Bashir Kabir Zarewa

Bashir Kabir Zarewa

My thoughts on hacking, ai, faith, and more.

Extract

A Must-Have Chrome Extension for Bug Hunters & Pentesters

Released: May 2025
Chrome Extension
v1.2.0
Extract Tool Screenshot

During bug bounty hunting and penetration testing, one of the most time-consuming tasks is manually searching through JavaScript files to uncover hidden API endpoints, internal routes, and query parameters.

That's where my open-source Chrome extension — Extract — comes in handy. Built with real-world workflows in mind, this tool automates the discovery of endpoints directly from inline scripts and external JS files.

TL;DR: Extract scans webpages for API endpoints in JavaScript files and lets you export them for further testing.

What is Extract?

Extract is a lightweight Chrome extension designed to scan any webpage and extract:

Whether you're doing reconnaissance or analyzing third-party applications, Extract helps you find what matters — fast.

Why You Need Extract

As a bug hunter or pentester, time is precious. Here's how Extract saves you time and effort:

Installation Guide

Follow these simple steps to install the extension:

  1. Clone the repository:
  2. git clone https://github.com/L0C4LH057/Extract.git
  3. Navigate to the folder:
  4. cd Extract
  5. In Chrome, go to chrome://extensions
  6. Enable "Developer mode" (toggle in top-right corner)
  7. Click "Load unpacked" and select the Extract folder
  8. Pin the extension to your toolbar for easy access

How to Use Extract

Once installed, using Extract is straightforward:

  1. Open any target website (e.g., a bug bounty program)
  2. Click the Extract icon in the Chrome toolbar
  3. Click "Extract Endpoints"
  4. Wait a few seconds while it scans the page
  5. View the list of extracted URLs
  6. Filter results using the search box
  7. Export the results by clicking your preferred format (TXT, CSV, JSON)
Extract Usage Demo

Advanced Features

Extract includes several power-user features to enhance your workflow:

Custom Filters

Use the search box to filter endpoints by:

Export Options

Choose from three export formats:

Source Tracking

Enable "Show Sources" to see which JavaScript file each endpoint came from, helping you:

Practical Use Cases

Extract shines in these scenarios:

Bug Bounty Recon

Quickly map out an application's API surface during initial reconnaissance to identify high-value targets.

Penetration Testing

Discover hidden endpoints that might contain vulnerabilities like IDOR, broken auth, or information disclosure.

Security Research

Analyze third-party scripts and track what data they're sending where.

Get Extract

Ready to boost your security workflow?

Contribute: Extract is open-source. Feel free to submit issues or pull requests for new features!

Final Thoughts

Extract is built with efficiency in mind. Whether you're mapping out an application's attack surface or preparing for a targeted assessment, this tool streamlines the process and gets you straight into the action.

If you're serious about hacking and automation, make sure to add Extract to your toolkit.

🔍 Happy Hunting,
Bashir Kabir Zarewa