{"id":31764,"date":"2024-01-19T07:49:10","date_gmt":"2024-01-19T07:49:10","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31764"},"modified":"2024-01-19T07:49:55","modified_gmt":"2024-01-19T07:49:55","slug":"httpalive","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/httpalive\/","title":{"rendered":"httpAlive &#8211; URL Analysis Tool For Web Application Penetration Test"},"content":{"rendered":"\n<p>Discover &#8216;httpAlive,&#8217; a powerful URL analysis tool designed for web application penetration testing. <\/p>\n\n\n\n<p>With features like user-agent rotation, multithreading, and colorized output, this versatile tool efficiently probes for alive subdomains and URLs. In this article, we&#8217;ll explore its capabilities, installation, and usage, empowering you with a valuable asset for enhancing your web application security assessments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The &#8220;httpAlive&#8221; tool is designed to efficiently probe for alive subdomains and URLs from a provided list.<\/li>\n\n\n\n<li>It includes features such as user-agent rotation, colorized output, multithreading, and a command-line interface (CLI) for ease of use.<\/li>\n\n\n\n<li>Works in all platforms.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/aashishsec\/httpAlive#features\"><\/a><strong>Features<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>User-Agent Rotation:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Randomly selects a user agent from a predefined list for each HTTP request to avoid detection.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Colorized Output:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Utilizes the&nbsp;<code>colorama<\/code>&nbsp;library to provide colorized and visually appealing output.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Multithreading:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Implements multithreading using Python&#8217;s&nbsp;<code>concurrent.futures<\/code>&nbsp;module for concurrent execution of HTTP requests.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>HTTP Client:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Utilizes the&nbsp;<code>httpx<\/code>&nbsp;library as the HTTP client with SSL certificate verification disabled.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Command-Line Interface (CLI):<\/strong>\n<ul class=\"wp-block-list\">\n<li>Accepts command-line arguments through the&nbsp;<code>argparse<\/code>&nbsp;module for easy configuration.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Output File:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Saves results to an output file specified by the user (default: &#8220;httpAlive_output.txt&#8221;).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Banner Display:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Displays a colorful banner at the beginning with information about the tool, author, and GitHub profile.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Exception Handling:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Includes exception handling to gracefully handle interruptions, such as&nbsp;<code>KeyboardInterrupt<\/code>.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/aashishsec\/httpAlive#installation\"><\/a><strong>Installation<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clone the repository to your local machine.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/aashishsec\/httpAlive#method-1\"><\/a><strong>Method 1<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>\rgit clone https:\/\/github.com\/aashish36\/httpAlive.git\r\n\r\ncd httpAlive\r\n\r\npip install -r requirements.txt\r<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Method 2<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>\rgit clone https:\/\/github.com\/aashish36\/httpAlive.git\r\n\r\ncd httpAlive\r\n\r\npip install .\r<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>httpAlive help:<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>\r\n\u2588\u2588\u2557\u2591\u2591\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2588\u2588\u2588\u2557\u2591\u2588\u2588\u2557\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2557\u2588\u2588\u2557\u2591\u2591\u2591\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\r\n\u2588\u2588\u2551\u2591\u2591\u2588\u2588\u2551\u255a\u2550\u2550\u2588\u2588\u2554\u2550\u2550\u255d\u255a\u2550\u2550\u2588\u2588\u2554\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2557\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2551\u2588\u2588\u2554\u2550\u2550\u2550\u2550\u255d\r\n\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2588\u2588\u2588\u2588\u2554\u255d\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2551\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u255a\u2588\u2588\u2557\u2591\u2588\u2588\u2554\u255d\u2588\u2588\u2588\u2588\u2588\u2557\u2591\u2591\r\n\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2554\u2550\u2550\u2550\u255d\u2591\u255a\u2550\u2550\u2550\u2550\u255d\u2588\u2588\u2554\u2550\u2550\u2588\u2588\u2551\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u255a\u2588\u2588\u2588\u2588\u2554\u255d\u2591\u2588\u2588\u2554\u2550\u2550\u255d\u2591\u2591\r\n\u2588\u2588\u2551\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2588\u2588\u2551\u2591\u2591\u2588\u2588\u2551\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\u2588\u2588\u2551\u2591\u2591\u255a\u2588\u2588\u2554\u255d\u2591\u2591\u2588\u2588\u2588\u2588\u2588\u2588\u2588\u2557\r\n\u255a\u2550\u255d\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u2591\u2591\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u255a\u2550\u255d\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\u255a\u2550\u255d\u2591\u2591\u2591\u255a\u2550\u255d\u2591\u2591\u2591\u255a\u2550\u2550\u2550\u2550\u2550\u2550\u255d\r\n      \r\n        Author   : Aashish\r\n                                              \r\n        Github   : https:\/\/github.com\/aashish36\r\n          \r\n        httpAlive is a tool designed to efficiently probe for alive subdomains and Urls from a provided list.