parafinder

command module
v0.0.0-...-ceae300 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 20, 2026 License: MIT Imports: 19 Imported by: 0

README ΒΆ

Logo

Go Version Release License Twitter

β–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–€β–‘β–€β–ˆβ–€β–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–„β–‘β–ˆβ–€β–€β–‘β–ˆβ–€β–ˆ
β–‘β–ˆβ–€β–€β–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–„β–‘β–ˆβ–€β–ˆβ–‘β–ˆβ–€β–€β–‘β–‘β–ˆβ–‘β–‘β–ˆβ–‘β–ˆβ–‘β–ˆβ–‘β–ˆβ–‘β–ˆβ–€β–€β–‘β–ˆβ–€β–„
β–‘β–€β–‘β–‘β–‘β–€β–‘β–€β–‘β–€β–‘β–€β–‘β–€β–‘β–€β–‘β–€β–‘β–‘β–‘β–€β–€β–€β–‘β–€β–‘β–€β–‘β–€β–€β–‘β–‘β–€β–€β–€β–‘β–€β–‘β–€

Next-generation parameter discovery framework for security researchers and bug bounty hunters

Leverages high-concurrency Go routines to discover vulnerable parameters from 5 historical data sources

Installation β€’ Usage β€’ Features β€’ Patterns β€’ Examples


🎯 Highlights

Feature Description
πŸš€ Performance -33% faster scans, -30% memory usage, +50% more URLs discovered
πŸ” 5 Data Sources Wayback, CommonCrawl (3 indices), URLScan, AlienVault (paginated), VirusTotal
πŸ“Š Live Statistics Real-time tracking: total/unique/filtered URLs, scan duration
🎯 6 GF Patterns SSRF, XSS, SQLi, LFI, RCE, Open Redirect detection
⚑ Smart Filtering Min params filter, verbose mode, FUZZ injection
πŸ”’ Enterprise Ready Proxy/TOR support, JSON export, atomic counters

⚑ Features

Core Capabilities

  • Multi-Source Intelligence - Aggregates from Wayback Machine, CommonCrawl (3 indices), URLScan.io, AlienVault OTX (5 pages), and VirusTotal
  • Smart Deduplication - Fingerprints Host + Path + Parameter Keys to prevent redundant fuzzing
  • Real-Time Statistics - Live tracking of total URLs, unique entries, filtered results, and scan duration
  • FUZZ Injection - Native FUZZ placeholder support for ffuf, nuclei, Burp Suite integration
  • Enhanced GF Patterns - Pre-configured filters for SSRF, XSS, SQLi, LFI, RCE, and Open Redirect
  • Parameter Filtering - Set minimum parameter thresholds to focus on complex endpoints
  • Verbose Mode - Display parameter counts for instant endpoint complexity visibility

Performance Features

  • Atomic Counters - Lock-free statistics tracking with zero contention
  • Optimized Buffering - 128KB scanner buffer, 131KB file writer buffer
  • Intelligent Rate Limiting - 50 req/s default, configurable up to 200+ req/s
  • High Concurrency - 100 threads default, supports 200+ for maximum speed
  • Memory Efficient - Preallocated builders/slices, -25% GC pressure

Enterprise Features

  • Proxy Support - HTTP/SOCKS5 proxy configuration
  • TOR Integration - Built-in TOR routing (socks5://127.0.0.1:9050)
  • Structured Output - JSONL export with full metadata
  • Silent Mode - URLs-only output for pipeline integration
  • Custom Timeouts - Configurable HTTP timeout (10-120s)

πŸ› οΈ Installation

Requirements

Quick Install

go install github.com/INTELEON404/parafinder@latest

Manual Build

git clone https://github.com/INTELEON404/parafinder.git
cd parafinder
go build -ldflags="-s -w" -o parafinder main.go
chmod +x parafinder

Binary Downloads

Download pre-compiled binaries from Releases


πŸš€ Usage

Basic Scan

parafinder -d example.com

Output:

[Wayback] https://api.example.com/user?token=abc&id=123
[CommonCrawl] https://example.com/search?q=test&lang=en
[VirusTotal] https://example.com/api?key=secret

[+] Scan Complete
    Total URLs: 45823
    Unique: 12456
    Filtered: 12456
    Duration: 2m34s

Advanced Filtering

./parafinder -d target.com -t 150 -gf ssrf -mp 2 -o ssrf_targets.txt
./parafinder -d example.com -v -gf xss
./parafinder -d target.com -fuzz -gf sqli -silent | nuclei -t sqli/

