Waybackurls β Hacker Tools: Time-traveling for bounties π©βπ»
By Anna Hammond
September 24, 2021
The past can tell stories, show things that shouldβve never been uncovered and today we will be looking at that past. We can go hunt for subdomains, secret endpoints, tokens, and secrets, all with the help of Waybackurls.
Wayback Machine Logo
πββοΈ What is Waybackurls?
Waybackurls by @TomNomNom is a small utility written in Go that will fetch known URLs from the Wayback Machine and Common Crawl. (For more information on these services, read the remainder of the article!)
It is a very small utility that does what it was designed for and does it well.
π What can you find with Waybackurls?
Subdomains
This is a great way to passively and incredibly quickly gather subdomains that have actually been used in the past (and are potentially still in use or outdated today). In fact, most popular subdomain enumeration tools such as Amass also search through the Wayback Machine for subdomains.Endpoints
Perhaps this one is a bit too obvious but yes, this will give you a large list of endpoints that can be tested. Additionally, this scan is way faster than brute force content enumeration tools such as Gobuster.Tokens & secrets
People have used this technique in the past to find a valid session or API keys and secrets in the GET parameters for requests found by Waybackurls. An example is this blog article.IDs and secret files
Ever come across applications where you upload a file, perhaps containing sensitive data, and it gets stored in/files/932c847ab1288734dfe234234? Did you wonder if you could find more files there? Perhaps Waybackurls will show you another one and help you disclose information!
π±βπ Our first run!
Check out the video below for an example of how you can use Waybackurls!
π·ββοΈ Setting up Waybackurls
Installing Waybackurls is as simple as counting to ten!
Download the appropriate release from the releases on Github.
Untar the file through
tar -xf fileEnjoy the
waybackurlsbinary
πβπ¦Ί Services making Waybackurls possible
As discussed earlier, this tool uses the Wayback Machine and Common Crawl to search for results. Letβs take a very quick look at these services.
Wayback Machine
This service was created when the internet was still making its first baby steps. It has archived over 614 billion web pages over the last decades and these have been either manually archived or crawled.Common Crawl
Common Crawl is another project that crawls millions of sites to keep a public record of the results. You can query these, which is what the tool does.
For more information, be sure to check out their websites!
π§ Conclusion
Waybackurls is a tiny, yet helpful utility to help you uncover the past. Start using it today and letβs get some easy wins!
If you would like to recommend a tool for us to cover next week, then be sure to let us know down below. Also be sure to check outΒ all the previous Hacker Tools articles, such asΒ the last one on Dalfox.
Did you know that there is a video accompanying this article? Check outΒ the playlist!
You may also like
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way to give back to the community. In response to one of our recent articles, we decided to focus on JSON
November 11, 2025
Hunting for DOM-based XSS vulnerabilities: A complete guide
Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more complex and developers continue to shift application logic to the client-side, more complex client-side vulnerab
November 7, 2025
Exploiting JWT vulnerabilities: A complete guide
Before JSON Web Tokens (JWTs) became popular in today's app development landscape, web applications predominantly used server-side sessions, which presented horizontal scalability issues. JWTs solved this by moving authentication data from the server to the token itself. They are self-contained, sta