\r\n\r\n\r\nusage: httpalive-Mark9.py &#91;-h] -l list &#91;-o output] &#91;-c CONCURRENCY] &#91;-t THREADS]\r\n\r\noptions:\r\n\r\n  -h, --help            show this help message and exit.\r\n\r\n  -l list, --DomainList list\r\n                        &#91;INFO]: List of Subdomains or URLs.\r\n\r\n  -o output, --output output\r\n                        &#91;INFO]: File to save our output.\r\n\r\n  -c CONCURRENCY, --concurrency CONCURRENCY\r\n                        &#91;INFO]: Concurrency level to make fast process.\r\n\r\n  -t THREADS, --threads THREADS\r\n                        &#91;INFO]: Threading level to make fast process.\r\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a file containing that contains list of URLs or subdoamins or both and give to httpAlive. The output contains status codes and content length.<\/li>\n\n\n\n<li>This python code will save the results of the analysis to a file named &#8216;output.txt&#8217;.<\/li>\n\n\n\n<li>Run the script with urls or subdomain list.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/aashishsec\/httpAlive#note\"><\/a><strong>Note<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not give more threads. It might cause Race Condition<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/aashishsec\/httpAlive#method-1-1\"><\/a><strong>Method 1<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>python .\/httpAlive\/httpAlive -l subdomainList.txt<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Method 2<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>httpAlive -l subdomainList.txt<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover &#8216;httpAlive,&#8217; a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and colorized output, this versatile tool efficiently probes for alive subdomains and URLs. In this article, we&#8217;ll explore its capabilities, installation, and usage, empowering you with a valuable asset for enhancing your web application security assessments. [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6501,6321,6052,6325],"class_list":["post-31764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-httpalive","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>httpAlive - URL Analysis Tool For Web Application Penetration Test<\/title>\n<meta name=\"description\" content=\"Discover &#039;httpAlive,&#039; a powerful URL analysis tool designed for web application penetration testing. With features like user-agent\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/httpalive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"httpAlive - URL Analysis Tool For Web Application Penetration Test\" \/>\n<meta property=\"og:description\" content=\"Discover &#039;httpAlive,&#039; a powerful URL analysis tool designed for web application penetration testing. With features like user-agent\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/httpalive\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-19T07:49:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-19T07:49:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"httpAlive &#8211; URL Analysis Tool For Web Application Penetration Test\",\"datePublished\":\"2024-01-19T07:49:10+00:00\",\"dateModified\":\"2024-01-19T07:49:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/\"},\"wordCount\":306,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\",\"keywords\":[\"cybersecurity\",\"httpAlive\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/httpalive\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/\",\"name\":\"httpAlive - URL Analysis Tool For Web Application Penetration Test\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\",\"datePublished\":\"2024-01-19T07:49:10+00:00\",\"dateModified\":\"2024-01-19T07:49:55+00:00\",\"description\":\"Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/httpalive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"httpAlive - URL Analysis Tool For Web Application Penetration Test","description":"Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/httpalive\/","og_locale":"en_US","og_type":"article","og_title":"httpAlive - URL Analysis Tool For Web Application Penetration Test","og_description":"Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent","og_url":"https:\/\/kalilinuxtutorials.com\/httpalive\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-01-19T07:49:10+00:00","article_modified_time":"2024-01-19T07:49:55+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"httpAlive &#8211; URL Analysis Tool For Web Application Penetration Test","datePublished":"2024-01-19T07:49:10+00:00","dateModified":"2024-01-19T07:49:55+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/"},"wordCount":306,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","keywords":["cybersecurity","httpAlive","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/httpalive\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/","url":"https:\/\/kalilinuxtutorials.com\/httpalive\/","name":"httpAlive - URL Analysis Tool For Web Application Penetration Test","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","datePublished":"2024-01-19T07:49:10+00:00","dateModified":"2024-01-19T07:49:55+00:00","description":"Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/httpalive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/httpalive\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjpuVbhw-12S81ZwIrQF7z3Tfi70ltob9799BwFQxsVCNz3qE828t4rCS8XDBzHMxz3iULNbs6vQ_NFxBI1SfQktPQ0K43cFHPGNgLkI2t4W1hhOihe7tyBPlYstxA1lVt-QIiUgzAdieDIaqQM1KrhvqW1DaK14uTfyaP03DqLskywqwx3WncN1JdBZl_j\/s16000\/Untitled%20design%20(10).