During reconnaissance (recon) it is often helpful to get a quick overview of all the relative endpoints in a file. These days web applications have frontend pipelines that make it harder for humans to understand minified code. This tool contains a nifty regular expression to find and extract the relative URLs in such files. This can help surface new targets for security researchers to look at. It can also be used to periodically compare the results of the same file, to see which new endpoints have been deployed. History has shown that this is a goldmine for bug bounty hunters.
The tool only accepts input on
STDIN. Any command output can be piped into the file to extract relative URLs. To include an excerpt of the line it was matched in, use the
cat demo-file.js | ./extract.rb
cat demo-file.js | ./extract.rb --show-line
curl -s https://hackerone.com/hacktivity | ./extract.rb
... /vulnerability-coordination-maturity-model/user_data /mail_subscriptions/update_monthly_digest_subscription /subscription.json?subscribe=true /subscription.json?subscribe=false /terms/finder /resources/download-web-hacking-101 /settings/reputation/log /plugins/servlet/webhooks /secure/project/ViewProjects.jspa ...