/jsloot

Looting juicy stuff in JS files

Primary LanguageGoGNU General Public License v3.0GPL-3.0

JSLoot

Looting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript

Install

go get -u github.com/zblurx/jsloot

Use

$ jsloot -h
JSLoot by zblurx

Looting URLs, IPv4 addresses, base64 encoded stuff and aws-keys from JavaScript

-- WHERE TO LOOT ? -- 
 -u, --url <url>                Loot from on the URL
 -f, --file <path>              Loot from a local file
 -d, --directory <path>         Loot from a directory
 -r, --recurse <path>           To combine with -d option. Loot recursively
 -s, --stdin                    Loot from URLs given by Stdin

-- HOW TO LOOT ? -- 
 -H, --header <header>          Specify header. Can be used multiple times
 -c, --cookies <cookies>        Specify cookies
 -x, --proxy <proxy>            Specify proxy
 -k, --insecure                 Allow insecure server connections when using SSL

-- WHAT TO LOOT ? -- 
 -e, --regexp <PATTERNS>        Loot with a custom pattern
 -g, --grep-pattern <1,2,...>   When specified, custom the looting patterns :
                                - 1 : Looting URLs
                                - 2 : Looting AWS Keys
                                - 3 : Looting Base64 artifacts
                                - 4 : Looting IPv4 addresses
                                - 5 : Looting nothing on the default patterns
                                      Can be used in complement with -e

-- SHOW THE LOOT -- 
 -o, --output-file <path>       Write down result to file
 -w, --with-filename            Show filename/URL of loot location
 -v, --verbose                  Print with detailed output and colors

Happy Looting :)