SkillAgentSearch skills...

Crtdumper

crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names from certificates. Perfect for security researchers and developers interested in massively extracting domain names from CT logs.

Install / Use

/learn @c3l3si4n/Crtdumper
About this skill

Quality Score

0/100

Category

Design

Supported Platforms

Universal

README

CRTDumper

CRTDumper is a Go application that massively scans Certificate Transparency (CT) logs to extract and save domain names datasets for later processing. It supports resuming from the last fetched index to avoid redundant processing in case of interruptions.

Features

  • Fetches certificates from CT logs.
  • Extracts domain names from certificates.
  • Saves progress to a file for resuming.
  • Supports multithreading for faster processing.
  • Handles retries for transient network errors.

Installation

go install github.com/c3l3si4n/crtdumper@HEAD

TODOs

  • Actually implement increasing sleep time on HTTP 429 Too Many Requests, Retry-After. Maybe library for calling funftion only x times/second?. Backoff in go-retryablehttp apparently not working?
  • Option for limiting the HTTP client to IPv4/IPv6 (some logs are dead/slow on IPv6?)
  • Maybe write to dynamic output files, i.e. <date+time-as-ISO>-<counter that increments per 100000 records>.out This would allow you to start processing the finisef files without disturbing the running process.

Usage

CRTDumper has two primary modes, dumping all dmains from one to multiple logs, and a mode for listing avaliable operators, logs or the domains extracted from a spesific log entry (most useful for debugging)

Examples

List all operators

./crtdumper -list

List all logs from Let's Encrypt (case insensitive)

./crtdumper -list -operator "lEt'S ENCrypt"

List the domains in www.cia.gov's certificate for 2024-2025

./crtdumper -list -operator "Cloudflare" -log https://ct.cloudflare.com/logs/nimbus2025 --entry 38779142

Write all domains from all active operator logs to ./log-output.log

./crtdumper

Write all domains from all active operator logs to stdout, limiting to the .no TLD, not resuming from previous runs

./crtdumper --output - --required-postfix ".no" -no-resume

Command-line Flags

For scraping logs

  • -output <filename or ->: Output filename. Use - for stdout. (default ./output.log) (default "./output.log")
  • -num-entries <number>: number of entries to query at once (default 20)
  • -no-resume: Do not use resume file (default false, i.e. use resume file)
  • -resume-file string: Resume filename (default ./log-resume.json)

Limiting output

  • -require-postfix <string>: Postfixe to require. (will not output domains not matching postfix)
  • -only-log <string>: URL of the single log to process
  • -only-operator <string>: Name of the only operator to process
  • -skip-log <value>: URLs of logs to skip (can be repeated)
  • -skip-operator <value>: URLs of operators to skip (can be repeated)

For listings

  • -list: List something defined by operator/log/entry (default lists all operators)
  • -operator string: Operator for listing (if only this, will lists logs for this operator)
  • -log string: Log for listing (does not make sense without --entry)
  • -entry uint: Entry to list from --operator's --log

Common options

  • -loglevel string: Application loglevel (INFO (default), DEBUG, ERROR, WARN) (default "INFO")
  • -include-precert: Include data from precertificates in output

Handling Interruptions

CRTDumper is designed to handle interruptions gracefully. If interrupted (e.g., by pressing Ctrl+C), it will save its state to log-resume.json and print a message. Unless you specify -no-resume, it will be used automatically.

Issues and Contributions

Feel free to submit issues or pull requests if you find any bugs or want to contribute.

Acknowledgements

The base for this was project taken from github.com/c3l3si4n/crtdumper, and heavily modified.

This project depends on several open-source packages:

  • github.com/alphadose/haxmap
  • github.com/go-resty/resty/v2
  • github.com/google/certificate-transparency-go
  • github.com/hashicorp/go-retryablehttp

Related Skills

clearshot

Structured screenshot analysis for UI implementation and critique. Analyzes every UI screenshot with a 5×5 spatial grid, full element inventory, and design system extraction — facts and taste together, every time. Escalates to full implementation blueprint when building. Trigger on any digital interface image file (png, jpg, gif, webp — websites, apps, dashboards, mockups, wireframes) or commands like 'analyse this screenshot,' 'rebuild this,' 'match this design,' 'clone this.' Skip for non-UI images (photos, memes, charts) unless the user explicitly wants to build a UI from them. Does NOT trigger on HTML source code, CSS, SVGs, or any code pasted as text.

openpencil

2.0k

The world's first open-source AI-native vector design tool and the first to feature concurrent Agent Teams. Design-as-Code. Turn prompts into UI directly on the live canvas. A modern alternative to Pencil.

ui-ux-pro-max-skill

58.3k

An AI SKILL that provide design intelligence for building professional UI/UX multiple platforms

hyperblue

Build premium, brand-aware React/Next.js frontends that feel designed by a senior UI engineer, not generated by AI. Use this skill whenever the user wants to create websites, landing pages, dashboards, web apps, React components, or any frontend UI — especially when they provide brand assets (logos, screenshots, colors), mention a specific business or industry, want to match an existing design system, or ask for "non-generic" or "premium" output. Also trigger when the user shares competitor sites for inspiration, asks for design tokens, wants animation direction, or needs responsive brand consistency. This skill replaces generic AI aesthetics with market-aware, brand-calibrated design engineering. Created by Incredible Visibility.

View on GitHub
GitHub Stars41
CategoryDesign
Updated2mo ago
Forks5

Languages

Go

Security Score

75/100

Audited on Jan 26, 2026

No findings