a simple bash and go script to find where a website has possibly been listed using attachments
______ ______ ______ ______ ______ ______ ______ ______ __ __ ______ ______ __ __ ______ ______ ______
/\ ___\ /\ ___\ /\ __ \ /\ == \ /\ ___\ /\ ___\ /\ ___\ /\ ___\ /\ \_\ \ /\ __ \ /\ ___\ /\ \/ / /\ ___\ /\ == \ /\ ___\
\ \___ \ \ \ \____ \ \ __ \ \ \ __< \ \ __\ \ \___ \ \ \ __\ \ \ \____ \ \ __ \ \ \ __ \ \ \ \____ \ \ _"-. \ \ __\ \ \ __< \ \___ \
\/\_____\ \ \_____\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \/\_____\ \ \_____\ \ \_____\ \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\ \ \_____\ \ \_\ \_\ \/\_____\
\/_____/ \/_____/ \/_/\/_/ \/_/ /_/ \/_____/ \/_____/ \/_____/ \/_____/ \/_/\/_/ \/_/\/_/ \/_____/ \/_/\/_/ \/_____/ \/_/ /_/ \/_____/
Install
git clone https://github.com/ArkAngeL43/Vulncher.git ; cd Vulncher ; chmod +x ./domain-hunter.sh ; clear ; echo usage: ./domain-hunter.sh <url> <domain>
EXAMPLES
────────────────────────
__ __ __ __ __ __ __ ______ __ __ ______ ______
/\ \ / / /\ \/\ \ /\ \ /\ "-.\ \ /\ ___\ /\ \_\ \ /\ ___\ /\ == \
\ \ \'/ \ \ \_\ \ \ \ \____ \ \ \-. \ \ \ \____ \ \ __ \ \ \ __\ \ \ __<
\ \__| \ \_____\ \ \_____\ \ \_ "\_\ \ \_____\ \ \_\ \_\ \ \_____\ \ \_\ \_\
\/_/ \/_____/ \/_____/ \/_/ \/_/ \/_____/ \/_/\/_/ \/_____/ \/_/ /_/
────────────────────────
[~] Targeting Domain -> http://testphp.vulnweb.com/listproducts.php?cat=1
[~] Fixed URL -> http://testphp.vulnweb.com/listproducts.php?cat=1 item_id=15
[!] Trying Payload item_id=15
SExtraction -> Extracted 24 urls and listed them in '/home/arkangel/Desktop/domain-hunter/urls' file for reference.
http://testphp.vuln
http
http
http
http-testphp-vulnweb-com-listproducts-php-cat-1
http
http
http
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=vid&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBSgB
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=nws&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBigC
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQ_AUIBygD
https://dba.stackexchange.com/q/269259&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAEQAg&usg=AOvVaw1QGkl0-TRNMf0GYAT1LCzd
http://cn-sec.com/archives/261613.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAkQAg&usg=AOvVaw2iYQhGAmsYWyxx9W-yzOK_
http://tech-anand.blogspot.com/2017/06/basic-sql-injection-tutorial-mysql-php.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAcQAg&usg=AOvVaw2p3qKV1QEEtcGNpE171aRK
https://howtolookatsomeonesprivateinstagra1.blogspot.com/2019/05/hack-in-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAgQAg&usg=AOvVaw25U4V_p7_fIUa7F1HRh8lq
https://followunfollowinstagrammethod.blogspot.com/2019/05/how-to-hack-instagram-password-using.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAUQAg&usg=AOvVaw1ULKt9ptp9IoSU0__LXtTc
https://freeinstagramfollowersnoverificati3.blogspot.com/2019/05/hack-in-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAMQAg&usg=AOvVaw2TZs0Be3fMnVu6X-r_rRpt
http://pitavohn.arobby.site/
http-testphp-vulnweb-com-listproducts-php-cat-1.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAAQAg&usg=AOvVaw1CXCE4knFR2xfLI0q4793n
https://hackinstagramnodownload.blogspot.com/2019/06/hack-instagram-kali-linux.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAYQAg&usg=AOvVaw2UhVG7YK2UkbO0DGPAJGzC
https://www.coursehero.com/file/93212596/ScriptFriotxt/&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAIQAg&usg=AOvVaw0JqqyvfD31TDbNx13YhDUT
https://followusoninstagramimage.blogspot.com/2019/05/cara-hack-instagram-menggunakan-kali.html&sa=U&ved=2ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQFnoECAQQAg&usg=AOvVaw3KQMnzFO5mUeQEH9tYZ5Gd
http://testphp.vulnweb.com/listproducts.php?cat=1"&safe=off&hl=en&ie=UTF-8&ei=IIZjYd_UAt6cwbkPtfGt0AI&start=10&sa=N
http://testphp.vulnweb.com/listproducts.php%253Fcat%253D1%2522&hl=en&sa=U&ved=0ahUKEwjf5NnqjcHzAhVeTjABHbV4CyoQxs8CCDk&usg=AOvVaw0XqPzqvehLv8rJa6KCnRcK
[~] Fixed URL -> http://testphp.vulnweb.com/listproducts.php?cat=1 item_id=15
[!] Trying Payload cat=1
SExtraction -> Extracted 24 urls and listed them in '/home/arkangel/Desktop/domain-hunter/urls' file for reference.
http://testphp.vuln
http
http
http
http-testphp-vulnweb-com-listproducts-php-cat-1