Looting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript
go get -u github.com/zblurx/jsloot
$ jsloot -h
JSLoot by zblurx
Looting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript
-- WHERE TO LOOT ? --
-u, --url <url> Loot from on the URL
-f, --file <path> Loot from a local file
-d, --directory <path> Loot from a directory
-r, --recurse <path> To combine with -d option. Loot recursively
-s, --stdin Loot from URLs given by Stdin
-- HOW TO LOOT ? --
-H, --header <header> Specify header. Can be used multiple times
-c, --cookies <cookies> Specify cookies
-x, --proxy <proxy> Specify proxy
-k, --insecure Allow insecure server connections when using SSL
-- WHAT TO LOOT ? --
-e, --regexp <PATTERNS> Loot with a custom pattern
-g, --grep-pattern <1,2,...> When specified, custom the looting patterns :
- 1 : Looting URLs
- 2 : Looting AWS Keys
- 3 : Looting Base64 artifacts
- 4 : Looting IPv4 addresses
- 5 : Looting nothing on the default patterns
Can be used in complement with -e
-- SHOW THE LOOT --
-o, --output-file <path> Write down result to file
-w, --with-filename Show filename/URL of loot location
-v, --verbose Print with detailed output and colors