
A powerful reconnaissance tool for offensive security testing, automating directory enumeration, historical URL discovery, and sensitive information detection.
ByteReaper is a Bash-based reconnaissance tool developed for offensive security enthusiasts and bug hunters. It automates directory and file enumeration, scrapes historical URLs, and hunts for sensitive data leaks on target domains. Leveraging tools like gobuster
, waybackurls
, and the Wayback Machine CDX API, it’s built to uncover hidden attack surfaces fast.
Warning: This tool is for educational purposes and authorized security testing only. Use it responsibly and only on targets you have explicit permission to scan.
- Directory Enumeration: Uses
gobuster
to brute-force directories and files with a customizable wordlist and extension set. - Historical URL Discovery: Pulls archived URLs from
waybackurls
and the Wayback Machine CDX API. - Sensitive Data Detection: Scans fetched content for secrets using patterns defined in
SecretHub.json
. - Pretty Output: Colorized with
lolcat
and a Matrix-style flourish because recon should look cool. - Robust Design: Handles missing tools gracefully and adapts to tricky server responses.
- Required Tools:
bash
,wget
,grep
,sed
,awk
,curl
(usually pre-installed)gobuster
: Directory enumeration enginewaybackurls
: Historical URL scraperhttpx
: URL validatorjq
: JSON parser forSecretHub.json
lolcat
: Output colorizertoilet
: Matrix effect
- Go: Needed to install
gobuster
,waybackurls
, andhttpx
if not already present.
-
Clone the Repository:
git clone https://github.com/manojshrestha/ByteReaper.git cd ByteReaper
-
Install Dependencies:
- Install Go:
sudo apt install golang # Debian/Ubuntu
- Install tools:
go install github.com/OJ/gobuster/v3@latest go install github.com/tomnomnom/waybackurls@latest go install github.com/projectdiscovery/httpx/cmd/httpx@latest sudo apt install jq lolcat toilet # Optional, for full experience
- Add Go bin to PATH:
echo 'export PATH=$PATH:~/go/bin' >> ~/.bashrc && source ~/.bashrc
- Install Go:
-
Set Permissions:
chmod +x ByteReaper.sh
-
Prepare:
- Provide a wordlist (e.g.,
/home/pwn/directory-list-2.3-medium.txt
).
- Provide a wordlist (e.g.,
-
Run the Tool:
./ByteReaper.sh
- Enter the target domain (e.g.,
example.com
). - Enter the path to your wordlist.
- Enter the target domain (e.g.,
-
Output:
- Results are saved in a folder named after the domain (e.g.,
example.com/
). - Key files:
gobuster.txt
,discovered_urls.txt
,secrets.csv
.
- Results are saved in a folder named after the domain (e.g.,
Create a SecretHub.json
file in the script directory to define patterns for sensitive data:
{
"flags": "-i",
"patterns": [
"api_key=[A-Za-z0-9_-]+",
"password=[^\\s]+",
"AWS_ACCESS_KEY_ID=[A-Za-z0-9]{20}"
]
}
flags
:grep
flags (e.g.,-i
for case-insensitive).patterns
: Regex patterns to match secrets.
$ ./ByteReaper.sh
Enter the domain: example.com
Enter path to wordlist: /home/user/directory-list-2.3-medium.txt
Output will include enumerated directories, historical URLs, and any secrets found in example.com/secrets.csv
.
ByteReaper is for authorized testing only. Unauthorized use may violate laws or terms of service.