Skip to content

Multi-source URL discovery & live host probing for bug bounty and red team recon

License

Notifications You must be signed in to change notification settings

alhamrizvi-cloud/urlx

Repository files navigation

image

urlX — Multi‑Source URL Discovery Tool

Go Version Stars Forks Issues Last Commit Code Size Top Language

🔍 Overview (Resume)

urlX is a high-performance reconnaissance tool designed for bug bounty hunters, penetration testers, and security researchers.

It combines:

  • Passive URL discovery from 11+ intelligence sources
  • Live host probing (DNS, TCP, TLS, HTTP)
  • Active web crawling for hidden endpoints
  • Smart file & extension filtering
  • Fast, concurrent processing using Go routines

urlX helps you quickly discover attack surface, hidden assets, and live endpoints with minimal setup.

Built for speed, scale, and real-world recon workflows.

Created by Alham Rizvi


🚀 Installation Guide

Requirements

  • Go 1.19 or higher
  • Linux / macOS (Windows supported with Go environment)
  • Internet access for passive sources

Verify Go installation:

go version

🔹 Method 1: Go Install (Recommended)

go install github.com/alhamrizvi-cloud/urlx@latest

Make sure $GOPATH/bin is in your PATH:

export PATH=$PATH:$(go env GOPATH)/bin

Verify:

urlx -h

🔹 Method 2: Build From Source

git clone https://github.com/alhamrizvi-cloud/urlx.git
cd urlx
go build -o urlx main.go

Move binary system-wide (optional):

sudo mv urlx /usr/local/bin/

Verify:

urlx -h

🔹 Method 3: Quick Install Script

curl -sSfL https://raw.githubusercontent.com/alhamrizvi-cloud/urlx/main/install.sh | sh

🔹 Method 4: Docker

docker build -t urlx .
docker run --rm urlx -h

🔑 Optional API Keys (Enhance Results)

urlX works without API keys, but adding them increases coverage and accuracy.

Supported providers:

  • URLScan.io
  • AlienVault OTX
  • VirusTotal
  • GitHub
  • Censys
  • SecurityTrails

Keys can be passed via CLI flags or environment variables.


⚠️ Disclaimer

This tool is intended only for authorized security testing and legal research.

You are responsible for ensuring you have explicit permission before scanning any target.

Misuse may be illegal.


📄 License

MIT License – see LICENSE


🤝 Contributing

Pull requests, feature ideas, and source additions are welcome. See CONTRIBUTING.md.


⭐ Support the Project

If you find urlX useful, please consider giving it a ⭐ on GitHub.

👉 https://github.com/alhamrizvi-cloud/urlx


Built with ❤️ by Alham Rizvi Happy Hunting 🎯