QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or Subdomains.
Compatible with other tools like Subfinder, waybackurls, sublist3r:
subfinder -d target.com -silent > subdomains.txt && echo target.com | waybackurls > urls.txt
./quester.sh -all urls.txt
./quester.sh -subdomains subdomains.txt
<------------>
< QU35T3R > Author: Febin. Twitter: twitter.com/febinrev
<------------>
Usage:
./quester.sh -h #Help Message
./quester.sh [options] <wordlist>
./quester.sh -all urls.txt # crawls over the given URLs and prints status
./quester.sh all urls.txt
./quester.sh -match-code <status_code> urls.txt # Matches URLs according to the given http status code
./quester.sh -match-length <Length> urls.txt # Matches URLs according to the Content Length
./quester.sh -endpoints urls.txt # Extracts Endpoints from Given URLs
./quester.sh -endpoints -url http://target.com/index # Extracts Endpoints from Given URL
./quester.sh -subdomains subdomains.txt # Extracts Valid SubDomains, Compatible with subfinder
./quester.sh -parameters urls.txt # Extracts Input Parameters from the given list of URLs
./quester.sh -parameters -url http://target.com/index # Extracts Parameters from the given URL
./quester.sh -shodan domains.txt # Searches the domains in Shodan database
./quester.sh -shodan -domain target.com # Searches the given domain in Shodan
./quester.sh -cms <url> # Detects the CMS of given URL
------------------------------------------------------------------------------------------------------------------------------------------------
Examples: