Way Finder is a lightweight Bash script designed to assist bug bounty hunters in automating reconnaissance tasks. It allows users to fetch URLs from web archives, filter them for specific vulnerability parameters, and dynamically manage keyword-based searches. Whether you're hunting for XSS, LFI, SQLi, or other vulnerabilities, [Tool Name] is here to streamline your workflow.
- Fetch URLs: Extract URLs from the Wayback Machine for a given domain.
- Filter URLs: Search for specific vulnerability patterns such as XSS, SQLi, SSRF, and more.
- Add Keywords: Dynamically add custom keywords for vulnerability searches.
- Custom Output: Save results to organized output files.
- Help Menu: Access all available commands and usage details.
-
Clone the repository:
git clone https://github.com/yourusername/tool-name.git cd tool-name
-
Make the script executable:
chmod +x tool
-
Ensure you have
waybackurls
installed:go install github.com/tomnomnom/waybackurls@latest
Run the tool with the desired flags and arguments. Below is a list of all supported options:
Flag | Description |
---|---|
--urls |
Fetch URLs from Wayback Machine for a given domain. |
--xss |
Filter URLs containing XSS-related parameters. |
--lfi |
Filter URLs for Local File Inclusion patterns. |
--sqli |
Filter URLs for SQL Injection patterns. |
--redir |
Filter URLs for Open Redirect patterns. |
--ssrf |
Filter URLs for Server-Side Request Forgery patterns. |
--rce |
Filter URLs for Remote Code Execution patterns. |
-h, --help |
Display the help menu with all available options. |
tool --urls example.com
tool --xss urls.txt
tool --sqli urls.txt
tool --help
This project is licensed under the MIT License.