Grepr is a blazing-fast, lightweight CLI tool designed for URL filtering and recon, built specifically for bug bounty hunters, penetration testers, and security researchers. Inspired by the simplicity of gf, Grepr adds targeted intelligence to filter URLs by file type, security templates, or super mode automation.
- 📂 Template System (GF-style): Use predefined security templates like
sqli,xss,ssrf,s3-buckets, etc. - 🚀 Embedded Defaults: Templates are now embedded in the binary. No more missing file errors!
- 🖥 Console-First Output: Results print to console by default (perfect for piping). Use
-oonly when you need to save to a file. - 🧬 Dynamic Soora Mode: Automatically applies all security templates and core filters in one go.
- 🎨 Modern Banner: A professional new look for your terminal.
- 🎯 Filter by Filetype: Targeted matching for extensions like
.js,.php,.aspx, etc. (Smart enough to handle query params!). - 🔍 Regex Filtering: Filter lines using multiple regex patterns (from a list or file).
- 📋 Security Templates: predefined patterns for common vulnerabilities (SQLi, XSS, SSRF, IDOR, LFI, RCE, etc.).
- ⚡️ Soora Mode: The ultimate "Deep Scan" mode that runs every filter and template automatically.
- 🪶 Self-Contained: Go-embedded templates mean the tool works anywhere without extra setup.
- 📦 Clean Stats: Provides line counts and file sizes for all generated outputs.
This is the fastest way to install Grepr. It will download, compile, and install the binary directly to your $GOPATH/bin.
go install github.com/LaviruDilshan/grepr/v2/cmd/grepr@latestIf you want to contribute or build the binary manually, follow these steps:
# Clone the repository
git clone https://github.com/LaviruDilshan/grepr.git
# Navigate to the directory
cd grepr
# Build the binary
go build -o grepr main.go
# (Optional) Move to your local bin for global access
sudo mv grepr /usr/local/bin/grepr -i urls.txt -f js,phpgrepr -i urls.txt -t sqligrepr -lgrepr -i urls.txt -t xss -o results.txt| Flag | Description |
|---|---|
-i, --input |
(Required) Input file containing URLs |
-o, --output |
Output file name (optional, prints to console if omitted) |
-f, --filetypes |
Comma-separated filetypes (e.g., js,php,aspx) |
-t, --template |
Apply a predefined template (e.g., sqli, xss, ssrf) |
-l, --list-templates |
List all available security templates |
-r, --regex-list |
Regex patterns (comma-separated, e.g., admin.*,login) |
--regex-file |
File path containing regex patterns (one per line) |
-s, --soora |
Enable Soora Super Mode (Applies ALL filters) |
-n, --nobanner |
Disable the startup banner |
Soora is the ultimate automated engine. When enabled, it performs a comprehensive scan by applying:
- Core Filters: Extracts all
.jsand.txtfiles. - Custom Configs: Applies patterns from
config/extensions.txtandconfig/regex.txt. - Security Templates: Runs EVERY available template (
sqli,xss,idor,lfi,rce,ssrf,ssti,redirect,s3-buckets,debug_logic).
grepr -i all-urls.txt -sSoora generates individual files for each category and merges them into:
📄 Final-Grepr.txt
- 👨💻 Developer: Laviru Dilshan
- 🏢 Company: Ovate Security
- 🌐 Website: lavirudilshan.com
- 🐦 X (Twitter): @LaviruDilshan
This project is licensed under the MIT License - see the LICENSE file for details.
Found a bug or have an idea? Open an issue or reach out via socials. Contributions are welcome!