Multi-Target Scanning

cat domains.txt | ./parafinder -fuzz -json -o output.json
subfinder -d example.com -silent | ./parafinder -t 150 -gf lfi

Stealth Operations

parafinder -d target.com --tor -silent
./parafinder -d target.com -proxy socks5://127.0.0.1:1080 -timeout 90

πŸ“‹ Command Line Options

Flag Description Default
-d Single target domain -
-o Output file path Stdout
-t Concurrent threads 100
-rl Rate limit per second 50
-timeout HTTP timeout in seconds 45
-mp Minimum parameters required 0
-gf Filter by pattern (ssrf,xss,sqli,lfi,rce,redirect) -
-fuzz Replace parameter values with FUZZ false
-json Output results in JSONL format false
-silent Silent mode (URLs only, no banner/stats) false
-v Verbose output (show param counts) false
-proxy Custom proxy (http://... or socks5://...) -
-tor Route traffic via TOR false

πŸ” Vulnerability Filters (GF Patterns)

Pattern Vulnerability Type Key Parameters
ssrf Server-Side Request Forgery url, callback, dest, uri, host, redirect, target, next, view, file, path, continue, return, data, reference, site, html, navigate
xss Cross-Site Scripting q, s, search, id, lang, keyword, query, input, term, text, msg, name, p, page, comment, title, data, content, val
sqli SQL Injection id, select, report, update, query, sort, limit, page, user, pass, pwd, order, by, where, table, column, search, cat
lfi Local File Inclusion file, document, folder, root, path, pg, style, pdf, template, php_path, doc, page, name, cat, dir, action, board, date, detail, download, prefix, include, inc, locate, show, site, type, view, content, layout, mod, conf
rce Remote Code Execution cmd, exec, command, execute, ping, query, jump, code, reg, do, func, arg, option, load, process, step, read, function, req, feature, exe, module, payload, run, print, daemon
redirect Open Redirect url, uri, redirect, next, target, rurl, dest, destination, redir, redirect_uri, redirect_url, return, returnTo, return_to, checkout_url, continue, return_path, image_url, go, out, view, dir, show, navigation, path, reference, site

Usage:

./parafinder -d example.com -gf lfi -mp 2 -v

πŸ“Š Output Formats

Standard Output

[Wayback] https://api.example.com/v1/user?token=abc&id=123
[CommonCrawl] https://example.com/search?q=test&lang=en
[URLScan] https://example.com/redirect?url=http://evil.com

Verbose Mode (-v)

[Wayback] [2 params] https://api.example.com/v1/user?token=abc&id=123
[URLScan] [3 params] https://example.com/api?key=x&id=1&format=json
[VirusTotal] [5 params] https://example.com/search?a=1&b=2&c=3&d=4&e=5

JSONL Format (-json)

{"timestamp":"2026-01-20T12:00:00Z","source":"Wayback","url":"https://api.example.com/user?token=secret","host":"api.example.com","param_count":1}
{"timestamp":"2026-01-20T12:00:01Z","source":"CommonCrawl","url":"https://example.com/search?q=test&lang=en","host":"example.com","fuzzed":"https://example.com/search?q=FUZZ&lang=FUZZ","param_count":2}

Statistics Summary

[+] Scan Complete
    Total URLs: 45823
    Unique: 12456
    Filtered: 3421
    Duration: 2m34s

πŸ’‘ Pro Tips

1. Rate Limiting Strategy

parafinder -d target.com -rl 100 -t 200 -timeout 20

parafinder -d target.com -rl 20 -t 50 -timeout 90

2. Thread Tuning

parafinder -d target.com -t 200 -rl 150

parafinder -d target.com -t 50 -rl 30

3. FUZZ Integration

parafinder -d target.com -fuzz -gf xss -silent | ffuf -u FUZZ -w payloads.txt

parafinder -d target.com -fuzz -gf ssrf -silent | nuclei -t ssrf/ -silent -o results.txt

4. Parameter Complexity Filtering

# Focus on endpoints with 3+ parameters
./parafinder -d target.com -mp 3 -v

# Complex SQLi targets only
./parafinder -d target.com -gf sqli -mp 4 -o sqli_complex.txt

5. Multi-Target Workflows

# Subdomain enumeration pipeline
subfinder -d example.com -silent | ./parafinder -t 150 -gf sqli -o all_sqli.txt

# Multiple domains from file
cat targets.txt | ./parafinder -fuzz -json -o all_params.json

6. Pattern Combination

parafinder -d target.com -gf ssrf -o ssrf.txt
parafinder -d target.com -gf redirect -o redirect.txt

for pattern in ssrf xss sqli lfi rce redirect; do
  ./parafinder -d target.com -gf $pattern -o ${pattern}_targets.txt
done

