uncover >> discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.
# Collect JS Fileskatana-listtargets.txt-jc|grepβ\\.js$β|uniq|sort-u|teeJS.txt# or use gau toolcattargets.txt|gau|grepβ\\.js$β|uniq|sort-u|teeJS2.txt# Analyzing JS filesnuclei-lJS.txt-t~/nuclei-templates/exposures/-ojs_exposures_results.txtnuclei-lJS2.txt-t~/nuclei-templates/exposures/-ojs_exposures_results.txtcatJs_urls.txt|Mantra# Download all JS files file="JS.txt"while IFS=read-rlinkdowget"$link"done<"$file"file="JS2.txt"while IFS=read-rlinkdowget"$link"done<"$file"# Use This Regex to search for sensitive info grep -r -E "aws_access_key|aws_secret_key|api key|passwd|pwd|heroku|slack|firebase|swagger|aws_secret_key|aws key|password|ftp password|jdbc|db|sql|secret jet|config|admin|pwd|json|gcp|htaccess|.env|ssh key|.git|access key|secret token|oauth_token|oauth_token_secret|smtp|GTM-" *.js