README
ΒΆ
ββββββββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββ
Next-generation parameter discovery framework for security researchers and bug bounty hunters
Leverages high-concurrency Go routines to discover vulnerable parameters from 5 historical data sources
Installation β’ Usage β’ Features β’ Patterns β’ Examples
π― Highlights
| Feature | Description |
|---|---|
| π Performance | -33% faster scans, -30% memory usage, +50% more URLs discovered |
| π 5 Data Sources | Wayback, CommonCrawl (3 indices), URLScan, AlienVault (paginated), VirusTotal |
| π Live Statistics | Real-time tracking: total/unique/filtered URLs, scan duration |
| π― 6 GF Patterns | SSRF, XSS, SQLi, LFI, RCE, Open Redirect detection |
| β‘ Smart Filtering | Min params filter, verbose mode, FUZZ injection |
| π Enterprise Ready | Proxy/TOR support, JSON export, atomic counters |
β‘ Features
Core Capabilities
- Multi-Source Intelligence - Aggregates from Wayback Machine, CommonCrawl (3 indices), URLScan.io, AlienVault OTX (5 pages), and VirusTotal
- Smart Deduplication - Fingerprints Host + Path + Parameter Keys to prevent redundant fuzzing
- Real-Time Statistics - Live tracking of total URLs, unique entries, filtered results, and scan duration
- FUZZ Injection - Native
FUZZplaceholder support for ffuf, nuclei, Burp Suite integration - Enhanced GF Patterns - Pre-configured filters for SSRF, XSS, SQLi, LFI, RCE, and Open Redirect
- Parameter Filtering - Set minimum parameter thresholds to focus on complex endpoints
- Verbose Mode - Display parameter counts for instant endpoint complexity visibility
Performance Features
- Atomic Counters - Lock-free statistics tracking with zero contention
- Optimized Buffering - 128KB scanner buffer, 131KB file writer buffer
- Intelligent Rate Limiting - 50 req/s default, configurable up to 200+ req/s
- High Concurrency - 100 threads default, supports 200+ for maximum speed
- Memory Efficient - Preallocated builders/slices, -25% GC pressure
Enterprise Features
- Proxy Support - HTTP/SOCKS5 proxy configuration
- TOR Integration - Built-in TOR routing (socks5://127.0.0.1:9050)
- Structured Output - JSONL export with full metadata
- Silent Mode - URLs-only output for pipeline integration
- Custom Timeouts - Configurable HTTP timeout (10-120s)
π οΈ Installation
Requirements
- Go 1.21+ (recommended: Go 1.22+)
Quick Install
go install github.com/INTELEON404/parafinder@latest
Manual Build
git clone https://github.com/INTELEON404/parafinder.git
cd parafinder
go build -ldflags="-s -w" -o parafinder main.go
chmod +x parafinder
Binary Downloads
Download pre-compiled binaries from Releases
π Usage
Basic Scan
parafinder -d example.com
Output:
[Wayback] https://api.example.com/user?token=abc&id=123
[CommonCrawl] https://example.com/search?q=test&lang=en
[VirusTotal] https://example.com/api?key=secret
[+] Scan Complete
Total URLs: 45823
Unique: 12456
Filtered: 12456
Duration: 2m34s
Advanced Filtering
./parafinder -d target.com -t 150 -gf ssrf -mp 2 -o ssrf_targets.txt
./parafinder -d example.com -v -gf xss
./parafinder -d target.com -fuzz -gf sqli -silent | nuclei -t sqli/
Multi-Target Scanning
cat domains.txt | ./parafinder -fuzz -json -o output.json
subfinder -d example.com -silent | ./parafinder -t 150 -gf lfi
Stealth Operations
parafinder -d target.com --tor -silent
./parafinder -d target.com -proxy socks5://127.0.0.1:1080 -timeout 90
π Command Line Options
| Flag | Description | Default |
|---|---|---|
-d |
Single target domain | - |
-o |
Output file path | Stdout |
-t |
Concurrent threads | 100 |
-rl |
Rate limit per second | 50 |
-timeout |
HTTP timeout in seconds | 45 |
-mp |
Minimum parameters required | 0 |
