SpiderX is an advanced reconnaissance framework designed to streamline the process of extracting data and performing detailed cyber reconnaissance on a given target domain.
- Neon-themed user interface with glitch and animation effects.
- Automated data extraction from the Wayback Machine.
- Extracts and organizes:
- Unique domains and subdomains.
- URL paths excluding query parameters.
- Generates a comprehensive scan report.
- Built with a terminal-friendly interface for easy use.
Before running SpiderX, ensure you have the following installed on your system:
- Bash Shell (default on Linux and macOS)
curl
Command-Line Tool
Clone the repository to your local system:
git clone https://github.com/LxaNce-Hacker/SpiderX.git
cd SpiderX
Run the script with a target domain as the argument:
bash SpiderX.sh <domain>
bash SpiderX.sh example.com
- A directory named
HUNT_<target>_<timestamp>
will be created. - Files generated in the directory:
urls.txt
: List of all URLs found.domains.txt
: List of unique domains and subdomains.paths.txt
: List of unique URL paths.report.txt
: Comprehensive scan report.
SpiderX is released under the MIT License.
SpiderX is intended for educational and ethical purposes only. Unauthorized use of this tool for malicious activities is strictly prohibited. The developers are not responsible for any misuse of this tool.
Contributions are welcome! If you have ideas or suggestions to improve SpiderX, feel free to submit a pull request.
Developed with ❤️ by LxaNce-Hacker