csprecon
Discover new target domains using Content Security Policy
Coded with π by edoardottt
Share on Twitter!
Install β’
Get Started β’
Examples β’
Changelog β’
Contributing β’
License
Install π‘
go install github.com/edoardottt/csprecon/cmd/csprecon@latest
Get Started π
Usage:
csprecon [flags]
Flags:
INPUT:
-u string Input domain
-l string File containing input domains
CONFIGURATIONS:
-d string[] Filter results belonging to these domains (comma separated)
-c int Concurrency level (default 100)
-t int Connection timeout in seconds (default 10)
OUTPUT:
-o string File to write output results
-v Verbose output
-s Print only results
Examples π‘
Grab all possible results from single domain
csprecon -u https://www.github.com
Grab all possible results from a list of domains (protocols needed!)
csprecon -l targets.txt
echo targets.txt | csprecon
Grab all possible results belonging to a specific target(s) from a list of domains (protocols needed!)
echo targets.txt | csprecon -d google.com
Changelog π
Detailed changes for each release are documented in the release notes.
Contributing π
Just open an issue / pull request.
Before opening a pull request, download golangci-lint and run
golangci-lint run
If there aren't errors, go ahead :)
License π
This repository is under MIT License.
edoardoottavianelli.it to contact me.