__ __ _ _ _ _ _
\ \ / / | | | | | | (_) | |
\ \ /\ / /_ _ _ _| |__ __ _ ___| | _| | _ ___| |_ ___ _ __
\ \/ \/ / _` | | | | '_ \ / _` |/ __| |/ / | | / __| __/ _ \ '__|
\ /\ / (_| | |_| | |_) | (_| | (__| <| |____| \__ \ || __/ |
\/ \/ \__,_|\__, |_.__/ \__,_|\___|_|\_\______|_|___/\__\___|_|
__/ |
|___/
WaybackLister v1.0 — by [FR13ND0x7F]
Discover potential directory listings through archived URLs from the Wayback Machine.
WaybackLister is a reconnaissance tool that taps into the Wayback Machine to fetch historical URLs for a domain, parses unique paths, and checks if any of those paths currently expose directory listings. It's fast, multithreaded, and built for practical use in security assessments and bug bounty recon.
- Pulls archived URLs via the Wayback Machine
- Extracts unique paths and subdomains from those URLs
- Actively checks for live directory listings
- Supports multithreaded scanning
- Can auto-discover subdomains based on Wayback data
- Works with single domain or list of domains
Clone the repo and you're good to go:
git clone https://github.com/anmolksachan/wayBackLister.git
cd wayBackLister
pip install -r requirements.txt -> To be updatedpython waybacklister.py -d example.compython waybacklister.py -f domains.txtpython waybacklister.py -auto example.com python waybacklister.py -d example.com -t 20[+] Querying Wayback Machine for example.com...
[+] Found 154 unique paths for example.com. Checking for directory listings...
[+] Directory Listing Found: http://example.com/files/
[+] Directory Listing Found: http://example.com/uploads/
[+] Summary of Directory Listings for example.com:
http://example.com/files/
http://example.com/uploads/
- Python 3.6+
requestsargparse
Install dependencies with:
pip install -r requirements.txtSometimes, old URLs archived by the Wayback Machine lead to interesting places—especially when they still work. Directory listings can reveal sensitive files, backups, or even forgotten admin panels. WaybackLister helps you find them in a systematic and scriptable way.
This tool is meant for educational and authorized security testing only. Don't use it on systems you don't have permission to test.
Crafted by FR13ND0x7F @anmolksachan — for the community, by the community.