-gf |
Filter by pattern (ssrf,xss,sqli,lfi,rce,redirect) | - |
-fuzz |
Replace parameter values with FUZZ | false |
-json |
Output results in JSONL format | false |
-silent |
Silent mode (URLs only, no banner/stats) | false |
-v |
Verbose output (show param counts) | false |
-proxy |
Custom proxy (http://... or socks5://...) | - |
-tor |
Route traffic via TOR | false |
π Vulnerability Filters (GF Patterns)
| Pattern | Vulnerability Type | Key Parameters |
|---|---|---|
ssrf |
Server-Side Request Forgery | url, callback, dest, uri, host, redirect, target, next, view, file, path, continue, return, data, reference, site, html, navigate |
xss |
Cross-Site Scripting | q, s, search, id, lang, keyword, query, input, term, text, msg, name, p, page, comment, title, data, content, val |
sqli |
SQL Injection | id, select, report, update, query, sort, limit, page, user, pass, pwd, order, by, where, table, column, search, cat |
lfi |
Local File Inclusion | file, document, folder, root, path, pg, style, pdf, template, php_path, doc, page, name, cat, dir, action, board, date, detail, download, prefix, include, inc, locate, show, site, type, view, content, layout, mod, conf |
rce |
Remote Code Execution | cmd, exec, command, execute, ping, query, jump, code, reg, do, func, arg, option, load, process, step, read, function, req, feature, exe, module, payload, run, print, daemon |
redirect |
Open Redirect | url, uri, redirect, next, target, rurl, dest, destination, redir, redirect_uri, redirect_url, return, returnTo, return_to, checkout_url, continue, return_path, image_url, go, out, view, dir, show, navigation, path, reference, site |
Usage:
./parafinder -d example.com -gf lfi -mp 2 -v
π Output Formats
Standard Output
[Wayback] https://api.example.com/v1/user?token=abc&id=123
[CommonCrawl] https://example.com/search?q=test&lang=en
[URLScan] https://example.com/redirect?url=http://evil.com
Verbose Mode (-v)
[Wayback] [2 params] https://api.example.com/v1/user?token=abc&id=123
[URLScan] [3 params] https://example.com/api?key=x&id=1&format=json
[VirusTotal] [5 params] https://example.com/search?a=1&b=2&c=3&d=4&e=5
JSONL Format (-json)
{"timestamp":"2026-01-20T12:00:00Z","source":"Wayback","url":"https://api.example.com/user?token=secret","host":"api.example.com","param_count":1}
{"timestamp":"2026-01-20T12:00:01Z","source":"CommonCrawl","url":"https://example.com/search?q=test&lang=en","host":"example.com","fuzzed":"https://example.com/search?q=FUZZ&lang=FUZZ","param_count":2}
Statistics Summary
[+] Scan Complete
Total URLs: 45823
Unique: 12456
Filtered: 3421
Duration: 2m34s
π‘ Pro Tips
1. Rate Limiting Strategy
parafinder -d target.com -rl 100 -t 200 -timeout 20
parafinder -d target.com -rl 20 -t 50 -timeout 90
2. Thread Tuning
parafinder -d target.com -t 200 -rl 150
parafinder -d target.com -t 50 -rl 30
3. FUZZ Integration
parafinder -d target.com -fuzz -gf xss -silent | ffuf -u FUZZ -w payloads.txt
parafinder -d target.com -fuzz -gf ssrf -silent | nuclei -t ssrf/ -silent -o results.txt
4. Parameter Complexity Filtering
# Focus on endpoints with 3+ parameters
./parafinder -d target.com -mp 3 -v
# Complex SQLi targets only
./parafinder -d target.com -gf sqli -mp 4 -o sqli_complex.txt
5. Multi-Target Workflows
# Subdomain enumeration pipeline
subfinder -d example.com -silent | ./parafinder -t 150 -gf sqli -o all_sqli.txt
# Multiple domains from file
cat targets.txt | ./parafinder -fuzz -json -o all_params.json
6. Pattern Combination
parafinder -d target.com -gf ssrf -o ssrf.txt
parafinder -d target.com -gf redirect -o redirect.txt
for pattern in ssrf xss sqli lfi rce redirect; do
./parafinder -d target.com -gf $pattern -o ${pattern}_targets.txt
