Discover new target domains using Content Security Policy
💙 by edoardottt
Coded with
Install • Get Started • Examples • Changelog • Contributing • License
📡
Install Using Snap
sudo snap install csprecon
Using Go
go install github.com/edoardottt/csprecon/cmd/csprecon@latest
🎉
Get Started Usage:
csprecon [flags]
Flags:
INPUT:
-u, -url string Input domain
-l, -list string File containing input domains
-cidr Interpret input as CIDR
CONFIGURATIONS:
-d, -domain string[] Filter results belonging to these domains (comma separated)
-c, -concurrency int Concurrency level (default 50)
-t, -timeout int Connection timeout in seconds (default 10)
OUTPUT:
-o, -output string File to write output results
-v, -verbose Verbose output
-s, -silent Silent output. Print only results
💡
Examples Grab all possible results from single domain
csprecon -u https://www.github.com
echo https://www.github.com | csprecon
Grab all possible results from a list of domains (protocols needed!)
csprecon -l targets.txt
cat targets.txt | csprecon
Grab all possible results belonging to specific target(s) from a list of domains (protocols needed!)
cat targets.txt | csprecon -d google.com
Grab all possible results from single CIDR
csprecon -u 192.168.1.0/24 -cidr
📌
Changelog Detailed changes for each release are documented in the release notes.
🛠
Contributing Just open an issue / pull request.
Before opening a pull request, download golangci-lint and run
golangci-lint run
If there aren't errors, go ahead :)
📰
In the news
📝
License This repository is under MIT License.
edoardoottavianelli.it to contact me.