WaybackLister v1.1 — by [FR13ND0x7F]
Discover potential directory listings through archived URLs from the Wayback Machine.
WaybackLister is a reconnaissance tool that taps into the Wayback Machine to fetch historical URLs for a domain, parses unique paths, and checks if any of those paths currently expose directory listings. It's fast, multithreaded, and built for practical use in security assessments and bug bounty recon.
- Pulls archived URLs via the Wayback Machine
- Extracts unique paths and subdomains from those URLs
- Actively checks for live directory listings
- Supports multithreaded scanning
- Can auto-discover subdomains based on Wayback data
- Works with single domain or list of domains
- Retry logic for timeouts [v1.1]
Clone the repo and you're good to go:
git clone https://github.com/anmolksachan/wayBackLister.git
cd wayBackLister
pip install -r requirements.txt -> To be updatedpython waybacklister.py -d example.compython waybacklister.py -f domains.txtpython waybacklister.py -auto example.com python waybacklister.py -d example.com -t 20[+] Querying Wayback Machine for example.com...
[*] Attempt 1 to fetch data for example.com
[+] Processing domain: example.com
[+] Found 154 unique paths for example.com. Checking for directory listings...
[+] Directory Listing Found: http://example.com/files/
[+] Directory Listing Found: http://example.com/uploads/
[+] Summary of Directory Listings for example.com:
http://example.com/files/
http://example.com/uploads/
- Python 3.6+
requestsargparse
Install dependencies with:
pip install -r requirements.txtSometimes, old URLs archived by the Wayback Machine lead to interesting places—especially when they still work. Directory listings can reveal sensitive files, backups, or even forgotten admin panels. WaybackLister helps you find them in a systematic and scriptable way.
- (How I Use Waybacklister to Discover Gold in Bug Bounty Targets 💰)
- (WayBackLister : Innovative Directory Bruteforcing Technique)
- (Recon Tool: WaybackLister)
This tool is meant for educational and authorized security testing only. Don't use it on systems you don't have permission to test.
Crafted by (FR13ND0x7F @anmolksachan) — for the community, by the community.