A Fast Broken Link Hijacker Tool written in Python

Overview

Broken Link Hijacker

BrokenLinkHijacker(BLH) is a Fast Broken Link Hijacker Tool written in Python. It crawls the website and searches for all the Broken Links.This tool is mainly designed for Bug Bounty Hunters.It helps bug hunters collect all the Broken Links from the domain they are targeting. It crawls the website on 3 different deepness to get all the links from it. It also helps to find all the Social Media or Social Engagement platforms links mentioned on the website. It Searches for links in

BLH-3

Installation

https://github.com/MayankPandey01/BrokenLinkHijacker.git

Recommended Python Version:

This Tool Only Supports Python 3. The recommended version for Python 3 is 3.8.x.

Dependencies:

The dependencies can be installed using the requirements file:.

Installation on Windows:.

  • python.exe -m pip install -r requirements.txt.

Installation on Linux.

  • sudo pip install -r requirements.txt.

How it Works

This tool searches for all the INBOUND and OUTBOUND links from HTML tags and then crawls it Further based on the Depness set by the user

Deepness Decide how the Search takes Place on the Webpage

  • Deepness = 1 It means that only the given Url will be Crawled
  • Deepness=2 In this search, the Crawler goes on Step Further and goes one more level deep to search
  • Deepness=3 Here all the INBOUND links from the website are crawled until there is no link left to crawl. This can take a significant amount of time to complete.

Usage

Short Form Long Form Description
url url A URL to scan
-d Deepness Level of deepness to search.(Default=1)[Varies from 1-3]
-v --verbosity Set the Verbosity for Program
-o --output Weather to save the output in a file or not.(Default=False)
-h --help Displays help

Examples

  • To Use the Tool in the default setting.
    BLH.py https://google.com will give result.

BLH-4

  • To Increase Deepness Use :

BLH.py https://google.com -d 2 This will set Deepness to 2.
BLH.py https://google.com -d 3 This will set Deepness to 3 .

  • To turn Verbosity Mode On or OFF :

    By default Verbosity Mode is Set to True.
    BLH.py https://google.com -v False .
    -v F or -v Flase | -v T or -v True.

  • To Save output To a file :

    By default Output is Set to False. The output fileame is set to domain_links.txt by default.
    BLH.py https://google.com -o True .
    -o F or -o False | -o T or -o True.

Note

Use This Tool Wisely.
Happy Hacking

You might also like...
Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

evil-stalker How to run First of all, you must install the necessary libraries.

A fast tool to scan prototype pollution vulnerability
A fast tool to scan prototype pollution vulnerability

proto A fast tool to scan prototype pollution vulnerability Syntax python3 proto.py -l alive.txt Requirements Selenium Google Chrome Webdriver Note :

Fast Fb Cracking Tool

fb-brute Fast Fb Cracking Tool 🏆

A fast sub domain brute tool for pentesters
A fast sub domain brute tool for pentesters

subDomainsBrute 1.4 A fast sub domain brute tool for pentesters. It works with P

DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion
DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion

DependConfusion-X Tool is written in Python3 which allows security researcher/bug bounty hunter to scan and monitor list of hosts for Dependency Confusion.

SSL / TLS Checking Tool written in Python3

ssts-chk SSL / TLS Checking Tool written in Python3. This tool will perform the following functions: Connect the target given Analyze the secure conne

labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface
labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface

labsecurity labsecurity is a tool that brings together python scripts made for ethical hacking, in a single tool, through a console interface. Warning

Osint-Tool - Information collection tool in python

Osint-Tool Herramienta para la recolección de información Pronto más opciones In

Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells
Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells

About create a target list or select one target, scans then exploits, done! Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool t

Comments
  • Needs work to actually find all broken links

    Needs work to actually find all broken links

    I have been using another broken link tester michaeltelford/broken_link_finder, but am currently looking for one that is portable.

    I setup a test page with 19 broken links testing website broken link finders for the following test cases and combinations thereof:

    • Absolute broken link to image
    • Absolute broken link to non-existing page
    • Absolute broken anchor link to non-existing page
    • Absolute broken anchor link to test page
    • Absolute broken link to non-existing page
    • Relative broken link to image
    • Relative broken link to non-existing page
    • Relative broken anchor link to non-existing page
    • Relative broken anchor link to test page
    • Relative broken link to non-existing page
    • Broken link to image on a different domain that does not exist.
    • Broken link on different domain.
    • Broken anchor link to non-existing page on different domain.
    • Broken anchor link to existing page on different domain.
    • Broken link on different domain with query string.
    • Broken Link to non-existing domain.
    • Broken Link to image on non-existing domain
    • Broken Anchor Link on non-existing domain
    • Broken Link to non-existing domain with query string

    I ran BrokenLinkHijacker against my test page.

    • It found only 10 links
    • It search 4 broken links saying that it could not connect, then reported
    • NO BROKEN LINKS FOUND (all caps from the output of the program not mine.)

    Not sure where to start. A page with 19 broken links and it does not even find one.

    opened by frederickjh 3
  • fixed number_of_broken_link count and is_valid function to check only…

    fixed number_of_broken_link count and is_valid function to check only…

    • It seems like a lot of lines in the code changed but I only auto-formatted the code.

    Changes:

    1. is_valid is now filtering for schemas being one of ['http', 'https'].
    2. number_of_broken_link was referenced before assignment in status_check because of not using the global value.
    opened by DavidBalas1 1
Releases(1.0)
Owner
Mayank Pandey
QWx3YXlzIExlYXJuaW5nLi4=
Mayank Pandey
Yet another web fuzzer

yafuzz Yet another web fuzzer Usage This script can run in two modes of operation. Supplying a wordlist -W argument will initiate a multithreaded fuzz

FooBallZ 5 Feb 02, 2022
Exploiting CVE-2021-44228 in vCenter for remote code execution and more

Log4jCenter Exploiting CVE-2021-44228 in vCenter for remote code execution and more. Blog post detailing exploitation linked below: COMING SOON Why? P

81 Dec 20, 2022
Fat-Stealer is a stealer that allows you to grab the Discord token from a user and open a backdoor in his machine.

Fat-Stealer is a stealer that allows you to grab the Discord token from a user and open a backdoor in his machine.

Jet Berry's 21 Jan 01, 2023
A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021)

wifi-bf [LINUX ONLY] A (completely native) python3 wifi brute-force attack using the 100k most common passwords (2021) This script is purely for educa

Finn Lancaster 20 Nov 12, 2022
A passive-recon tool that parses through found assets and interacts with the Hackerone API

Hackerone Passive Recon Tool A passive-recon tool that parses through found assets and interacts with the Hackerone API. Setup Simply run setup.sh to

elbee 4 Jan 13, 2022
Repository for a project of the course EP2520 Building Networked Systems Security

EP2520_ACME_Project Repository for a project of the course EP2520 Building Networked Systems Security in Royal Institute of Technology (KTH), Stockhol

1 Dec 11, 2021
telegram bug that discloses user's hidden phone number (still unpatched) (exploit included)

CVE-2019-15514 Type: Information Disclosure Affected Users, Versions, Devices: All Telegram Users Still not fixed/unpatched. brute.py is available exp

Gray Programmerz 66 Dec 08, 2022
LinOTP - the open source solution for two factor authentication

LinOTP LinOTP - the Open Source solution for multi-factor authentication Copyright © 2010-2019 KeyIdentity GmbH Coypright © 2019- arxes-tolina GmbH In

LinOTP 462 Jan 02, 2023
DCSync - DCSync Attack from Outside using Impacket

Adding DCSync Permissions Mostly copypasta from https://github.com/tothi/rbcd-at

n00py 77 Dec 16, 2022
Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Md. Nur habib 31 Oct 21, 2022
This is a Python program that implements a vacuum cleaner as an Artificial Intelligence.

Vacuum-Cleaner Python3 This is a Python3 agent that implements a simulator for a vacuum cleaner and it is introduction to Artificial Intelligence. A s

Abdultawwab Safarji 6 Nov 14, 2022
Website OSINT untuk mencari informasi dari email dan nomor telepon. Dibuat dengan React dan Flask.

Inspektur Cari informasi mengenai email dan nomor telepon dengan mudah. Inspektur adalah aplikasi OSINT yang berguna untuk mencari informasi berdasark

Bagas Wastu 36 Dec 04, 2022
Uma ferramenta de segurança da informação escrita em python3,capaz de dar acesso total ao computador de alguém!

shell-reverse Uma ferramenta de segurança da informação escrita em python3, capaz de dar acesso total ao computador de alguém! A cybersecurity tool wr

Marcus Vinícius Ribeiro Andrade 1 Nov 03, 2021
Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone

Simple OSINT script to find Instagram profiles by name and e-mail/phone

108 Jan 07, 2023
Use FOFA automatic vulnerability scanning tool

AutoSRC Use FOFA automatic vulnerability scanning tool Usage python3 autosrc.py -e FOFA EMAIL -k TOKEN Screenshots License MIT Dev 6613GitHub6613

PwnWiki 48 Oct 25, 2022
Operational information regarding the vulnerability in the Log4j logging library.

Log4j Vulnerability (CVE-2021-44228) This repo contains operational information regarding the vulnerability in the Log4j logging library (CVE-2021-442

Nationaal Cyber Security Centrum (NCSC-NL) 1.9k Dec 26, 2022
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation).

IDA2Obj IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly from one exe

Mickey 94 Dec 13, 2022
CVE-2021-22005 - VMWare vCenter Server File Upload to RCE

CVE-2021-22005 - VMWare vCenter Server File Upload to RCE Analyze Usage ------------------------------------------------------------- [*] CVE-2021-220

r0cky 224 Aug 05, 2022
zip-brute Zip File Password Cracking with Using Password List

Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.

AnonyminHack5 13 Nov 03, 2022
A guide to building basic malware in Python by implementing a keylogger application

Keylogger-Malware-Project A guide to building basic malware in Python by implementing a keylogger application. If you want even more detail on the Pro

Noah Davis 1 Jan 11, 2022