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":8386,"url":"https:\/\/kalilinuxtutorials.com\/hakrawler-endpoints-assets-web-application\/","url_meta":{"origin":31764,"position":0},"title":"Hakrawler : Discovery Of Endpoints &#038; Assets Within A Web Application","author":"R K","date":"January 17, 2020","format":false,"excerpt":"Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: FormsEndpointsSubdomainsRelated domainsJavaScript files The goal is to create the tool in a way that it can be easily chained with other tools such as subdomain\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31521,"url":"https:\/\/kalilinuxtutorials.com\/cloakquest3r\/","url_meta":{"origin":31764,"position":1},"title":"CloakQuest3r: Unmasking Cloudflare-Protected Websites","author":"Varshini","date":"December 13, 2023","format":false,"excerpt":"CloakQuest3r is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely adopted web security and performance enhancement service. Its core mission is to accurately discern the actual IP address of web servers that are concealed behind Cloudflare's protective shield. Subdomain\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVEOapO4QzT6sfLDlWzF1AX-v5o-DWSqIOcYgXB8n8Z97k9NdlbPxbxmYnsWBTrKI6WSU-SBOwDusYuknUee2t89v0VdF5TC99wJMyQ07rtKW9sZPHjVYYTQuurQjQaQMKJAhxtzMuzHegCSWPWCniG-QiXaiJvkO0O8xjSXWypNwIoPdCP3M36SJ6pw\/s16000\/CloakQuest3r.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10659,"url":"https:\/\/kalilinuxtutorials.com\/web-hackers-weapons\/","url_meta":{"origin":31764,"position":2},"title":"Web Hacker&#8217;s Weapons : Collection Of Cool Tools Used By Web Hackers","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting. Weapons Army-Knife\/ALLBurpSuitethe BurpSuite projectArmy-Knife\/SCANjaelesThe Swiss Army knife for automated Web Application TestingArmy-Knife\/ALLzaproxyThe OWASP ZAP core projectDiscovery\/ALLOneForAllOneForAll\u662f\u4e00\u6b3e\u529f\u80fd\u5f3a\u5927\u7684\u5b50\u57df\u6536\u96c6\u5de5\u5177Discovery\/ALLaquatoneA Tool for Domain FlyoversDiscovery\/ALLlazyreconThis script is intended to automate your reconnaissance process in an organized fashionDiscovery\/CRAWLPhotonIncredibly\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37187,"url":"https:\/\/kalilinuxtutorials.com\/log4jscanner\/","url_meta":{"origin":31764,"position":3},"title":"Log4jScanner : A Comprehensive Tool For Vulnerability Detection","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"Log4jScanner is a powerful tool designed to help penetration testers identify Log4j-related vulnerabilities, specifically CVE-2021-44228 and CVE-2021-45046, in web applications. It is primarily used for black box testing on given subdomains, making it an essential asset for security professionals and bug bounty hunters. Key Features Fast & MultiThreaded: Log4jScanner is\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33289,"url":"https:\/\/kalilinuxtutorials.com\/x-recon\/","url_meta":{"origin":31764,"position":4},"title":"X-Recon : Mastering XSS Vulnerability Scanning And Web Reconnaissance","author":"Varshini","date":"June 10, 2024","format":false,"excerpt":"A sophisticated tool designed for web application security enthusiasts. This utility specializes in identifying web page inputs and performing comprehensive XSS scanning. Whether you're looking to uncover subdomains, analyze forms, or test for XSS vulnerabilities, X-Recon provides all the necessary functionalities to enhance your security testing efforts. Features: Subdomain Discovery:\u2026","rel":"","context":"In &quot;Web Application Security&quot;","block_context":{"text":"Web Application Security","link":"https:\/\/kalilinuxtutorials.com\/category\/web-application-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-iScW6njJVttlbiFu2_vnkOvA2t-r8yOvGbAYw-W9iIvcD30xtttqgaRtbxuhtvWGDB2RQAmMFYdbQ6V1KAYpuZvceAHvO1nvgH3jSUY1pAR7OfEB4CV7R1OgIcCvf0XaDRkG7vjS8NnhXtnaRQmN-Bp_q-eQSzGzxwoXUWHlzM3qaYF4s3YAXKcLKY6a\/s16000\/X-Recon%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33491,"url":"https:\/\/kalilinuxtutorials.com\/gungnir\/","url_meta":{"origin":31764,"position":5},"title":"Gungnir : Monitoring Certificate Transparency In Real-Time","author":"Varshini","date":"June 26, 2024","format":false,"excerpt":"Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL\/TLS certificates. Its primary purpose is to aid security researchers and penetration testers in discovering new domains and subdomains as soon as they are issued certificates, allowing for timely security testing. The\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtRwd_gJSHcsfqpduZv90HTEx50uqc1c-O7L1c_0-tWMy3TVwFj4yRRrjWxGLz8Pu_GP64mU1sZVaQXezGcZe7qqeUTwCiyNFZ87ydHcrsrm9SarzzCmCANHvTo-XZzxGUmVhP2d7ctChJDo4YaXjSlx24_7lFP8dyNFGTuxRmlH9LmUq2WA_te3hHj3jq\/s16000\/Gungnir%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31764"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31764\/revisions"}],"predecessor-version":[{"id":31766,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31764\/revisions\/31766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31769"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}