Fast Pattern Fetcher (fpf)
Coded with <3 by HS Devansh Raghav
Fast Pattern Fetcher, Takes a URLs list and outputs the URLs which contains the parameters according to the specified pattern.
- fpf/
- main.py
- init.py
- scripts/
- init.py
- fetcher.py
- colors.py
- args.py
- db/
- db.py
- init.py
- setup.py
- LICENCE
- README.md
Installation
$ git clone https://github.com/whoamisec75/fpf.git
$ cd fpf
$ sudo python3 setup.py install
$ fpf -h
Before running these commands make sure that you have python3 and setuptools installed.
Usage
You can use this tool like this:
$ fpf [URLs file] [Pattern]
For example:
$ fpf urls.waybackurls xss
Arguments
| Args | Discription |
|---|---|
| file | Specify the file which contains URLs |
| Pattern | Specify the pattern |
| -c/--concurrency | Specify the concurrency, default is 20 |
Patterns
These are all available patterns:
- db/
- db.py
- xss_patterns
- ssti_patterns
- ssrf_patterns
- sqli_patterns
- lfi_patterns
- rce_patterns
- idor_patterns
- redirect_patterns
- db.py
How to use patterns?
Finding Cross-site scripting (XSS) parameters using xss pattern:
$ fpf urls.waybackurls xss
Finding SQLi parameters using sqli pattern:
$ fpf urls.waybackurls sqli
Finding Server side request forgery (SSRF) parameters using ssrf pattern:
$ fpf urls.waybackurls ssrf
Finding Local File inclusion (LFI) parameters using lfi pattern:
$ fpf urls.waybackurls lfi
Finding Remote code execution (RCE) parameters using rce pattern:
$ fpf urls.waybackurls rce
Finding Insecure direct object references (IDOR) parameters using idor pattern:
$ fpf urls.waybackurls idor
Finding Open redirect parameters using redirect pattern:
$ fpf urls.waybackurls redirect
Finding Server side template injection (SSTI) parameters using ssti pattern:
$ fpf urls.waybackurls ssti
