JSFScan.sh
JSFScan.sh copied to clipboard
Automation for javascript recon in bug bounty.
Hi I've noticed, that JS urls with & in the url, can break out the JSLinkfinder.py script, This is because the interlace command is like so ``` interlace -tL live_jsfile_links.txt...
Added ' escape around _target_, to avoid the Interlace -c command breaking out with &, as it is directly input to the cmdline.

root@latestkali:~/tools/JSFScan.sh# ./JSFScan.sh -f /root/sites/js.txt --all _______ ______ _______ ______ _ (_______/ _____(_______/ _____) | | _ ( (____ _____ ( (____ ____ _____ ____ ___| |__ _ | | \____...
./JSFScan.sh -e -e -s -m -w -v -l /root/httpx1.txt -r [+] Started gathering Endpoints Traceback (most recent call last): File "/usr/bin/interlace", line 33, in sys.exit(load_entry_point('Interlace==1.9.5', 'console_scripts', 'interlace')()) File "/usr/bin/interlace", line...
I installed golang and ran install.sh, when i run the command: ./JSFScan.sh -l target.txt --all -r -o Scan It gives a bunch of error than generates a report which dosent...
Please can you add xnlinkfinder by @xnl-h4ck3r