Skip to content

🕷️ | Dez-Crwl is a website osint history crawler gather hidden information and check vulnerabilities for extracted .js endpoints & much more!

License

Notifications You must be signed in to change notification settings

zebbern/dez-crwl

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

dezCrawl - Web Reconnaissance Tool

Python Status License

dezCrawl is a web reconnaissance tool for gathering URLs, subdomains, JavaScript endpoints, and sensitive information using various OSINT sources like Wayback Machine, Common Crawl, and VirusTotal.

Table of Contents

Features:

  • Fetches URLs from Common Crawl, Wayback Machine, and VirusTotal
  • Discovers subdomains automatically
  • Extracts JavaScript endpoints and hidden APIs
  • Detects sensitive information such as API keys and JWT tokens
  • Supports status code filtering
  • Generates detailed reports in TXT or JSON format

Installation

pip install -r requirements.txt
git clone https://github.com/zebbern/dez-crwl.git
cd dez-crwl

Make Globally Accessible?

🐧 - Linux/macOS - 🐧

Step 1: Download or clone repo if u havent done it:

git clone https://github.com/zebbern/dez-crwl.git

Step 2: Run these commands:

chmod +x dezCrawl.py
sudo mv dezCrawl.py /usr/local/bin/dezCrawl
dezCrawl -h

Now run dezCrawl -h anywhere in terminal

🪟 - Windows - 🪟

Step 1: Download or clone repos if u havent done it:

git clone https://github.com/zebbern/dez-crwl.git
cd dez-crawl
python3 dez-crawl -h

Step 2: Optional Convert to executable:

pip install pyinstaller
pyinstaller --onefile dezCrawl.py

Step 3: Move exe to directory in your PATH like:

echo %PATH%
# Or use this path it usually works replace "Your-Username"
move dist/dezCrawl.exe C:\Users\Your-Username\AppData\Local\Microsoft\WindowsApps\ 

Now run dezCrawl -h anywhere in terminal

Usage:

  1. Run the script with a domain:
python3 dezCrawl.py -t example.com -cw -js -sum -o output.txt
  1. Extract JavaScript endpoints:
python3 dezCrawl.py -t example.com -js
  1. Fetch results from Wayback and VirusTotal:
python3 dezCrawl.py -t example.com -cw -vt YOUR_VIRUSTOTAL_API_KEY
  1. Filter specific file types:
python3 dezCrawl.py -t example.com -f "(\.json|\.env|\.bak|\.sql)"
  1. How its supposed to run & with what:
dezCrwl target.com -dir -cw -js -ws -sum -o output.txt -f "(\.json|\.env|\.bak|\.backup|\.old|\.git|\.svn|\.swp|\.sql|\.db|\.sqlite|\.log|\.txt|\.zip|\.rar|\.tar\.gz|\.7z|\.pdf|\.docx|\.xlsx|\.conf|\.ini|\.yml|\.yaml|\.dump|\.sql\.dump|\.session|\.pem|\.key|\.crt|\.tmp)"

Configuration:

(config.yaml):

  • verbose: Enables detailed logging (true/false)
  • output_format: Choose "txt" or "json"
  • API keys: Configure URLScan and CertSpotter API keys

Showcase

Coming....

Python 3.12+ Pip Fix:

Create and Activate a Virtual Environment

For Linux/macOS:

python3 -m venv venv && source venv/bin/activate

For Windows:

python -m venv venv && .\venv\Scripts\activate

Any other issue usually can be fixed with:

ModuleNotFoundError: No module named 'yaml'

fix by running this same can be done if u get any other missing like this

python3 -m pip install --upgrade --force-reinstall pyyaml```

Developer: