InsecRes – A Tool to Find Insecure Resources on HTTPS Sites

After switching your site to HTTPS, you probably want to test if resources such as images, slides, embedded videos and others, are correctly pointed to HTTPS protocol or displaying warnings about the insecure content on the pages. After some research I found a useful tool for this purpose, called insecuRes.

InsecuRes is a small, free and open source command line based tool for finding insecure resources on HTTPS sites, written in Go programming language. It utilizes the power of “multi-threading” (goroutines) to crawl and parse site pages.

Read Also: How to Redirect HTTP to HTTPS on Apache

It crawls all your website pages in parallel, scans and catches: IMG, IFRAME, OBJECT, AUDIO, VIDEO, SOURCE and TRACK resources with full HTTP (insecure) urls. To prevent blacklisting by web server, it employs a random delay between requests. Additionally, you can redirect its output to a CSV file for later analysis.

Requirements

  1. Install Go Programming Language in Linux

Install InsecuRes in Linux Systems

Once Go Programming Language installed on the system, run the command below on the terminal to get insecres.

$ go get github.com/kkomelin/insecres

Once you have downloaded and installed insecres, run the command below to scan your site for insecure resources. If it shows no output, that probably means there are no insecure resources on your site.

$ $GOPATH/bin/insecres https://example.com

To save the output in a CSV file for later examination, use the -f flag.

$ $GOPATH/bin/insecres -f="/path/to/scan_report.csv" https://example.com

Display usage guide.

$ $GOPATH/bin/insecres -h

Some of the features to be added include displayiny result counters and comparing performance of simple regex parsing and tokenized parsing.

InsecRes Github repository: https://github.com/kkomelin/insecres

In this article, we showed you how to find insecure resources on HTTPS sites, using a simple command line tool called insecres. You can ask questions or share your thoughts via the comment section below. If you know of any similar tools out there, do share information about them as well.

Aaron Kili
Aaron Kili is a Linux and F.O.S.S enthusiast, an upcoming Linux SysAdmin, web developer, and currently a content creator for TecMint who loves working with computers and strongly believes in sharing knowledge.

Each tutorial at TecMint is created by a team of experienced Linux system administrators so that it meets our high-quality standards.

Join the TecMint Weekly Newsletter (More Than 156,129 Linux Enthusiasts Have Subscribed)
Was this article helpful? Please add a comment or buy me a coffee to show your appreciation.

4 thoughts on “InsecRes – A Tool to Find Insecure Resources on HTTPS Sites”

  1. One slight concern: If this utilizes Go, then does that mean it depends on Google to decide whether or not a site is secure? The Go language has its own flaws, including being caught preventing firewall alerts.

    Reply
    • Hmm… insecRes doesn’t decide whether a site is secure or not. Its purpose is to find insecure resources. Its code is open-sourced, so feel free to investigate it if you have any doubts.

      Reply

Got something to say? Join the discussion.

Thank you for taking the time to share your thoughts with us. We appreciate your decision to leave a comment and value your contribution to the discussion. It's important to note that we moderate all comments in accordance with our comment policy to ensure a respectful and constructive conversation.

Rest assured that your email address will remain private and will not be published or shared with anyone. We prioritize the privacy and security of our users.