A Fast Broken Link Hijacker Tool written in Python

Overview

Broken Link Hijacker

BrokenLinkHijacker(BLH) is a Fast Broken Link Hijacker Tool written in Python. It crawls the website and searches for all the Broken Links.This tool is mainly designed for Bug Bounty Hunters.It helps bug hunters collect all the Broken Links from the domain they are targeting. It crawls the website on 3 different deepness to get all the links from it. It also helps to find all the Social Media or Social Engagement platforms links mentioned on the website. It Searches for links in

BLH-3

Installation

https://github.com/MayankPandey01/BrokenLinkHijacker.git

Recommended Python Version:

This Tool Only Supports Python 3. The recommended version for Python 3 is 3.8.x.

Dependencies:

The dependencies can be installed using the requirements file:.

Installation on Windows:.

  • python.exe -m pip install -r requirements.txt.

Installation on Linux.

  • sudo pip install -r requirements.txt.

How it Works

This tool searches for all the INBOUND and OUTBOUND links from HTML tags and then crawls it Further based on the Depness set by the user

Deepness Decide how the Search takes Place on the Webpage

  • Deepness = 1 It means that only the given Url will be Crawled
  • Deepness=2 In this search, the Crawler goes on Step Further and goes one more level deep to search
  • Deepness=3 Here all the INBOUND links from the website are crawled until there is no link left to crawl. This can take a significant amount of time to complete.

Usage

Short Form Long Form Description
url url A URL to scan
-d Deepness Level of deepness to search.(Default=1)[Varies from 1-3]
-v --verbosity Set the Verbosity for Program
-o --output Weather to save the output in a file or not.(Default=False)
-h --help Displays help

Examples

  • To Use the Tool in the default setting.
    BLH.py https://google.com will give result.

BLH-4

  • To Increase Deepness Use :

BLH.py https://google.com -d 2 This will set Deepness to 2.
BLH.py https://google.com -d 3 This will set Deepness to 3 .

  • To turn Verbosity Mode On or OFF :

    By default Verbosity Mode is Set to True.
    BLH.py https://google.com -v False .
    -v F or -v Flase | -v T or -v True.

  • To Save output To a file :

    By default Output is Set to False. The output fileame is set to domain_links.txt by default.
    BLH.py https://google.com -o True .
    -o F or -o False | -o T or -o True.

Note

Use This Tool Wisely.
Happy Hacking

You might also like...
Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

evil-stalker How to run First of all, you must install the necessary libraries.

A fast tool to scan prototype pollution vulnerability
A fast tool to scan prototype pollution vulnerability

proto A fast tool to scan prototype pollution vulnerability Syntax python3 proto.py -l alive.txt Requirements Selenium Google Chrome Webdriver Note :

Fast Fb Cracking Tool

fb-brute Fast Fb Cracking Tool 🏆

A fast sub domain brute tool for pentesters
A fast sub domain brute tool for pentesters

subDomainsBrute 1.4 A fast sub domain brute tool for pentesters. It works with P

DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion
DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion

DependConfusion-X Tool is written in Python3 which allows security researcher/bug bounty hunter to scan and monitor list of hosts for Dependency Confusion.

SSL / TLS Checking Tool written in Python3

ssts-chk SSL / TLS Checking Tool written in Python3. This tool will perform the following functions: Connect the target given Analyze the secure conne

labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Osint-Tool - Information collection tool in python

Osint-Tool Herramienta para la recolección de información Pronto más opciones In

Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells
Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells

About create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool t

Comments
  • Needs work to actually find all broken links

    Needs work to actually find all broken links

    I have been using another broken link tester michaeltelford/broken_link_finder, but am currently looking for one that is portable.

    I setup a test page with 19 broken links testing website broken link finders for the following test cases and combinations thereof:

    • Absolute broken link to image
    • Absolute broken link to non-existing page
    • Absolute broken anchor link to non-existing page
    • Absolute broken anchor link to test page
    • Absolute broken link to non-existing page
    • Relative broken link to image
    • Relative broken link to non-existing page
    • Relative broken anchor link to non-existing page
    • Relative broken anchor link to test page
    • Relative broken link to non-existing page
    • Broken link to image on a different domain that does not exist.
    • Broken link on different domain.
    • Broken anchor link to non-existing page on different domain.
    • Broken anchor link to existing page on different domain.
    • Broken link on different domain with query string.
    • Broken Link to non-existing domain.
    • Broken Link to image on non-existing domain
    • Broken Anchor Link on non-existing domain
    • Broken Link to non-existing domain with query string

    I ran BrokenLinkHijacker against my test page.

    • It found only 10 links
    • It search 4 broken links saying that it could not connect, then reported
    • NO BROKEN LINKS FOUND (all caps from the output of the program not mine.)

