Files
PentestPilot/bin/misc/extract_urls.py
PentestPilot Bot 461c14d676 feat: bootstrap PentestPilot toolkit, docs, and orchestrators
Initial commit of PentestPilot — AI‑assisted pentest recon and orchestration toolkit.\n\nHighlights:\n- Resumeable pipelines (full_pipeline) with manifest state and elapsed timings\n- Rich dashboard (colors, severity bars, durations, compact/json modes)\n- Web helpers: httpx→nuclei auto, tech routing + quick scanners\n- Agents: multi‑task orchestrator (web/full/ad/notes/post) with resume\n- AD/SMB, password utils, shells, transfer, privesc, tunnels\n- QoL scripts: proxy toggle, cleanup, tmux init, URL extractor\n- Docs: README (Quick Start + Docs Index), HOWTO (deep guide), TOOLKIT (catalog with examples)\n\nStructure:\n- bin/automation: pipelines, dashboard, manifest, resume, tech_actions\n- bin/web: routing, scanners, helpers\n- bin/ai: orchestrators + robust AI utils\n- bin/ad, bin/passwords, bin/shells, bin/transfer, bin/privesc, bin/misc, bin/dns, bin/scan, bin/windows, bin/hashes\n- HOWTO.md and TOOLKIT.md cross‑linked with examples\n\nUse:\n- settarget <target>; agent full <domain|hosts.txt>; dashboard --compact\n- See HOWTO.md for setup, semantics, and examples.
2025-10-08 16:00:22 +02:00

17 lines
517 B
Python
Executable File

#!/usr/bin/env python3
import sys, re
if len(sys.argv) < 2:
print(f"Usage: {sys.argv[0]} <file> [file2 ...]", file=sys.stderr); sys.exit(1)
pat=re.compile(r'(https?://[\w\-\.:%#@\?\/=\+&]+)')
seen=set()
for p in sys.argv[1:]:
try:
with open(p,'r',errors='ignore') as f:
for line in f:
for m in pat.findall(line):
if m not in seen:
seen.add(m); print(m)
except Exception as e:
print(f"[!] {p}: {e}", file=sys.stderr)