10000 GitHub - SharokhAtaie/extractify: A tool for extract Endpoints, URLs and Secrets from contents
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

SharokhAtaie/extractify

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Extractify

Extractify is a powerful tool for extracting endpoints, URLs and secrets from various sources. It can process URLs, files, or directories, making it perfect for security researchers, penetration testers, and developers.

Features

  • Concurrent Scanning: Process multiple targets simultaneously for faster results
  • Multiple Data Sources: Scan URLs, files, or entire directories
  • Multiple Extract Types:
    • Extract endpoints (paths within content)
    • Extract complete URLs
    • Extract secrets and credentials from source code
  • Custom Secret Patterns: Define your own secret detection patterns
  • Flexible Output: Save results to file or display in terminal

Installation

go install github.com/SharokhAtaie/extractify@latest

Usage

Extractify - A tool for extracting endpoints, URLs, and secrets from various sources

Input Flags:
	-url,      -u       URL for scanning
	-list,     -l       List of URLs for scanning
	-file,     -f       Local file or directory for scanning
	Or list of urls from stdin

Extract Types:
	-endpoints, -ee      Extract endpoints
	-urls,      -eu      Extract URLs
	-secrets,   -es      Extract secrets
	-all,       -ea      Extract all types

Other Options:
	-header,          	-H     Set custom header (e.g., 'Authorization: Bearer token')
	-concurrent,      	-c     Number of concurrent workers [default: 10]
	-timeout,         	-t     Timeout in seconds for HTTP requests [default: 20]
	-output,          	-o     Output file to write results
	-patterns,        	-p     Custom regex patterns file
	-version,         	-V     Show version information
	-color,           	-C     Enable colorized output
	-filter-extension, -fe   Filter extensions in endpoint results (comma-separated)

Examples:
	extractify -u https://example.com
	extractify -l urls.txt -es -o results.txt
	extractify -f javascript_files/ -ea
	extractify -f file.js -ea
	cat urls.txt | extractify -ea -c 20

Basic Commands

# Scan a URL
extractify -u https://example.com

# Scan from a list of URLs
extractify -l urls.txt

# Scan a file
extractify -f /path/to/file.js

# Scan a directory recursively
extractify -f /path/to/directory

# Pipe URLs from another command
cat urls.txt | extractify

Extraction Options

# Extract only endpoints
extractify -u https://example.com -ee

# Extract only URLs
extractify -u https://example.com -eu

# Extract only secrets
extractify -u https://example.com -es

# Extract all
extractify -u https://example.com -ea

Advanced Options

# Set custom HTTP header
extractify -u https://example.com -H "Authorization: Bearer token"

# Set concurrency level (10 default)
extractify -l urls.txt -c 20

# Save output to file
extractify -u https://example.com -o results.txt

Custom Secret Patterns

You can define your own secret detection patterns in a JSON file:

[
  {
    "Name": "Custom API Key",
    "Description": "Custom API Key Pattern",
    "Regex": "api_key['\"]?\\s*[:=]\\s*['\"]([0-9a-zA-Z]{32})['\"]",
    "FalsePositives": ["example", "test"],
    "Poc": "Proof of concept example"
  }
]

Then use it with:

extractify -u https://example.com -p patterns.json

Examples

Extract all information types from multiple URLs:

extractify -l urls.txt -ea -o results.txt

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

  • Cariddi - For secret detection regex patterns
  • LinkFinder - For endpoint regex patterns

About

A tool for extract Endpoints, URLs and Secrets from contents

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages

0