urlhunter is an open source reconnaissance tool designed to help security researchers discover URLs that have been exposed through URL shortener services such as bit.ly and goo.gl. It works by analyzing large datasets generated from brute-forced short links that are publicly released by the URLTeam project. These datasets contain resolved long URLs that were originally hidden behind short links, which can sometimes reveal sensitive or previously unknown endpoints. urlhunter downloads these collections and allows users to search and analyze them using custom keywords or patterns. This capability makes it useful for identifying exposed resources such as documents, internal panels, or forgotten endpoints that may still be accessible online. urlhunter is written in Go and operates as a command-line utility, making it suitable for automation and integration into reconnaissance workflows.
Features
- Searches large datasets of resolved URLs from shortener services
- Supports single keyword searches to match URL substrings
- Allows multiple keyword queries using AND logic filtering
- Supports regex patterns for advanced URL matching
- Filters results using a specific dataset date
- Saves discovered URLs to an output file for further analysis