Installation of GF tool and its different patterns

Santosh Bobade
3 min readDec 6, 2022

--

Today we will discuss how to install gf tool and different patterns

GF tool is used for filtering the collected URLs according to our need

If I do some spelling or grammatical mistakes please ignore them.

If you want to read my previous blogs I have mentioned the links

My previous blogs

Go language must be present in your system

To install go language use the following command

┌──(root💀kali)-[~/Desktop]
└─# apt install golang

for checking the version use the following command

┌──(root💀kali)-[~/Desktop]
└─# go version

Installation of tools

go install github.com/tomnomnom/gf@latest
go install github.com/tomnomnom/waybackurls@latest
go install github.com/bp0lr/gauplus@latest
go install github.com/lc/gau/v2/cmd/gau@latest

create a hidden directory in root directory using the following command

┌──(root💀kali)-[~/Desktop]
└─# cd

┌──(root💀kali)-[~]
└─# mkdir .gf

download the gf pattern(git cloning the gf pattern)

┌──(root💀kali)-[~]
└─# git clone https://github.com/NitinYadav00/gf-patterns.git

change the directory to the gf-pattern

┌──(root💀kali)-[~]
└─# cd gf-patterns

copy all the patterns in the hidden directory (.gf)

┌──(root💀kali)-[~/gf-patterns]
└─# cp -r /root/gf-patterns/*.json ~/.gf

now go to the .gf directory and check the copy content

┌──(root💀kali)-[~/Desktop]
└─# cd

┌──(root💀kali)-[~]
└─# cd .gf

┌──(root💀kali)-[~/.gf]
└─# ls

goto the go > bin directory and copy gau gauplus waybackurls gf in usr > local > bin directory

┌──(root💀kali)-[~/Desktop]
└─# cd

┌──(root💀kali)-[~]
└─# cd go/bin

┌──(root💀kali)-[~/go/bin]
└─# cp gau gauplus waybackurls gf /usr/local/bin/

exit from the terminal and again reopen the terminal and check the gf tool is perfectly installed or not

┌──(root💀kali)-[~/Desktop]
└─# gf -h

┌──(root💀kali)-[~/Desktop]
└─# gf -list

its time to test the web-application

┌──(root💀kali)-[~/Desktop]
└─# waybackurls testphp.vulnweb.com | gf xss | tee xssfilter.txt

now we got the URL which is possible to XSS now we can use other XSS payload or check it manually to confirm whether the XSS is present or not

I also disclosed some interesting video POC regarding my submission on youtube

Youtube: https://www.youtube.com/channel/UCD1HKXD7o-mLV9jmkS-emGw

LinkedIn: https://www.linkedin.com/in/santosh-bobade-531094192/

Twitter Handle: https://twitter.com/Santosh88267387

--

--

Responses (3)