HTTP FILTER is a Bash tool designed to simplify the process of analyzing HTTP responses from a list of URLs. It was developed by YogSec to aid security researchers, penetration testers, and bug bounty hunters in quickly identifying interesting and anomalous HTTP responses.
When working with a large set of URLs, it can be time-consuming to manually inspect each response code. HTTP FILTER automates this task by concurrently sending HTTP requests to each URL and categorizing the responses into separate files based on their status codes. This tool is optimized for speed and efficiency, making it a valuable asset for anyone involved in cybersecurity.
- Concurrent processing of multiple URLs for speed.
- Categorizes URLs based on HTTP response codes (e.g., 200.txt, 404.txt, 500.txt).
- Failed requests are logged into a separate
failed.txt
file. - Outputs results into a directory named after the input file.
- Supports checking a single URL or processing a list of URLs.
- Color-coded terminal output for better visibility.
- Simple and easy-to-use interface.
Security researchers and penetration testers often deal with a massive number of URLs during reconnaissance and testing phases. Manually visiting each URL and checking HTTP responses is inefficient and error-prone. Identifying URLs with interesting or problematic responses like 500 Internal Server Error
or 403 Forbidden
can be crucial for detecting vulnerabilities. However, traditional methods can be slow and tedious.
HTTP FILTER automates this process by:
- Fetching HTTP responses concurrently using multiple processes.
- Logging URLs into separate files based on their HTTP response codes.
- Quickly identifying potentially vulnerable or misconfigured endpoints.
- Saving time and effort while improving accuracy.
./http_filter.sh [options]
-h
: Show help message-v
: Show version information-l <file>
: Process a list of URLs from a file-d <url>
: Check a single URL
./http_filter.sh -d https://example.com
./http_filter.sh -l urls.txt
This will create a directory urls_responses
and generate text files like:
200.txt
– Contains all URLs with 200 OK responses404.txt
– Contains all URLs with 404 Not Found responses500.txt
– Contains all URLs with 500 Internal Server Error responsesfailed.txt
– Contains all URLs that could not be reached
[200] https://example.com
[404] https://example.com/notfound
[500] https://example.com/servererror
[FAILED] https://example.com/timeout
- Bash
- curl
chmod +x http_filter.sh
Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:
🌐 Website: https://yogsec.github.io/yogsec/
📜 Linktree: https://linktr.ee/yogsec
🔗 GitHub: https://github.com/yogsec
💼 LinkedIn (Company): https://www.linkedin.com/company/yogsec/
📷 Instagram: https://www.instagram.com/yogsec.io/
🐦 Twitter (X): https://x.com/yogsec
👨💼 Personal LinkedIn: https://www.linkedin.com/in/cybersecurity-pentester/
📧 Email: abhinavsingwal@gmail.com
If you find our work helpful and would like to support us, consider buying us a coffee. Your support keeps us motivated and helps us create more awesome content. ❤️
☕ Support Us Here: https://buymeacoffee.com/yogsec
Developed by YogSec