A Fast Broken Link Hijacker Tool written in Python

Overview

Broken Link Hijacker

BrokenLinkHijacker(BLH) is a Fast Broken Link Hijacker Tool written in Python. It crawls the website and searches for all the Broken Links.This tool is mainly designed for Bug Bounty Hunters.It helps bug hunters collect all the Broken Links from the domain they are targeting. It crawls the website on 3 different deepness to get all the links from it. It also helps to find all the Social Media or Social Engagement platforms links mentioned on the website. It Searches for links in

BLH-3

Installation

https://github.com/MayankPandey01/BrokenLinkHijacker.git

Recommended Python Version:

This Tool Only Supports Python 3. The recommended version for Python 3 is 3.8.x.

Dependencies:

The dependencies can be installed using the requirements file:.

Installation on Windows:.

  • python.exe -m pip install -r requirements.txt.

Installation on Linux.

  • sudo pip install -r requirements.txt.

How it Works

This tool searches for all the INBOUND and OUTBOUND links from HTML tags and then crawls it Further based on the Depness set by the user

Deepness Decide how the Search takes Place on the Webpage

  • Deepness = 1 It means that only the given Url will be Crawled
  • Deepness=2 In this search, the Crawler goes on Step Further and goes one more level deep to search
  • Deepness=3 Here all the INBOUND links from the website are crawled until there is no link left to crawl. This can take a significant amount of time to complete.

Usage

Short Form Long Form Description
url url A URL to scan
-d Deepness Level of deepness to search.(Default=1)[Varies from 1-3]
-v --verbosity Set the Verbosity for Program
-o --output Weather to save the output in a file or not.(Default=False)
-h --help Displays help

Examples

  • To Use the Tool in the default setting.
    BLH.py https://google.com will give result.

BLH-4

  • To Increase Deepness Use :

BLH.py https://google.com -d 2 This will set Deepness to 2.
BLH.py https://google.com -d 3 This will set Deepness to 3 .

  • To turn Verbosity Mode On or OFF :

    By default Verbosity Mode is Set to True.
    BLH.py https://google.com -v False .
    -v F or -v Flase | -v T or -v True.

  • To Save output To a file :

    By default Output is Set to False. The output fileame is set to domain_links.txt by default.
    BLH.py https://google.com -o True .
    -o F or -o False | -o T or -o True.

Note

Use This Tool Wisely.
Happy Hacking

You might also like...
Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

evil-stalker How to run First of all, you must install the necessary libraries.

A fast tool to scan prototype pollution vulnerability
A fast tool to scan prototype pollution vulnerability

proto A fast tool to scan prototype pollution vulnerability Syntax python3 proto.py -l alive.txt Requirements Selenium Google Chrome Webdriver Note :

Fast Fb Cracking Tool

fb-brute Fast Fb Cracking Tool 🏆

A fast sub domain brute tool for pentesters
A fast sub domain brute tool for pentesters

subDomainsBrute 1.4 A fast sub domain brute tool for pentesters. It works with P

DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion
DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion

DependConfusion-X Tool is written in Python3 which allows security researcher/bug bounty hunter to scan and monitor list of hosts for Dependency Confusion.

SSL / TLS Checking Tool written in Python3

ssts-chk SSL / TLS Checking Tool written in Python3. This tool will perform the following functions: Connect the target given Analyze the secure conne

labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Osint-Tool - Information collection tool in python

Osint-Tool Herramienta para la recolección de información Pronto más opciones In

Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells
Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells

About create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool t

Comments
  • Needs work to actually find all broken links

    Needs work to actually find all broken links

    I have been using another broken link tester michaeltelford/broken_link_finder, but am currently looking for one that is portable.

    I setup a test page with 19 broken links testing website broken link finders for the following test cases and combinations thereof:

    • Absolute broken link to image
    • Absolute broken link to non-existing page
    • Absolute broken anchor link to non-existing page
    • Absolute broken anchor link to test page
    • Absolute broken link to non-existing page
    • Relative broken link to image
    • Relative broken link to non-existing page
    • Relative broken anchor link to non-existing page
    • Relative broken anchor link to test page
    • Relative broken link to non-existing page
    • Broken link to image on a different domain that does not exist.
    • Broken link on different domain.
    • Broken anchor link to non-existing page on different domain.
    • Broken anchor link to existing page on different domain.
    • Broken link on different domain with query string.
    • Broken Link to non-existing domain.
    • Broken Link to image on non-existing domain
    • Broken Anchor Link on non-existing domain
    • Broken Link to non-existing domain with query string

    I ran BrokenLinkHijacker against my test page.

    • It found only 10 links
    • It search 4 broken links saying that it could not connect, then reported
    • NO BROKEN LINKS FOUND (all caps from the output of the program not mine.)

    Not sure where to start. A page with 19 broken links and it does not even find one.

    opened by frederickjh 3
  • fixed number_of_broken_link count and is_valid function to check only…

    fixed number_of_broken_link count and is_valid function to check only…

    • It seems like a lot of lines in the code changed but I only auto-formatted the code.

    Changes:

    1. is_valid is now filtering for schemas being one of ['http', 'https'].
    2. number_of_broken_link was referenced before assignment in status_check because of not using the global value.
    opened by DavidBalas1 1
Releases(1.0)
Owner
Mayank Pandey
QWx3YXlzIExlYXJuaW5nLi4=
Mayank Pandey
Infoga is a tool gathering email accounts informations (ip,hostname,country,...) from different public source

Infoga - Email OSINT Infoga is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pg

m4ll0k (mallok) 1.8k Jan 04, 2023
User-friendly reference finder in IDA

IDARefHunter Updated: This project's been introduced on IDA Plugin Contest 2021! Why do we need RefHunter? Getting reference information in one specif

Jiwon 29 Dec 04, 2022
A burp-suite plugin that extract all parameter names from in-scope requests

ParamsExtractor A burp-suite plugin that extract all parameters name from in-scope requests. You can run the plugin while you are working on the targe

29 Nov 09, 2022
Finite Volume simulation of the Raleigh-Taylor Instability

finitevolume2-python Finite Volume simulation of the Raleigh-Taylor Instability Create Your Own Finite Volume Fluid Simulation (With Python): Part 2 B

Philip Mocz 12 Sep 01, 2022
CVE-2021-26855: PoC (Not a HoneyPoC for once!)

Exch-CVE-2021-26855 ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker b

ZephrFish 24 Nov 14, 2022
A GitHub action for organizations that enables advanced security code scanning on all new repos

Advanced-Security-Enforcer What this repository does This code is for an active GitHub Action written in Python to check (on a schedule) for new repos

Zack Koppert 30 May 17, 2022
Simple and easy framework for phishing 🎣

👋 It's in beta, I'm still building How to install Linux and Termux: Clone Rp: git clone https://github.com/J4c5/superfish.git Install the dependencie

Jack 4 Jan 27, 2022
open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability

CVE-2021-44228-log4jVulnScanner-metasploit open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability pre

Taroballz 7 Nov 09, 2022
SEBUAH TOOLS TERMUX CRACK AKUN FF HOMKI AKUN EPEP DAH SATU FOLLOW AE YA BROO AWOKWOK

print " INSTALL TOOLS " $ pkg update && upgrade $ pkg install python2 $ pkg install git $ pip2 install lolcat $ pip2 install bs4 $ pip2 install reques

Jeeck 2 Nov 29, 2021
😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.

😭 WSOB (CVE-2022-29464) 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464. CVE-2022-29464 details:

0p 25 Oct 14, 2022
Remote Desktop Protocol in Twisted Python

RDPY Remote Desktop Protocol in twisted python. RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client a

Sylvain Peyrefitte 1.6k Dec 30, 2022
Phoenix Framework is an environment for writing, testing and using exploit code.

Phoenix Framework is an environment for writing, testing and using exploit code. 🖼 Screenshots 🎪 Community PwnWiki Forums 🔑 Licen

42 Aug 09, 2022
Brute smb share - Brute force a SMB share

brute_smb_share I wrote this small PoC after bumping into SMB servers where Hydr

devloop 3 Feb 21, 2022
log4j-tools: CVE-2021-44228 poses a serious threat to a wide range of Java-based applications

log4j-tools Quick links Click to find: Inclusions of log4j2 in compiled code Calls to log4j2 in compiled code Calls to log4j2 in source code Overview

JFrog Ltd. 171 Dec 25, 2022
Wordlist attacks on Bitwarden data.json files

BitwardenDecryptBrute This is a slightly modified version of BitwardenDecrypt. In addition to the decryption this version can do wordlist attacks for

42 Nov 09, 2022
The Modern Hash Identification System

🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 3000+ other hashes ☄ Comes with a neat web app 🔥

1.2k Dec 28, 2022
A simple subdomain scanner in python

Subdomain-Scanner A simple subdomain scanner in python ✨ Features scans subdomains of a domain thats it! 💁‍♀️ How to use first download the scanner.p

Portgas D Ace 2 Jan 07, 2022
POC for CVE-2022-1388

CVE-2022-1388 POC for CVE-2022-1388 affecting multiple F5 products. Follow the Horizon3.ai Attack Team on Twitter for the latest security research: Ho

Horizon 3 AI Inc 231 Dec 07, 2022
Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)

CVE-2021-42694 Generate malicious files using recently published homoglyph-attack vulnerability, which was discovered at least in C, C++, C#, Go, Pyth

js-on 17 Dec 11, 2022
To explore creating an application that detects available connections at once from wifi and bluetooth

Signalum A Linux Package to detect and analyze existing connections from wifi and bluetooth. Also checkout the Desktop Application. Signalum Installat

BISOHNS 56 Mar 03, 2021