csprecon
csprecon copied to clipboard
Discover new target domains using Content Security Policy
csprecon
Discover new target domains using Content Security Policy
Coded with 💙 by edoardottt
Install • Get Started • Examples • Changelog • Contributing • License
Install 📡
Using Snap
sudo snap install csprecon
Using Go
go install github.com/edoardottt/csprecon/cmd/csprecon@latest
Get Started 🎉
Usage:
csprecon [flags]
Flags:
INPUT:
-u, -url string Input domain
-l, -list string File containing input domains
-cidr Interpret input as CIDR
CONFIGURATIONS:
-d, -domain string[] Filter results belonging to these domains (comma separated)
-c, -concurrency int Concurrency level (default 50)
-t, -timeout int Connection timeout in seconds (default 10)
-rl, -rate-limit int Set a rate limit (per second)
OUTPUT:
-o, -output string File to write output results
-v, -verbose Verbose output
-s, -silent Silent output. Print only results
Examples 💡
Grab all possible results from single domain
csprecon -u https://www.github.com
echo https://www.github.com | csprecon
Grab all possible results from a list of domains (protocols needed!)
csprecon -l targets.txt
cat targets.txt | csprecon
Grab all possible results belonging to specific target(s) from a list of domains (protocols needed!)
cat targets.txt | csprecon -d google.com
Grab all possible results from single CIDR
csprecon -u 192.168.1.0/24 -cidr
Set a rate limit of 10 requests per second
cat targets.txt | csprecon -rl 10
Changelog 📌
Detailed changes for each release are documented in the release notes.
Contributing 🛠
Just open an issue / pull request.
Before opening a pull request, download golangci-lint and run
golangci-lint run
If there aren't errors, go ahead :)
In the news 📰
License 📝
This repository is under MIT License.
edoardoottavianelli.it to contact me.