View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0000876 | Kali Linux | New Tool Requests | public | 2014-01-08 21:48 | 2020-03-18 17:52 |
Reporter | jnieto | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | have not tried |
Status | closed | Resolution | suspended | ||
Summary | 0000876: Parsero - The tool to audit the Robots.txt automatically | ||||
Description | Parsero is a free script written in Python which read the Robots.txt file of a web server and look at the Disallow entries in order to connect with them. Parsero prints if they are available or not. This tool is really faster and help you out when you are auditing a website trying to locate files or directories on a web server which have been hidden to the search engines by the web administrators. I haven't found any similar tool to achieve this goal. I would be really happy if you consider to try this tool. You can get the latest version here: https://github.com/behindthefirewalls/Parsero More info: http://www.behindthefirewalls.com/2013/12/parsero-tool-to-audit-robotstxt.html Please, let my know a feedback and if you want a real approach with real examples. | ||||
Additional Information | Python3 and Urllib3 is needed. | ||||
Attached Files | |||||
That the administrator write a robots.txt, it doesn't mean that the files or direcotories typed in this file will not be indexed by Bing, Google, Yahoo.. Now Parsero is capable of searching in Bing to locate content indexed whithout the web administrator authorization!!! |
|
Update: Some times the links indexed by Bing are available and sometimes not, now Parsero check each one (in the first Bing results page) in order to print out if they are available or not. |
|
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
$ parsero -h usage: parsero.py [-h] [-u URL] [-o] [-sb] optional arguments: Example root@kali:~# parsero -u www.example.com -sb |
|
Please could you git tag your release? |
|
No update upstream from 2014 |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2014-01-08 21:48 | jnieto | New Issue | |
2014-02-10 12:39 | jnieto | File Added: Parsero_v06_Kali_1.PNG | |
2014-02-10 12:39 | jnieto | File Added: Parsero_v06_Kali_2.PNG | |
2014-02-10 12:41 | jnieto | Note Added: 0001510 | |
2014-05-09 08:42 | jnieto | Note Added: 0001768 | |
2014-05-09 08:43 | jnieto | File Added: Parsero_v071.png | |
2014-05-12 17:16 |
|
Issue cloned: 0001195 | |
2014-06-04 15:19 |
|
Issue cloned: 0001382 | |
2018-01-29 15:08 | g0tmi1k | Note Added: 0008447 | |
2018-01-29 21:08 | jnieto | Note Added: 0008554 | |
2018-01-30 10:20 | g0tmi1k | Note Added: 0008569 | |
2018-05-08 08:56 | g0tmi1k | Summary | Parsero: The tool to audit the Robots.txt automatically => Parsero - The tool to audit the Robots.txt automatically |
2019-12-09 13:30 | g0tmi1k | Severity | minor => feature |
2020-03-18 17:52 | g0tmi1k | Status | new => closed |
2020-03-18 17:52 | g0tmi1k | Resolution | open => suspended |
2020-03-18 17:52 | g0tmi1k | Note Added: 0012459 |