Parsero is a free script written in Golang which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries tell the search engines what directories or files hosted on a web server mustn't be indexed. For example, "Disallow: /portal/login" means that the content on www.example.com/portal/login it's not allowed to be indexed by crawlers like Google, Bing, Yahoo... This is the way the administrator have to not share sensitive or private information with the search engines.
But sometimes these paths typed in the Disallows entries are directly accessible by the users without using a search engine, just visiting the URL and the Path, and sometimes they are not available to be visited by anybody. Because it is really common that the administrators write a lot of Disallows and some of them are available and some of them are not, you can use Parsero in order to check the HTTP status code of each Disallow entry in order to check automatically if these directories are available or not.
Also, the fact the administrator write a robots.txt, it doesn't mean that the files or directories typed in the Dissallow entries will not be indexed by Bing, Google, Yahoo, etc. For this reason, Parsero is capable of searching in Bing to locate content indexed without the web administrator authorization. Parsero will check the HTTP status code in the same way for each Bing result.
When you execute Parsero, you can see the HTTP status codes. For example, the codes bellow:
200 OK The request has succeeded.
403 Forbidden The server understood the request, but is refusing to fulfill it.
404 Not Found The server hasn't found anything matching the Request-URI.
302 Found The requested resource resides temporarily under a different URI.
...
To install Parsero, you need to have Golang installed on your machine. You can download and install Golang from here.
Once you have Golang installed, you can install Parsero by running the following command:
go get -u github.com/zvdy/parsero-go
You can run Parsero using the following command:
parsero --url <URL> [--only200] [--searchbing] [--file <FILE>]
Options:
--url
: Type the URL which will be analyzed.--only200
: Show only the 'HTTP 200' status code.--searchbing
: Search in Bing indexed Disallows.--file
: Scan a list of domains from a list.
Example:
parsero --url http://example.com --only200
You can watch a recorded terminal session here:
You can use the Dockerfile in the root of the repository in order to build parsero as a container.
-
Build the Docker Image: Open a terminal in the root of your project directory and run the following command to build the Docker image:
docker build -t parsero:latest .
-
Run the Docker Container: After building the image, you can run it using the following command:
docker run -it --rm parsero:latest --url http://example.com --only200
You can retrieve the image directly from Docker hub too.
docker pull zvdy/parsero:latest
docker run -it --rm zvdy/parsero:latest --url http://example.com --only200
This project is licensed under the MIT. See the LICENSE file for details.
Contributions are welcome! Please open an issue or submit a pull request for any changes.
This project is a port of parsero which is written in Python, the repository ports it to Golang in order to optimize the speed in long robots.txt
files.