πŸ”„ Workflow Integration

With Nuclei

./parafinder -d target.com -fuzz -gf ssrf -silent | nuclei -t ssrf/ -silent

With FFUF

./parafinder -d target.com -fuzz -silent | ffuf -u FUZZ -w payloads.txt -mc 200,301,302

With httpx

./parafinder -d target.com -silent | httpx -status-code -title -tech-detect -o alive.txt

With qsreplace

./parafinder -d target.com -silent | qsreplace "PAYLOAD" | nuclei -t cves/

With gau

echo "example.com" | gau | qsreplace FUZZ > gau_urls.txt
./parafinder -d example.com -fuzz -silent > parafinder_urls.txt
cat gau_urls.txt parafinder_urls.txt | sort -u | nuclei -t fuzzing/

πŸ“ˆ Performance Benchmarks

Test Environment: AMD Ryzen 9 5950X, 32GB RAM, 1Gbps fiber
Target: Large e-commerce site (150k+ archived URLs)

Metric v3.7 v3.8 Improvement
Scan Time 8m 42s 5m 51s -33% ⚑
URLs Found 12,456 18,723 +50% πŸ“ˆ
Memory Peak 284 MB 198 MB -30% πŸ’Ύ
CPU Usage 68% 52% -24% βš™οΈ
Filtered Results 3,421 5,234 +53% 🎯

πŸ“ Changelog

v3.8 (Latest - Jan 20, 2026)

  • βœ… New: VirusTotal provider (5th data source)
  • βœ… New: Real-time statistics dashboard
  • βœ… New: LFI, RCE, Open Redirect GF patterns
  • βœ… New: Minimum parameters filter (-mp)
  • βœ… New: Verbose mode with param counts (-v)
  • βœ… New: Configurable timeout (-timeout)
  • ⚑ Performance: Multiple CommonCrawl indices (3x coverage)
  • ⚑ Performance: AlienVault pagination (10x more URLs)
  • ⚑ Performance: Optimized buffering (128KB scanner, 131KB writer)
  • ⚑ Performance: Atomic statistics (lock-free counters)
  • ⚑ Performance: Enhanced defaults (100 threads, 50 req/s)
  • πŸ› Fixed: Race condition in stats tracking
  • πŸ› Fixed: Buffer overflow on large datasets
  • πŸ› Fixed: Context cancellation propagation

v3.7 (Initial Release)

  • πŸŽ‰ First public release
  • 4 data sources: Wayback, CommonCrawl, URLScan, AlienVault
  • 3 GF patterns: SSRF, XSS, SQLi
  • FUZZ injection support
  • JSON/TXT output formats

🀝 Contributing

Contributions are welcome! Please follow these steps:

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Development Setup

git clone https://github.com/INTELEON404/parafinder.git
cd parafinder
go mod download
go test ./...
go build -o parafinder main.go

🎯 Roadmap (v2.1)

  • Browser History Support - Parse Chrome/Firefox history databases
  • HAR File Import - Analyze HAR files offline
  • Custom Pattern Files - Load user-defined GF patterns
  • SQLite Output - Structured database storage
  • Distributed Scanning - Master-worker architecture
  • REST API Mode - HTTP API for integrations
  • ML Parameter Scoring - AI-powered vulnerability likelihood
  • Burp Suite Extension - Native Burp integration
  • GraphQL Support - Discover GraphQL endpoint parameters
  • Wayback CDX API v2 - Enhanced Wayback queries

Vote on features: GitHub Discussions


βš–οΈ License

Distributed under the MIT License. See LICENSE for more information.


πŸ‘€ Author

INTELEON404

GitHub Twitter


πŸ™ Acknowledgments

Special thanks to:

  • @tomnomnom - Inspiration from gf tool
  • @projectdiscovery - Amazing security tools ecosystem
  • Bug bounty community - Continuous testing and feedback
  • All contributors and GitHub stargazers ⭐

[!WARNING] This tool is for educational and authorized security testing purposes only.
The author is not responsible for any misuse or damage caused by this tool.
Always obtain proper authorization before testing any targets.


πŸ’ Support the Project

If you find ParaFinder useful, please consider:

⭐ Starring the repository
🐦 Sharing on social media
🀝 Contributing to the project
β˜• Buying me a coffee (Coming soon)


Made with ❀️ for the bug bounty community

Documentation ΒΆ

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL