Parshu
Parshu copied to clipboard
Filter URLs to save your time.
Filter URLs to save your time using regex
Parshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.
Inspired from tomnomnom's gf tool
Features
- You can also add your custom regex to get results
- Filter out all the query parameters which you use to check vulnerabilities
Installation
$ pip3 install parshu
$ wget -O parshu https://raw.githubusercontent.com/R0X4R/Parshu/main/parshu.py -q && chmod +x parshu && mv parshu /usr/bin/
Usage
-
For
linux
,unix
anddebian
based systems$ waybackurls sub.domain.tld | parshu http://sub.domain.tld/wvstests/ http://sub.domain.tld/wvstests/pmwiki_2_1_19 http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
-
For
windows
based systemscmd> type urls.txt | python3 parshu.py
-
If
no arguments
passed$ waybackurls sub.domain.tld | parshu http://sub.domain.tld/wvstests/ http://sub.domain.tld/wvstests/pmwiki_2_1_19 http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
-
To filter out the results for xss
Note: To get parameters for other vulnerabilites use other arguments. To get all the arguments use
parshu -h
$ waybackurls testphp.vulnweb.com | parshu -x http://testphp.vulnweb.com/artists.php?artist=1 http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg&size=160
Donate
If this tool helped you or you like my work