done
π Workflow Integration
With Nuclei
./parafinder -d target.com -fuzz -gf ssrf -silent | nuclei -t ssrf/ -silent
With FFUF
./parafinder -d target.com -fuzz -silent | ffuf -u FUZZ -w payloads.txt -mc 200,301,302
With httpx
./parafinder -d target.com -silent | httpx -status-code -title -tech-detect -o alive.txt
With qsreplace
./parafinder -d target.com -silent | qsreplace "PAYLOAD" | nuclei -t cves/
With gau
echo "example.com" | gau | qsreplace FUZZ > gau_urls.txt
./parafinder -d example.com -fuzz -silent > parafinder_urls.txt
cat gau_urls.txt parafinder_urls.txt | sort -u | nuclei -t fuzzing/
π Performance Benchmarks
Test Environment: AMD Ryzen 9 5950X, 32GB RAM, 1Gbps fiber
Target: Large e-commerce site (150k+ archived URLs)
| Metric | v3.7 | v3.8 | Improvement |
|---|---|---|---|
| Scan Time | 8m 42s | 5m 51s | -33% β‘ |
| URLs Found | 12,456 | 18,723 | +50% π |
| Memory Peak | 284 MB | 198 MB | -30% πΎ |
| CPU Usage | 68% | 52% | -24% βοΈ |
| Filtered Results | 3,421 | 5,234 | +53% π― |
π Changelog
v3.8 (Latest - Jan 20, 2026)
- β New: VirusTotal provider (5th data source)
- β New: Real-time statistics dashboard
- β New: LFI, RCE, Open Redirect GF patterns
- β
New: Minimum parameters filter (
-mp) - β
New: Verbose mode with param counts (
-v) - β
New: Configurable timeout (
-timeout) - β‘ Performance: Multiple CommonCrawl indices (3x coverage)
- β‘ Performance: AlienVault pagination (10x more URLs)
- β‘ Performance: Optimized buffering (128KB scanner, 131KB writer)
- β‘ Performance: Atomic statistics (lock-free counters)
- β‘ Performance: Enhanced defaults (100 threads, 50 req/s)
- π Fixed: Race condition in stats tracking
- π Fixed: Buffer overflow on large datasets
- π Fixed: Context cancellation propagation
v3.7 (Initial Release)
- π First public release
- 4 data sources: Wayback, CommonCrawl, URLScan, AlienVault
- 3 GF patterns: SSRF, XSS, SQLi
- FUZZ injection support
- JSON/TXT output formats
π€ Contributing
Contributions are welcome! Please follow these steps:
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
Development Setup
git clone https://github.com/INTELEON404/parafinder.git
cd parafinder
go mod download
go test ./...
go build -o parafinder main.go
π― Roadmap (v2.1)
- Browser History Support - Parse Chrome/Firefox history databases
- HAR File Import - Analyze HAR files offline
- Custom Pattern Files - Load user-defined GF patterns
- SQLite Output - Structured database storage
- Distributed Scanning - Master-worker architecture
- REST API Mode - HTTP API for integrations
- ML Parameter Scoring - AI-powered vulnerability likelihood
- Burp Suite Extension - Native Burp integration
- GraphQL Support - Discover GraphQL endpoint parameters
- Wayback CDX API v2 - Enhanced Wayback queries
Vote on features: GitHub Discussions
βοΈ License
Distributed under the MIT License. See LICENSE for more information.
π€ Author
INTELEON404
π Acknowledgments
Special thanks to:
- @tomnomnom - Inspiration from
gftool - @projectdiscovery - Amazing security tools ecosystem
- Bug bounty community - Continuous testing and feedback
- All contributors and GitHub stargazers β
[!WARNING] This tool is for educational and authorized security testing purposes only.
The author is not responsible for any misuse or damage caused by this tool.
Always obtain proper authorization before testing any targets.
π Support the Project
If you find ParaFinder useful, please consider:
β Starring the repository
π¦ Sharing on social media
π€ Contributing to the project
β Buying me a coffee (Coming soon)
Made with β€οΈ for the bug bounty community
Documentation
ΒΆ
There is no documentation for this package.