
Fast golang web crawler for gathering URLs and JavaScript file locations. This is basically a simple implementation of the awesome Gocolly library.
Example usages
Single URL:
echo https://google.com | hakrawler
Multiple URLs:
cat urls.txt | hakrawler
Timeout for each line of stdin after 5 seconds:
cat urls.txt | hakrawler -timeout 5
Send all requests through a proxy:
cat urls.txt | hakrawler -proxy http://localhost:8080
Include subdomains:
echo https://google.com | hakrawler -subs
Note: a common issue is that the tool returns no URLs. This usually happens when a domain is specified (https://example.com), but it redirects to a subdomain (https://www.example.com). The subdomain is not included in the scope, so the no URLs are printed. In order to overcome this, either specify the final URL in the redirect chain or use the
-subs
option to include subdomains.
Example toolchain
Get all subdomains of google, find the ones that respond to http(s), and crawl them all.
echo google.com | haktrails subdomains | httpx | hakrawler
Installation
Normal Install
First, you'll need to install go.
Then run this command to download + compile hakrawler:
go install github.com/hakluke/[email protected]
You can now run ~/go/bin/hakrawler
. If you'd like to just run hakrawler
without the full path, you'll need to export PATH="~/go/bin/:$PATH"
. You can also add this line to your ~/.bashrc
file if you'd like this to persist.
Docker Install (from dockerhub)
echo https://www.google.com | docker run --rm -i hakluke/hakrawler:v2 -subs
Local Docker Install
It's much easier to use the dockerhub method above, but if you'd prefer to run it locally:
git clone https://github.com/hakluke/hakrawler
cd hakrawler
docker build -t hakluke/hakrawler .
docker run --rm -i hakluke/hakrawler --help
Kali Linux: Using apt
sudo apt install hakrawler
Then, to run hakrawler:
echo https://www.google.com | docker run --rm -i hakluke/hakrawler -subs
Command-line options
Usage of hakrawler:
-d int
Depth to crawl. (default 2)
-h string
Custom headers separated by two semi-colons. E.g. -h "Cookie: foo=bar;;Referer: http://example.com/"
-insecure
Disable TLS verification.
-json
Output as JSON.
-proxy string
Proxy URL. E.g. -proxy http://127.0.0.1:8080
-s Show the source of URL based on where it was found. E.g. href, form, script, etc.
-size int
Page size limit, in KB. (default -1)
-subs
Include subdomains for crawling.
-t int
Number of threads to utilise. (default 8)
-timeout int
Maximum time to crawl each URL from stdin, in seconds. (default -1)
-u Show only unique urls.
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky