A Fast Broken Link Hijacker Tool written in Python

Overview

Broken Link Hijacker

BrokenLinkHijacker(BLH) is a Fast Broken Link Hijacker Tool written in Python. It crawls the website and searches for all the Broken Links.This tool is mainly designed for Bug Bounty Hunters.It helps bug hunters collect all the Broken Links from the domain they are targeting. It crawls the website on 3 different deepness to get all the links from it. It also helps to find all the Social Media or Social Engagement platforms links mentioned on the website. It Searches for links in

BLH-3

Installation

https://github.com/MayankPandey01/BrokenLinkHijacker.git

Recommended Python Version:

This Tool Only Supports Python 3. The recommended version for Python 3 is 3.8.x.

Dependencies:

The dependencies can be installed using the requirements file:.

Installation on Windows:.

  • python.exe -m pip install -r requirements.txt.

Installation on Linux.

  • sudo pip install -r requirements.txt.

How it Works

This tool searches for all the INBOUND and OUTBOUND links from HTML tags and then crawls it Further based on the Depness set by the user

Deepness Decide how the Search takes Place on the Webpage

  • Deepness = 1 It means that only the given Url will be Crawled
  • Deepness=2 In this search, the Crawler goes on Step Further and goes one more level deep to search
  • Deepness=3 Here all the INBOUND links from the website are crawled until there is no link left to crawl. This can take a significant amount of time to complete.

Usage

Short Form Long Form Description
url url A URL to scan
-d Deepness Level of deepness to search.(Default=1)[Varies from 1-3]
-v --verbosity Set the Verbosity for Program
-o --output Weather to save the output in a file or not.(Default=False)
-h --help Displays help

Examples

  • To Use the Tool in the default setting.
    BLH.py https://google.com will give result.

BLH-4

  • To Increase Deepness Use :

BLH.py https://google.com -d 2 This will set Deepness to 2.
BLH.py https://google.com -d 3 This will set Deepness to 3 .

  • To turn Verbosity Mode On or OFF :

    By default Verbosity Mode is Set to True.
    BLH.py https://google.com -v False .
    -v F or -v Flase | -v T or -v True.

  • To Save output To a file :

    By default Output is Set to False. The output fileame is set to domain_links.txt by default.
    BLH.py https://google.com -o True .
    -o F or -o False | -o T or -o True.

Note

Use This Tool Wisely.
Happy Hacking

You might also like...
Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

evil-stalker How to run First of all, you must install the necessary libraries.

A fast tool to scan prototype pollution vulnerability
A fast tool to scan prototype pollution vulnerability

proto A fast tool to scan prototype pollution vulnerability Syntax python3 proto.py -l alive.txt Requirements Selenium Google Chrome Webdriver Note :

Fast Fb Cracking Tool

fb-brute Fast Fb Cracking Tool 🏆

A fast sub domain brute tool for pentesters
A fast sub domain brute tool for pentesters

subDomainsBrute 1.4 A fast sub domain brute tool for pentesters. It works with P

DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion
DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion

DependConfusion-X Tool is written in Python3 which allows security researcher/bug bounty hunter to scan and monitor list of hosts for Dependency Confusion.

SSL / TLS Checking Tool written in Python3

ssts-chk SSL / TLS Checking Tool written in Python3. This tool will perform the following functions: Connect the target given Analyze the secure conne

labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Osint-Tool - Information collection tool in python

Osint-Tool Herramienta para la recolección de información Pronto más opciones In

Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells
Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells

About create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool t

Comments
  • Needs work to actually find all broken links

    Needs work to actually find all broken links

    I have been using another broken link tester michaeltelford/broken_link_finder, but am currently looking for one that is portable.

    I setup a test page with 19 broken links testing website broken link finders for the following test cases and combinations thereof:

    • Absolute broken link to image
    • Absolute broken link to non-existing page
    • Absolute broken anchor link to non-existing page
    • Absolute broken anchor link to test page
    • Absolute broken link to non-existing page
    • Relative broken link to image
    • Relative broken link to non-existing page
    • Relative broken anchor link to non-existing page
    • Relative broken anchor link to test page
    • Relative broken link to non-existing page
    • Broken link to image on a different domain that does not exist.
    • Broken link on different domain.
    • Broken anchor link to non-existing page on different domain.
    • Broken anchor link to existing page on different domain.
    • Broken link on different domain with query string.
    • Broken Link to non-existing domain.
    • Broken Link to image on non-existing domain
    • Broken Anchor Link on non-existing domain
    • Broken Link to non-existing domain with query string

    I ran BrokenLinkHijacker against my test page.

    • It found only 10 links
    • It search 4 broken links saying that it could not connect, then reported
    • NO BROKEN LINKS FOUND (all caps from the output of the program not mine.)

    Not sure where to start. A page with 19 broken links and it does not even find one.

    opened by frederickjh 3
  • fixed number_of_broken_link count and is_valid function to check only…

    fixed number_of_broken_link count and is_valid function to check only…

    • It seems like a lot of lines in the code changed but I only auto-formatted the code.

    Changes:

    1. is_valid is now filtering for schemas being one of ['http', 'https'].
    2. number_of_broken_link was referenced before assignment in status_check because of not using the global value.
    opened by DavidBalas1 1
Releases(1.0)
Owner
Mayank Pandey
QWx3YXlzIExlYXJuaW5nLi4=
Mayank Pandey
Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

12 Sep 28, 2022
Bug Alert: a service for alerting security and IT professionals of high-impact and 0day vulnerabilities

Bug Alert Bug Alert is a service for alerting security and IT professionals of h

BugAlert.org 208 Dec 15, 2022
🍯 16 honeypots in a single pypi package (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres & MySQL)

Easy to setup customizable honeypots for monitoring network traffic, bots activities and username\password credentials. The current available honeypot

QeeqBox 259 Dec 31, 2022
Password database With special stuff

This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file. And so I made this simple password datab

9 Oct 30, 2022
Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack

O365DevicePhish Microsoft365_devicePhish Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack This is a simple proof-of-concept script t

Trewis [work] Scotch 4 Sep 23, 2022
Instagram brute force tool that uses tor as its proxy connections

Insta-crack This is a instagram brute force tool that uses tor as its proxy connections, keep in mind that you should not do anything illegal with thi

Liam 3 Jan 28, 2022
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)

log4j-finder A Python3 script to scan the filesystem to find Log4j2 that is vulnerable to Log4Shell (CVE-2021-44228) It scans recursively both on disk

Fox-IT 431 Dec 22, 2022
Scout Suite - an open source multi-cloud security-auditing tool,

Description Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using t

NCC Group Plc 5k Jan 05, 2023
This is a simple Port Flooder written in Python 3.

This is a simple Port Flooder written in Python 3. Use this tool to quickly stress test your network devices and measure your router's or server's load.

Júlio Carneiro 4 Feb 20, 2022
A tool to crack a wifi password with a help of wordlist

A tool to crack a wifi password with a help of wordlist. This may take long to crack a wifi depending upon number of passwords your wordlist contains. Also it is slower as compared to social media ac

Saad 144 Dec 29, 2022
OSINT Cybersecurity Tools

OSINT Cybersecurity Tools Welcome to the World of OSINT: An ongoing collection of awesome tools and frameworks, best security software practices, libr

Paul Veillard, P. Eng 7 Jul 01, 2022
Discord Token Stealer Malware Protection

TokenGuard TokenGuard, protect your account, prevent token steal. Totally free and open source Discord Server: https://discord.gg/EmwfaGuBE8 Source Co

10 Nov 23, 2022
PasswordManager is a command-line program that helps you manage your secret files like passwords

PasswordManager is a command-line program that helps you manage your secret files like passwords. It's very minimalistic and easy to use.

Michael 3 Dec 30, 2021
Tool to check if your DNS comply to Polish Ministry of Finance gambling domains restrictions

dns-mf-hazard Tool to check if your DNS comply to Polish Ministry of Finance gambling domains restrictions How to use it? Installation You need python

Marek Wajdzik 2 Jan 01, 2022
Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3

Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3, It Fuzzes All URLs of target website & then scan them for EAR

Pushpender Singh 9 Dec 12, 2022
Kunyu, more efficient corporate asset collection

Kunyu(坤舆) - More efficient corporate asset collection English | 中文文档 0x00 Introduce Tool introduction Kunyu (kunyu), whose name is taken from , is act

Knownsec, Inc. 772 Jan 05, 2023
A guide to building basic malware in Python by implementing a keylogger application

Keylogger-Malware-Project A guide to building basic malware in Python by implementing a keylogger application. If you want even more detail on the Pro

Noah Davis 1 Jan 11, 2022
BF-Hash - A Python Tool to decrypt hashes by brute force

BF-Hash Herramienta para descifrar hashes por fuerza bruta Instalación git clone

5 Apr 09, 2022
Reverse engineered Parler API

Parler's unofficial API with all endpoints present in their iOS app as of 08/12/2020. For the most part undocumented, but the error responses are alre

393 Nov 26, 2022
Cobalt Strike < 4.4 dos CVE-2021-36798

CVE-2021-36798 CVE-2021-36798 Cobalt Strike 4.3 dos 用法 python3 CVE-2021-36798.py BeaconURL 打瘫Cobalt Strike 只需要一个包 已测试 4.3 4.2 参考: https://labs.sent

37 Nov 09, 2022