Skip to content

R0X4R/Parshu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation


Parshu logo

Filter URLs to save your time using regex


Parshu usage


Parshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.

Inspired from tomnomnom's gf tool

Features

  • You can also add your custom regex to get results
  • Filter out all the query parameters which you use to check vulnerabilities

Installation

$ pip3 install parshu
$ wget -O parshu https://raw.githubusercontent.com/R0X4R/Parshu/main/parshu.py -q && chmod +x parshu && mv parshu /usr/bin/

Usage

Parshu usage

  • For linux, unix and debian based systems

    $ waybackurls sub.domain.tld | parshu
    
    http://sub.domain.tld/wvstests/
    http://sub.domain.tld/wvstests/pmwiki_2_1_19
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
  • For windows based systems

    cmd> type urls.txt | python3 parshu.py
  • If no arguments passed

    $ waybackurls sub.domain.tld | parshu
    
    http://sub.domain.tld/wvstests/
    http://sub.domain.tld/wvstests/pmwiki_2_1_19
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
  • To filter out the results for xss

    Note: To get parameters for other vulnerabilites use other arguments. To get all the arguments use parshu -h

    $ waybackurls testphp.vulnweb.com | parshu -x
    
    http://testphp.vulnweb.com/artists.php?artist=1
    http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg
    http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg&size=160

Donate

If this tool helped you or you like my work


Donate Now