You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you for the amazing work on Katana — it's been a vital part of our reconnaissance and crawling pipelines.
I'd like to propose an enhancement related to URL filtering based on query parameter count or path segment depth.
While this can currently be partially handled using -fr (filter-regex), a more robust and user-friendly solution would greatly improve usability and clarity.
🔍 Motivation
Currently, if I want to extract URLs with 3 or more query parameters or path depth ≥ 4, I can do:
However, this approach has limitations:
🧩 RegEx becomes unintuitive and error-prone, especially with complex paths or encoded URLs.
🧠 Users must deeply understand URL structure + regex to express simple logic.
🐍 Cannot be used effectively in DSL conditions (-fdc, -mdc) since those work on responses, not on the request URL structure itself.
💡 Proposal
Introduce the following optional CLI flags:
🙏 Final Thoughts
This would be a small but powerful addition to Katana’s filtering capabilities — one that many users in the bug bounty, recon, and appsec automation communities would benefit from.
If there is demand for the function, it can be developed directly.
If there is anyone who wants to develop, please let me know.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Thank you for the amazing work on Katana — it's been a vital part of our reconnaissance and crawling pipelines.
I'd like to propose an enhancement related to URL filtering based on query parameter count or path segment depth.
While this can currently be partially handled using -fr (filter-regex), a more robust and user-friendly solution would greatly improve usability and clarity.
🔍 Motivation
Currently, if I want to extract URLs with 3 or more query parameters or path depth ≥ 4, I can do:
However, this approach has limitations:
🧩 RegEx becomes unintuitive and error-prone, especially with complex paths or encoded URLs.
🧠 Users must deeply understand URL structure + regex to express simple logic.
🐍 Cannot be used effectively in DSL conditions (-fdc, -mdc) since those work on responses, not on the request URL structure itself.
💡 Proposal
Introduce the following optional CLI flags:
🙏 Final Thoughts
This would be a small but powerful addition to Katana’s filtering capabilities — one that many users in the bug bounty, recon, and appsec automation communities would benefit from.
Beta Was this translation helpful? Give feedback.
All reactions