• Advertise
  • SS7 Hacking
Thursday, June 8, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Enrollment System Project 1.0 Authentication Bypass / SQL Injection

    Total CMS 1.7.4 Cross Site Scripting

    Barebones CMS 2.0.2 Cross Site Scripting

    File Manager Advanced Shortcode 2.3.2 Remote Code Execution

    WordPress Circle Progress 1.0 Cross Site Scripting

    FC Red Bull Salzburg App 5.1.9-R Improper Authorization

    MotoCMS 3.4.3 SQL Injection

    Advance Charity Management 1.0 Insecure Settings

    Packet Storm New Exploits For May, 2023

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    KeePass Vulnerability Could Expose Master Password In Plaintext

    KeePass Vulnerability Could Expose Master Password In Plaintext

    Researchers Observed Backdoor-Like Behavior In Gigabyte Systems

    Researchers Observed Backdoor-Like Behavior In Gigabyte Systems

    Jetpack Plugin Patched A Critical Vulnerability Triggering WordPress Force-Installs

    Jetpack Plugin Patched A Critical Vulnerability Triggering WordPress Force-Installs

    This Campaign Delivers Three Malware Via Pirated Software Videos On YouTube

    This Campaign Delivers Three Malware Via Pirated Software Videos On YouTube

    Hackers Can Bypass Fingerprint Locks On Phones With BrutePrint Attack

    Hackers Can Bypass Fingerprint Locks On Phones With BrutePrint Attack

    GitLab Released Emergency Fix For Critical Vulnerability – Update Now!

    GitLab Released Emergency Fix For Critical Vulnerability – Update Now!

    XSS Flaw Riddled Beautiful Cookie Consent Banner WP Plugin

    XSS Flaw Riddled Beautiful Cookie Consent Banner WP Plugin

    Goldoson Android Malware Target Korean Users Via Legit Apps

    iRecorder Android App Targeted Its Users With AhRAT Malware

    Google Introduces Mobile VRP For Its Android Apps

    Google Introduces Mobile VRP For Its Android Apps

  • Hacking Tools
    VPN vs. MPLS: Choosing the Right Solution for Your Business

    VPN vs. MPLS: Choosing the Right Solution for Your Business

    Regular Expression Denial of Service

    Regular Expression Denial of Service

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    Bypassing and Securing Kubernetes Ingress Network Policies

    Bypassing and Securing Kubernetes Ingress Network Policies

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    VPN vs. MPLS: Choosing the Right Solution for Your Business

    VPN vs. MPLS: Choosing the Right Solution for Your Business

    Regular Expression Denial of Service

    Regular Expression Denial of Service

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    Bypassing and Securing Kubernetes Ingress Network Policies

    Bypassing and Securing Kubernetes Ingress Network Policies

  • Kali Linux
    Mastering the Future: Key Data Science Skills for a Competitive Edge

    Mastering the Future: Key Data Science Skills for a Competitive Edge

    5 Essential Crypto Tools For Linux Users In 2023

    QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android Applications

    QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android Applications

    From Endpoint Management to Experience Management – UEM Does It The Best!

    From Endpoint Management to Experience Management – UEM Does It The Best!

    WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance

    WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance

    SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer

    SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer

    Unlock Your Employees’ Potential: How UEM Can Help Achieve Employee Experience

    Unlock Your Employees’ Potential: How UEM Can Help Achieve Employee Experience

    Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation

    Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation

    Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database

    Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    MOVEit Hack – BBC, British Airways Employees Contact and Financial Data Exposed

