Skip to content

Sterdam/InformationDisclosureScript

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Information Disclosure Script Automated information disclosure research tool.

Usage Instructions Start Burp Suite:

Begin by starting Burp Suite with the proxy enabled. Scan the Target:

Thoroughly explore the target application using Burp Suite. Filter the captured traffic to find all JavaScript (.js) files. Extract JavaScript URLs:

Collect all the URLs of the JavaScript files and save them into a file named jsLink.txt. Download JavaScript Files:

Download the JavaScript files using wget with the following command:

wget -P jsfiles -i jsLink.txt --user-agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36"

Tip: Use appropriate headers with wget to maximize the chances of downloading all files successfully.

Run the Disclosure Check:

Execute the script to check for dangerous disclosures:

python3 checkDangerousDisclosure.py >> result.txt

Find and Sort Keywords:

Run the script to find and sort keyword values: python3 findSortedKeywordValue.py

Manual Review:

Manually review the results to identify any sensitive information such as tokens, API keys, etc.

About

All about automated information disclosure research

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages