Skip to content

MRvirusIR/Revelar

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

51 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Revelar – Origin Reveal PRO

Go Version License Build Status GitHub stars


🔹 Overview

Revelar (Origin Reveal PRO) is a professional Go-based CLI tool for uncovering real/origin IP addresses of websites behind CDNs such as Cloudflare, Akamai, Fastly, Imperva, and AWS CloudFront.

It combines passive reconnaissance, heuristic analysis, and optional active verification to provide comprehensive reports in JSON and HTML formats.


⚙️ Features

  • Detects CDN providers automatically.
  • Collects DNS records (A, AAAA, MX, Reverse DNS).
  • Extracts SSL Subject Alternative Names (SANs).
  • Integrates with optional external tools (subfinder, amass, dnsx, httpx, nuclei).
  • Filters CDN IP ranges to isolate real origin candidates.
  • Active verification engine:
    • Compares status codes
    • Extracts page titles
    • Matches server headers
    • Validates content hash (SHA256)
  • Generates detailed JSON + HTML reports per domain.
  • User can selectively enable/disable tools or run default mode (all tools).
  • Supports custom wordlists with the -w flag (defaults to SecLists if installed).

🛠 Prerequisites

  • Go 1.21+
  • Internet access for passive/active lookups
  • (Optional) Installed external tools for enhanced recon:
    • subfinder, amass, dnsx, httpx, nuclei
  • (Optional) A wordlist (e.g., from SecLists) for brute-force subdomain discovery

📥 Installation

Install via go install:

go install github.com/MRvirusIR/Revelar@latest

Binary will be available at $GOPATH/bin/Revelar (or $HOME/go/bin/Revelar).

Run directly from source:

git clone https://github.com/MRvirusIR/Revelar.git
cd Revelar
Revelar -d example.com
# OR
go run ./script.go -d example.com

💻 Usage

Passive Scan

Revelar -d example.com

Active Verification (requires authorization)

Revelar -d example.com -active

Scan Multiple Domains

Revelar -f domains.txt -active

Use Custom Wordlist

Revelar -d example.com -w /path/to/wordlist.txt

⚠️ If -w is not provided, Revelar defaults to a standard wordlist from SecLists (if available).

Selective Tool Control

Enable only specific tools:

Revelar -d example.com -tools=subfinder,dnsx

Disable all external tools:

Revelar -d example.com -tools=none

🧩 Flags

Flag Description
-d Single domain to scan (e.g., example.com)
-f File containing multiple domains
-w Path to custom wordlist (default: SecLists if available)
-timeout Passive source timeout in seconds (default: 25)
-active Enable active verification against candidate IPs
-active-timeout Timeout for active probes (default: 12)
-ua Custom HTTP User-Agent string
-scheme http or https for active fetch (default: https)
-ports Comma-separated ports for probing (default: 80,443)
-tools Run only specific tools (comma-separated: subfinder,amass,dnsx,httpx)
-no-tools Skip running external tools
-progress Show/hide step-by-step progress logs (default: true)

📂 Output

Reports are saved per-domain under results//

Example:

results/example.com/
  ├─ results.json   # structured JSON
  ├─ results.html   # HTML report
  ├─ subfinder.log
  ├─ amass.log
  ├─ dnsx.log
  └─ httpx.log

⚖️ Legal Notice

This tool is for authorized security testing only. Do NOT scan systems without explicit permission. The authors assume no liability for misuse.


🔗 Links

Repository: https://github.com/MRvirusIR/Revelar

Telegram: BugCod3 | Exploit_Forge

License: MIT


🎬 Demo

asciicast

picture

picture