Parshu icon indicating copy to clipboard operation
Parshu copied to clipboard

Filter URLs to save your time.


Parshu logo

Filter URLs to save your time using regex


Parshu usage


Parshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.

Inspired from tomnomnom's gf tool

Features

  • You can also add your custom regex to get results
  • Filter out all the query parameters which you use to check vulnerabilities

Installation

$ pip3 install parshu
$ wget -O parshu https://raw.githubusercontent.com/R0X4R/Parshu/main/parshu.py -q && chmod +x parshu && mv parshu /usr/bin/

Usage

Parshu usage

  • For linux, unix and debian based systems

    $ waybackurls sub.domain.tld | parshu
    
    http://sub.domain.tld/wvstests/
    http://sub.domain.tld/wvstests/pmwiki_2_1_19
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
    
  • For windows based systems

    cmd> type urls.txt | python3 parshu.py
    
  • If no arguments passed

    $ waybackurls sub.domain.tld | parshu
    
    http://sub.domain.tld/wvstests/
    http://sub.domain.tld/wvstests/pmwiki_2_1_19
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts
    http://sub.domain.tld/wvstests/pmwiki_2_1_19/scripts/
    
  • To filter out the results for xss

    Note: To get parameters for other vulnerabilites use other arguments. To get all the arguments use parshu -h

    $ waybackurls testphp.vulnweb.com | parshu -x
    
    http://testphp.vulnweb.com/artists.php?artist=1
    http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg
    http://testphp.vulnweb.com/showimage.php?file=./pictures/1.jpg&size=160
    

Donate

If this tool helped you or you like my work

Donate Now