashop\"]\n}\n```\n\nYou can add or remove strings to be filtered.",
"bugtrack_url": null,
"license": null,
"summary": "This tool do a passive recon using Wayback Machine",
"version": "0.2.3",
"project_urls": null,
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "71f71e00323de42f764be8696a07790f2896b737e00da9b3bd0a86c06483bcfb",
"md5": "2db6687df8248ee5fe838ab3cf2e1341",
"sha256": "6a11769930d824d3d80dfd46099069db9769e44d27d2e92e17d7221b5f4c26b1"
},
"downloads": -1,
"filename": "wayback_recon-0.2.3-py3-none-any.whl",
"has_sig": false,
"md5_digest": "2db6687df8248ee5fe838ab3cf2e1341",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": "<4.0,>=3.11",
"size": 6746,
"upload_time": "2024-07-18T18:40:31",
"upload_time_iso_8601": "2024-07-18T18:40:31.498220Z",
"url": "https://files.pythonhosted.org/packages/71/f7/1e00323de42f764be8696a07790f2896b737e00da9b3bd0a86c06483bcfb/wayback_recon-0.2.3-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "6efd296171a03b7da396a9a1181efbae450b94ed0871e44d4f73c413f1e90b6d",
"md5": "e54d8192df3e97bb299d155b6b743523",
"sha256": "13854f0d5da80e30776752c729a0362346f02d968ae75d2b98d929fe4bba4083"
},
"downloads": -1,
"filename": "wayback_recon-0.2.3.tar.gz",
"has_sig": false,
"md5_digest": "e54d8192df3e97bb299d155b6b743523",
"packagetype": "sdist",
"python_version": "source",
"requires_python": "<4.0,>=3.11",
"size": 5449,
"upload_time": "2024-07-18T18:40:32",
"upload_time_iso_8601": "2024-07-18T18:40:32.780759Z",
"url": "https://files.pythonhosted.org/packages/6e/fd/296171a03b7da396a9a1181efbae450b94ed0871e44d4f73c413f1e90b6d/wayback_recon-0.2.3.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-07-18 18:40:32",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "wayback-recon"
}