Skip to content

Passively fingerprint web applications based on their URLs

Notifications You must be signed in to change notification settings

urbanski/kidole

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Kidole - a url fingerprinting tool
=========
Kidole is a passive URL fingerprinting tool. It attempts to passively identify web applications, web services, and systems that may be running on a web server by fingerprinting URLs that have been recorded. Kidole is passive and will not query or make requests from a web service. Kidole is helpful for identifying the types of services that are being requested, or are being probed for. For example, using a network monitoring platform you can record all inbound HTTP requests that result in HTTP 200 OK. These could then be analyzed with Kidole to determine if any well known web applications are being accessed.

Kidole supports python regular expressions.

usage
=======

cat urls.lst | kidole

kidole -f urls.lst

kidole --sig-list


authors
=======
will urbanski <[email protected]>

Some fingerprints came from:
Yokoso <yokoso.inguardians.com>
FuzzDB <code.google.com/p/fuzzdb>

About

Passively fingerprint web applications based on their URLs

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages