AliveV2 is a high-speed, OSINT-enhanced URL health checker built for security professionals and academic researchers. It streamlines the process of validating large sets of assets while providing intelligent alternatives for broken resources through DuckDuckGo integration.
Developed as part of my Masterโs in Cybersecurity, this tool is designed to bridge the gap between initial reconnaissance and vulnerability discovery:
- Attack Surface Mapping: Rapidly filter live web targets after subdomain enumeration or Nmap scans.
- Broken Link Hijacking (BLH): Identify
404 Not Foundpages on target domains that are vulnerable to social media or resource hijacking. - C2 & Malware Analysis: Safely check the status of suspected Command and Control (C2) infrastructure or malicious URLs identified in threat feeds.
- OSINT Discovery: Use the
--suggestflag to find moved assets or legacy portals via DuckDuckGo integration. - WAF & CDN Detection: Configured with custom User-Agents and retry logic to handle rate-limiting and Web Application Firewalls.
Beyond security, I utilize AliveV2 as a "Reference Auditor" to maintain the quality and academic rigor of technical reports and my Master's thesis:
- Combatting Link Rot: Automatically verifies that every citation in a research paper is still live and accessible.
- Reference Audit: Batch-checks bibliography URLs to ensure professional reporting standards.
- Automated Verification: Replaces the manual task of clicking through dozens of references, ensuring 100% data integrity in technical documentation.
- High Concurrency: Uses
ThreadPoolExecutorfor rapid multi-threaded scanning of large URL lists. - Intelligent Fallback: Attempts
HEADrequests for speed, falling back toGETfor strict server configurations. - OSINT Suggestions: Automatic DuckDuckGo search for
404errors to find alternative content or archived locations. - DeepRead Ready: Generates structured JSON support for integration with other forensics and automation scripts.
- Fierce Error Handling: Built-in exponential backoff to handle HTTP 429 (Rate Limiting) and server instability.
# Clone the repository
git clone https://github.com/arazazi/Alive.git
cd Alive
# Install dependencies
pip install -r requirements.txt
Check a few URLs directly with verbose output and suggest:
python3 alive -s "https://blog.talosintelligence.com/2024-threat-report/" -v
Check a file of URLs (e.g., a bibliography or a list of subdomains) with OSINT suggestions:
python alive.py -f targets.txt --suggest --output report.txt
Pipe input from other tools and output clean JSON for further analysis:
cat targets.json | python alive.py -j > results.json
- Python 3.7+
requestsurllib3ddgs(DuckDuckGo Search)
This project is licensed under the MIT License - see the LICENSE file for details.
Author: Azazi
Focus: Cyber Threat Intelligence | Master's Student in Cybersecurity