JavaScript-Sourced URLs
Extracts API endpoints and routes embedded in JavaScript files that are invisible to standard crawlers.
Free account required
Discover hidden endpoints, admin paths, and API routes from any web application.
Crawls a target URL to extract all linked endpoints, JavaScript-sourced routes, sitemap entries, and robots.txt exclusions. Identifies hidden API routes, admin panels, and unlinked pages that scanning tools miss.
What it detects
Detection capabilities
Extracts API endpoints and routes embedded in JavaScript files that are invisible to standard crawlers.
Identifies paths matching admin panel patterns (/admin, /dashboard, /management) and backup files.
Discovers REST and GraphQL API routes from JS bundles, source maps, and inline scripts.
Enumerates paths explicitly excluded from crawlers — often the most sensitive areas of the application.
Step-by-step guide
Provide the base URL of the web application. The tool crawls same-origin links automatically.
Choose shallow (index only), medium (2 levels), or deep (full crawl with JS extraction).
Filter results by path pattern, response code, or content type to find the most valuable targets.
Keep going
Enumerate subdomains via DNS records, certificate transparency logs, and brute-force.
Use tool →
Extract API keys, internal endpoints, and auth tokens from JavaScript files.
Use tool →
Find open redirects, SSRF indicators, and injection points in any URL.
Use tool →