Use when you need a practical operating guide for JSFinder to extract URLs, routes, API paths, or subdomains from JavaScript assets.
Use this skill when frontend JavaScript is likely to reveal hidden routes, APIs, subdomains, or internal references faster than blind fuzzing.
/root/niuniu-agent/tools/JSFinder/JSFinder.pySingle page:
python3 /root/niuniu-agent/tools/JSFinder/JSFinder.py \
-u http://target/ \
-ou /tmp/jsfinder_urls.txt \
-os /tmp/jsfinder_subdomains.txt
Deep mode:
python3 /root/niuniu-agent/tools/JSFinder/JSFinder.py \
-u http://target/ \
-d \
-ou /tmp/jsfinder_urls.txt \
-os /tmp/jsfinder_subdomains.txt
Analyze a list of JS URLs directly:
python3 /root/niuniu-agent/tools/JSFinder/JSFinder.py \
-f /tmp/js_urls.txt \
-j \
-ou /tmp/jsfinder_urls.txt
http:// or https://.-c when the page requires a session cookie.2ihdUTWqg7iVcvvD7GAZzOadCxS where page-loading logic may hide the next exploit surface.