Parshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.
Inspired from tomnomnom's gf tool
- You can also add your custom regex to get results
- Filter out all the query parameters which you use to check vulnerabilities
$ pip3 install parshu$ wget -O parshu https://raw.githubusercontent.com/R0X4R/Parshu/main/parshu.py -q && chmod +x parshu && mv parshu /usr/bin/-
For
linux,unixanddebianbased systems$ waybackurls sub.domain.tld | parshu http://sub.domain.tld/wvstests/ http://sub.domain.tld/wvstests/pmwiki_2_1_19 http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
-
For
windowsbased systemscmd> type urls.txt | python3 parshu.py -
If
no argumentspassed$ waybackurls sub.domain.tld | parshu http://sub.domain.tld/wvstests/ http://sub.domain.tld/wvstests/pmwiki_2_1_19 http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
-
To filter out the results for xss
Note: To get parameters for other vulnerabilites use other arguments. To get all the arguments use
parshu -h$ waybackurls testphp.vulnweb.com | parshu -x http://testphp.vulnweb.com/artists.php?artist=1 http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg&size=160
If this tool helped you or you like my work