    Not sure where to start. A page with 19 broken links and it does not even find one.

    opened by frederickjh 3
  • fixed number_of_broken_link count and is_valid function to check only…

    fixed number_of_broken_link count and is_valid function to check only…

    • It seems like a lot of lines in the code changed but I only auto-formatted the code.

    Changes:

    1. is_valid is now filtering for schemas being one of ['http', 'https'].
    2. number_of_broken_link was referenced before assignment in status_check because of not using the global value.
    opened by DavidBalas1 1
Releases(1.0)
Owner
Mayank Pandey
QWx3YXlzIExlYXJuaW5nLi4=
Mayank Pandey
MITMSDR for INDIAN ARMY cybersecurity hackthon

There mainly three things here: MITMSDR spectrum Manual reverse shell MITMSDR Installation Clone the project and run the setup file: ./setup One of th

2 Jul 26, 2022
DoSer.py - Simple DoSer in Python

DoSer.py - Simple DoSer in Python What is DoSer? DoSer is basically an HTTP Denial of Service attack that affects threaded servers. It works like this

1 Oct 12, 2021
Simple tool to create passwords.

PasswordGenerator Simple password generator: -Simplisitc Window Application -Allows Numbers, Symbols & letters upper and lowercase -Restricts rows of

DM 1 Jan 10, 2022
Detection And Breaking With Python

Detection And Breaking IIIIIIIIIIIIIIIIIIII PPPPPPPPPPPPPPPPP VVVVVVVV VVVVVVVV I::::::::II::::::::I P:::::::

Baris Dincer 1 Dec 26, 2021
List of S3 Hacks

s3-leaks List of AWS S3 Leaks Feel free to send in a PR if you know of other leaks Date Description Notes Aug2020 S3 bucket mess up exposed 182GB of s

Nag 291 Dec 28, 2022
A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

11 Nov 15, 2022
GitLab CI security tools runner

Common Security Pipeline Описание проекта: Данный проект является вариантом реализации DevSecOps практик, на базе: GitLab DefectDojo OpenSouce tools g

Сити-Мобил 14 Dec 23, 2022
This is a simple Port Flooder written in Python 3.

This is a simple Port Flooder written in Python 3. Use this tool to quickly stress test your network devices and measure your router's or server's load.

Júlio Carneiro 4 Feb 20, 2022
If you are worried about being found perhaps try taking cover under a blanket. Pure Python PowerShell Obfuscator

If you are worried about being found perhaps try taking cover under a blanket. Pure Python PowerShell Obfuscator

Ph0tonz 3 Jun 07, 2022
test application for the licence key web app.

licence_software_test_app Make sure you set your database values in a .env file to the folder. Install MYSQL connector: pip install mysql-connector-py

Carl Beattie 1 Oct 28, 2021
log4j burp scanner

log4jscanner log4j burp插件 特点如下: 0x01 基于Cookie字段、XFF头字段、UA头字段发送payload 0x02 基于域名的唯一性,将host带入dnslog中 插件主要识别五种形式: 1.get请求,a=1&b=2&c=3 2.post请求,a=1&b=2&c=

1 Jun 30, 2022
Threat research and reporting from IronNet's Threat Research Teams

IronNet Threat Research 🕵️ Overview This repository contains IronNet's Threat Research. Research & Reporting 📝 Project Description Cobalt Strike Res

36 Dec 02, 2022
Early days of an Asset Discovery tool.

Please star this project! Written in Python Report Bug . Request Feature DISCLAIMER This project is in its early days, everything you see here is almo

grag1337 3 Dec 20, 2022
Magicspoofing - A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name

A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name. This project is for educational use, we are not responsible for i

20 Dec 02, 2022
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules

About: Arbitrium is a cross-platform is a remote access trojan (RAT), Fully UnDetectable (FUD), It allows you to control Android, Windows and Linux an

Ayoub 861 Feb 18, 2021
Scarecrow is a tool written in Python3 allowing you to protect your Python3 scripts.

🕷️ Scarecrow 🕷️ Scarecrow is a tool written in Python3 allowing you to protect your Python3 scripts. It looks for processes with specific names to v

Billy 33 Sep 28, 2022
Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

12 Sep 28, 2022
This is an advanced backdoor, created with Python

Backdoor This is a Backdoor, created with Python 3. Types of Commands: Downloading / Uploading files. Launching / Deleting / Reading file's content. S

swagkarna 28 Oct 28, 2022
FIVE, Vulnerability Scanner And Mass Exploiter, made for pentesting.

$ FIVE - FIVE is a Pentesting Framework to Test the Security & Integrity of a Website, or Multiple Websites. $ Info FIVE Was Made After Vulnnr to Prod

Neon 24 Dec 10, 2021