    MOVEit Hack – BBC, British Airways Employees Contact and Financial Data Exposed

    Hackers Leak i2VPN Admin Credentials on Telegram

    Hackers Leak i2VPN Admin Credentials on Telegram

    Moonlighter – World’s First and Only Satellite-Hacking Sandbox

    Moonlighter – World’s First and Only Satellite-Hacking Sandbox

    ChatGPT Cybersecurity Grant Program – $1M to Boost AI Capabilities

    ChatGPT Cybersecurity Grant Program – $1M to Boost AI Capabilities

    Atomic Wallet Hit by $35M Theft in Recent Crypto Breach

    Atomic Wallet Hit by $35M Theft in Recent Crypto Breach

    A Complete Malware Analysis Tutorial, Cheatsheet & Tools List – 2023

    A Complete Malware Analysis Tutorial, Cheatsheet & Tools List – 2023

    British Airways, BBC and Boots Hit by Suspected Russian Cyber Attack

    British Airways, BBC and Boots Hit by Suspected Russian Cyber Attack

    Gmail Flaw Let Hackers Bypass Security Checks

    Gmail Flaw Let Hackers Bypass Security Checks

    Scrubs & Beyond Leaks 400GB of User PII and Card Data in Plain Text

    Scrubs & Beyond Leaks 400GB of User PII and Card Data in Plain Text

  • Advertise
  • Home
  • Exploits

    Enrollment System Project 1.0 Authentication Bypass / SQL Injection

    Total CMS 1.7.4 Cross Site Scripting

    Barebones CMS 2.0.2 Cross Site Scripting

    File Manager Advanced Shortcode 2.3.2 Remote Code Execution

    WordPress Circle Progress 1.0 Cross Site Scripting

    FC Red Bull Salzburg App 5.1.9-R Improper Authorization

    MotoCMS 3.4.3 SQL Injection

    Advance Charity Management 1.0 Insecure Settings

    Packet Storm New Exploits For May, 2023

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    KeePass Vulnerability Could Expose Master Password In Plaintext

    KeePass Vulnerability Could Expose Master Password In Plaintext

    Researchers Observed Backdoor-Like Behavior In Gigabyte Systems

    Researchers Observed Backdoor-Like Behavior In Gigabyte Systems

    Jetpack Plugin Patched A Critical Vulnerability Triggering WordPress Force-Installs

    Jetpack Plugin Patched A Critical Vulnerability Triggering WordPress Force-Installs

    This Campaign Delivers Three Malware Via Pirated Software Videos On YouTube

    This Campaign Delivers Three Malware Via Pirated Software Videos On YouTube

    Hackers Can Bypass Fingerprint Locks On Phones With BrutePrint Attack

    Hackers Can Bypass Fingerprint Locks On Phones With BrutePrint Attack

    GitLab Released Emergency Fix For Critical Vulnerability – Update Now!

    GitLab Released Emergency Fix For Critical Vulnerability – Update Now!

    XSS Flaw Riddled Beautiful Cookie Consent Banner WP Plugin

    XSS Flaw Riddled Beautiful Cookie Consent Banner WP Plugin

    Goldoson Android Malware Target Korean Users Via Legit Apps

    iRecorder Android App Targeted Its Users With AhRAT Malware

    Google Introduces Mobile VRP For Its Android Apps

    Google Introduces Mobile VRP For Its Android Apps

  • Hacking Tools
    VPN vs. MPLS: Choosing the Right Solution for Your Business

    VPN vs. MPLS: Choosing the Right Solution for Your Business

    Regular Expression Denial of Service

    Regular Expression Denial of Service

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    Bypassing and Securing Kubernetes Ingress Network Policies

    Bypassing and Securing Kubernetes Ingress Network Policies

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    VPN vs. MPLS: Choosing the Right Solution for Your Business

    VPN vs. MPLS: Choosing the Right Solution for Your Business

    Regular Expression Denial of Service

    Regular Expression Denial of Service

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part2)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    External Understanding: Dissecting APIs inside of IoT devices (Part 1)

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Engaging Social Engineering: Extracting Information through Strategic Interactions

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Exclusive Interview with Alexandre Teyar – the creator of BurpGPT

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    Secure Coding Practices in Python: Best Practices for Avoiding Common Vulnerabilities

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

    Bypassing and Securing Kubernetes Ingress Network Policies

    Bypassing and Securing Kubernetes Ingress Network Policies

  • Kali Linux
    Mastering the Future: Key Data Science Skills for a Competitive Edge

    Mastering the Future: Key Data Science Skills for a Competitive Edge

    5 Essential Crypto Tools For Linux Users In 2023

    QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android Applications

    QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android Applications

    From Endpoint Management to Experience Management – UEM Does It The Best!

    From Endpoint Management to Experience Management – UEM Does It The Best!

    WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance

    WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance

    SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer

    SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer

    Unlock Your Employees’ Potential: How UEM Can Help Achieve Employee Experience

    Unlock Your Employees’ Potential: How UEM Can Help Achieve Employee Experience

    Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation

    Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation

    Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database

    Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    MOVEit Hack – BBC, British Airways Employees Contact and Financial Data Exposed

