Skip to content

Latest commit

 

History

History
75 lines (56 loc) · 2.92 KB

README.md

File metadata and controls

75 lines (56 loc) · 2.92 KB

VALRADAR

Warning

This tool is in a beta state, although little changes are to be expected proceed with caution.

valradar icon

Contributors Forks Stargazers Issues License

demo.mp4

Valradar is an offensive security tool designed to enable security researchers to quickly look for certain values en-masse using regex.

The following types of uses are currently supported:

  • Webpages
  • Executables (planned)

Usage

Usage: valradar --site=STRING --pattern=STRING [flags]

Search for patterns and strings over a website's footprint

Flags:
  -h, --help                    Show context-sensitive help.
  -s, --site=STRING             The website to scan
  -d, --depth=1                 How deep to search
  -c, --concurrency=10          How many coroutines to use
  -p, --pattern=STRING          The regex pattern to try matching
      --use-headless-browser    Use a headless chrome browser to fetch the webpages

Scanning a website can be done as follows:

go run . --site https://facebook.com --pattern "(M|m)eta"

To improve results on websites with a lot of javascript, use a headless browser. NOTE: THIS REQUIRES PLAYWRIGHT DEPENDENCIES TO BE INSTALLED

go run . --site https://facebook.com --pattern "(M|m)eta" --use-headless-browser

To improve performance, increase concurrency but be aware that this value is dependent on the performance of the computer running it.

go run . --site https://facebook.com --pattern "(M|m)eta" -c 25 --use-headless-browser

To search deeper into a website, set the depth option to a number you desire. The behaviour is for the program to scan further into reconvered links for each increase of the depth number

go run . --site https://facebook.com --pattern "(M|m)eta" -c 25 --use-headless-browser -d 20