    MOVEit Hack – BBC, British Airways Employees Contact and Financial Data Exposed

    Hackers Leak i2VPN Admin Credentials on Telegram

    Hackers Leak i2VPN Admin Credentials on Telegram

    Moonlighter – World’s First and Only Satellite-Hacking Sandbox

    Moonlighter – World’s First and Only Satellite-Hacking Sandbox

    ChatGPT Cybersecurity Grant Program – $1M to Boost AI Capabilities

    ChatGPT Cybersecurity Grant Program – $1M to Boost AI Capabilities

    Atomic Wallet Hit by $35M Theft in Recent Crypto Breach

    Atomic Wallet Hit by $35M Theft in Recent Crypto Breach

    A Complete Malware Analysis Tutorial, Cheatsheet & Tools List – 2023

    A Complete Malware Analysis Tutorial, Cheatsheet & Tools List – 2023

    British Airways, BBC and Boots Hit by Suspected Russian Cyber Attack

    British Airways, BBC and Boots Hit by Suspected Russian Cyber Attack

    Gmail Flaw Let Hackers Bypass Security Checks

    Gmail Flaw Let Hackers Bypass Security Checks

    Scrubs & Beyond Leaks 400GB of User PII and Card Data in Plain Text

    Scrubs & Beyond Leaks 400GB of User PII and Card Data in Plain Text

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Exploits

Hakrawler – A fast CLI web crawler for hackers

by Ineedhack
December 1, 2022
in Exploits, Hacking Tools, Hacking Tutorials, Security
0
Hakrawler – A fast CLI web crawler for hackers
79
SHARES
494
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

1.3k

SHARES

Fast golang web crawler for gathering URLs and JavaScript file locations. This is basically a simple implementation of the awesome Gocolly library.

Example usages

Single URL:

echo https://google.com | hakrawler

Multiple URLs:

cat urls.txt | hakrawler

Timeout for each line of stdin after 5 seconds:

cat urls.txt | hakrawler -timeout 5

Send all requests through a proxy:

cat urls.txt | hakrawler -proxy http://localhost:8080

Include subdomains:

echo https://google.com | hakrawler -subs

Note: a common issue is that the tool returns no URLs. This usually happens when a domain is specified (), but it redirects to a subdomain (). The subdomain is not included in the scope, so the no URLs are printed. In order to overcome this, either specify the final URL in the redirect chain or use the -subs option to include subdomains.

Example toolchain

Get all subdomains of google, find the ones that respond to http(s), and crawl them all.

echo google.com | haktrails subdomains | httpx | hakrawler

Installation

Normal Install

First, you’ll need to .

Then run this command to download + compile hakrawler:

go install github.com/hakluke/

You can now run ~/go/bin/hakrawler. If you’d like to just run hakrawler without the full path, you’ll need to export PATH="~/go/bin/:$PATH". You can also add this line to your ~/.bashrc file if you’d like this to persist.

Docker Install (from dockerhub)

echo https://www.google.com | docker run --rm -i hakluke/hakrawler:v2 -subs

Local Docker Install

It’s much easier to use the dockerhub method above, but if you’d prefer to run it locally:

git clone https://github.com/hakluke/hakrawler
cd hakrawler
docker build -t hakluke/hakrawler .
docker run --rm -i hakluke/hakrawler --help

Kali Linux: Using apt

sudo apt install hakrawler

Then, to run hakrawler:

echo https://www.google.com | docker run --rm -i hakluke/hakrawler -subs

Command-line options

Usage of hakrawler:
  -d int
    	Depth to crawl. (default 2)
  -h string
    	Custom headers separated by two semi-colons. E.g. -h "Cookie: foo=bar;;Referer: http://example.com/" 
  -insecure
    	Disable TLS verification.
  -json
    	Output as JSON.
  -proxy string
    	Proxy URL. E.g. -proxy http://127.0.0.1:8080
  -s	Show the source of URL based on where it was found. E.g. href, form, script, etc.
  -size int
    	Page size limit, in KB. (default -1)
  -subs
    	Include subdomains for crawling.
  -t int
    	Number of threads to utilise. (default 8)
  -timeout int
    	Maximum time to crawl each URL from stdin, in seconds. (default -1)
  -u	Show only unique urls.

1.3k

SHARES

Tags: android hackingemail hackingfacebook hackshack newshacking newshacking softwarehacking tipshacking toolshacking tools kalihacking tutorialsinstagram hackiphone hackingjpg exploitmetasploitsimswap hacksms exploitsms interceptss7 attacksss7 hackss7 software
Ineedhack

Ineedhack

Next Post

hoaxshell: An unusual Windows reverse shell that is based solely on http(s), traffic.

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

French Hospital suspends operations after cyberattack

6 months ago

SOUND4 IMPACT/FIRST/PULSE/Eco 2.x services Command Injection

6 months ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise