diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..ded6067
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,36 @@
+*.py[cod]
+
+# C extensions
+*.so
+
+# Packages
+*.egg
+*.egg-info
+dist
+build
+eggs
+parts
+bin
+var
+sdist
+develop-eggs
+.installed.cfg
+lib
+lib64
+__pycache__
+
+# Installer logs
+pip-log.txt
+
+# Unit test / coverage reports
+.coverage
+.tox
+nosetests.xml
+
+# Translations
+*.mo
+
+# Mr Developer
+.mr.developer.cfg
+.project
+.pydevproject
diff --git a/LICENSE b/LICENSE.txt
similarity index 99%
rename from LICENSE
rename to LICENSE.txt
index d7f1051..30953bc 100644
--- a/LICENSE
+++ b/LICENSE.txt
@@ -1,4 +1,5 @@
 GNU GENERAL PUBLIC LICENSE
+
                        Version 2, June 1991
 
  Copyright (C) 1989, 1991 Free Software Foundation, Inc., <http://fsf.org/>
diff --git a/MANIFEST.in b/MANIFEST.in
new file mode 100644
index 0000000..046a397
--- /dev/null
+++ b/MANIFEST.in
@@ -0,0 +1 @@
+include README.md LICENSE.txt
diff --git a/README.md b/README.md
index d94c9fe..9fba53f 100644
--- a/README.md
+++ b/README.md
@@ -1,17 +1,32 @@
-Here, you can get all the info about Parsero updated:
-
-http://www.behindthefirewalls.com/search/?q=parsero
 What's Parsero?
 ===============
-Parsero is a free script written in Python which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries tell the search engines what directories or files hosted on a web server mustn't be indexed. For example, "Disallow: /portal/login" means that the content on www.example.com/portal/login it's not allowed to be indexed by crawlers like Google, Bing, Yahoo... This is the way the administrator have to not share sensitive or private information with the search engines.
-
-But sometimes these paths typed in the Disallows entries are directly accessible by the users without using a search engine, just visiting the URL and the Path, and sometimes they are not available to be visited by anybody... Because it is really common that the administrators write a lot of Disallows and some of them are available and some of them are not, you can use Parsero in order to check the HTTP status code of each Disallow entry in order to check automatically if these directories are available or not.
-
-Also, the fact the administrator write a robots.txt, it doesn't mean that the files or directories typed in the Dissallow entries will not be indexed by Bing, Google, Yahoo... For this reason, Parsero is capable of searching in Bing to locate content indexed without the web administrator authorization. Parsero will check the HTTP status code in the same way for each Bing result.
-
-
-When you execute Parsero, you can see the HTTP status codes. For example, the codes bellow:
-
+Parsero is a free script written in Python which reads the Robots.txt
+file of a web server and looks at the Disallow entries. The Disallow
+entries tell the search engines what directories or files hosted on a
+web server mustn't be indexed. For example, "Disallow: /portal/login"
+means that the content on www.example.com/portal/login it's not allowed
+to be indexed by crawlers like Google, Bing, Yahoo... This is the way
+the administrator have to not share sensitive or private information
+with the search engines.
+
+But sometimes these paths typed in the Disallows entries are directly
+accessible by the users without using a search engine, just visiting
+the URL and the Path, and sometimes they are not available to be visited
+by anybody. Because it is really common that the administrators write
+a lot of Disallows and some of them are available and some of them are
+not, you can use Parsero in order to check the HTTP status code of each
+Disallow entry in order to check automatically if these directories are
+available or not.
+
+Also, the fact the administrator write a robots.txt, it doesn't mean
+that the files or directories typed in the Dissallow entries will not
+be indexed by Bing, Google, Yahoo, etc. For this reason, Parsero is
+capable of searching in Bing to locate content indexed without the web
+administrator authorization. Parsero will check the HTTP status code in
+the same way for each Bing result.
+
+When you execute Parsero, you can see the HTTP status codes. For example,
+the codes bellow:
 
     200 OK          The request has succeeded.
     403 Forbidden   The server understood the request, but is refusing to fulfill it.
@@ -19,22 +34,32 @@ When you execute Parsero, you can see the HTTP status codes. For example, the co
     302 Found       The requested resource resides temporarily under a different URI.
     ...
 
+You can get all the latest info about Parsero from 
+http://www.behindthefirewalls.com/search/?q=parsero
 
-Installing:
+Installing
 ==========
-This tool needs at least Python3 and urllib3.
-       
-    sudo apt-get install python3
-    sudo apt-get install python3-pip
-    sudo pip-3.3 install urllib3
-    sudo pip-3.2 install beautifulsoup4
-        
-Make sure that your default version of Python is 3 or later. If you don't want to change your default version, you can execute typing
-$ python3 parsero (if this version has been installed) instead of $ python parsero.
+There are three ways to install Parsero easily. 
 
-Usage:
-======
-    $ python3 parsero.py -h
+By using setup.py script
+
+	sudo setup.py install
+	
+By using pip3
+
+	sudo apt-get install python3-pip
+	sudo pip3 install parsero
+	
+In Kali Linux
+
+	sudo apt-get update
+	sudo apt-get install parsero
+
+
+Usage
+=====
+
+    $ parsero -h
         
     usage: parsero.py [-h] [-u URL] [-o] [-sb]
 	
@@ -43,12 +68,12 @@ Usage:
     -u URL      Type the URL which will be analyzed
     -o          Show only the "HTTP 200" status code
     -sb         Search in Bing indexed Disallows
+    -f FILE     Scan a list of domains from a list
 
-
-Example:
+Example
 =======
 	 
-    root@kali:~/my-tools/Parsero# python3 parsero.py -u www.example.com -sb
+    root@kali:~# parsero -u www.example.com -sb
 
          ____                               
         |  _ \ __ _ _ __ ___  ___ _ __ ___  
@@ -57,51 +82,51 @@ Example:
         |_|   \__,_|_|  |___/\___|_|  \___/ 
 
 	Starting Parsero v0.75 (https://github.com/behindthefirewalls/Parsero) at 05/22/14 11:12:55
-	Parsero scan report for example.com                                             
-	http://example.com/download.php 302 Moved Temporarily                                             
-	http://example.com/raw.php 302 Moved Temporarily                                             
-	http://example.com/embed_js.php 200 OK                                             
-	http://example.com/embed.php 200 OK                                             
-	http://example.com/print.php 302 Moved Temporarily                                             
-	http://example.com/diff.php 302 Moved Temporarily                                             
-	http://example.com/share.php 404 Not Found                                             
-	http://example.com/report.php 302 Moved Temporarily                                             
-	http://example.com/embed_iframe.php 200 OK                                             
+	Parsero scan report for example.com
+	http://example.com/download.php 302 Moved Temporarily
+	http://example.com/raw.php 302 Moved Temporarily
+	http://example.com/embed_js.php 200 OK
+	http://example.com/embed.php 200 OK
+	http://example.com/print.php 302 Moved Temporarily
+	http://example.com/diff.php 302 Moved Temporarily
+	http://example.com/share.php 404 Not Found
+	http://example.com/report.php 302 Moved Temporarily
+	http://example.com/embed_iframe.php 200 OK
                                              
-	[+] 9 links have been analyzed and 3 of them are available!!!                                             
+	[+] 9 links have been analyzed and 3 of them are available!!!
                                              
-	Searching the Disallows entries in Bing...                                             
+	Searching the Disallows entries in Bing
                                              
-	http://www.bing.com/search?q=site:http://example.com/download.php                                             
-	http://www.bing.com/search?q=site:http://example.com/raw.php                                             
- 	- example.com/raw.php/contact?i=KR9c2erd 200 OK                                             
- 	- example.com/raw.php/legal.aspx 302 Moved Temporarily                                             
- 	- example.com/raw.php/points?i=KR9c2erd 200 OK                                             
+	http://www.bing.com/search?q=site:http://example.com/download.php
+	http://www.bing.com/search?q=site:http://example.com/raw.php
+ 	- example.com/raw.php/contact?i=KR9c2erd 200 OK
+ 	- example.com/raw.php/legal.aspx 302 Moved Temporarily
+ 	- example.com/raw.php/points?i=KR9c2erd 200 OK
 	- example.com/raw.php/image/sqrn11sp3C/zayn-tshirt-one-direction?i=... 302 Moved Temporarily
 	http://www.bing.com/search?q=site:http://example.com/embed_js.php
-	http://www.bing.com/search?q=site:http://example.com/embed.php                                             
-	http://www.bing.com/search?q=site:http://example.com/print.php                                             
-	http://www.bing.com/search?q=site:http://example.com/diff.php                                             
-	http://www.bing.com/search?q=site:http://example.com/share.php                                             
-	http://www.bing.com/search?q=site:http://example.com/report.php                                             
-	http://www.bing.com/search?q=site:http://example.com/embed_iframe.php                                             
+	http://www.bing.com/search?q=site:http://example.com/embed.php
+	http://www.bing.com/search?q=site:http://example.com/print.php
+	http://www.bing.com/search?q=site:http://example.com/diff.php
+	http://www.bing.com/search?q=site:http://example.com/share.php
+	http://www.bing.com/search?q=site:http://example.com/report.php
+	http://www.bing.com/search?q=site:http://example.com/embed_iframe.php
                                              
 	Finished in 7.290362596511841 seconds 
 
 Disclaimer
 ==========
-The use of this tool is your responsability. Use parsero to audit your own servers or servers you are allowed to scan. I hereby disclaim any responsibility for actions taken with this tool.
-
+The use of this tool is your responsability. Use parsero to audit your
+own servers or servers you are allowed to scan. I hereby disclaim any
+responsibility for actions taken with this tool.
 
-Author:
-=======
+Author
+======
 
-  Javier Nieto
-  
-  eMail: javier.nieto<@>behindthefirewalls.com
-  
-  Twitter: @behindfirewalls
-  
-  Web: http://www.behindthefirewalls.com
-  
+* Javier Nieto <javier.nieto at behindthefirewalls.com> 
+* Twitter: @behindfirewalls
+* Web: http://www.behindthefirewalls.com
 
+Credits
+=======
+I'd like thank to @cor3dump3d from http://www.devconsole.info for his support
+and help.
diff --git a/parsero.py b/parsero.py
index f143469..4ee24ef 100644
--- a/parsero.py
+++ b/parsero.py
@@ -1,35 +1,36 @@
-#!/usr/bin/python3
+#!/usr/bin/env python3
 # -*- coding: utf-8 -*-
 
-__license__="""
+__license__ = """
 
-Parsero is a free script which read the Robots.txt file of a web server and look at the Disallow entries. Then it 
-visits these entries and prints the status code in order to show you which of them are available and which not.
+Parsero is a free script which read the Robots.txt file of a web server and
+look at the Disallow entries. Then it visits these entries and prints the
+status code in order to show you which of them are available and which not.
 
 Author:
-	Javier Nieto | javier.nieto@behindthefirewalls.com
-	Twitter: @behindfirewalls
-	Web: www.behindthefirewalls.com
+    Javier Nieto | javier.nieto@behindthefirewalls.com
+    Twitter: @behindfirewalls
+    Web: www.behindthefirewalls.com
 
-	Parsero project site: https://github.com/behindthefirewalls/Parsero
+    Parsero project site: https://github.com/behindthefirewalls/Parsero
 
-	This program is free software; you can redistribute it and/or
-	modify it under the terms of the GNU General Public License
-	as published by the Free Software Foundation; either version 2
-	of the License, or (at your option) any later version.
+    This program is free software; you can redistribute it and/or
+    modify it under the terms of the GNU General Public License
+    as published by the Free Software Foundation; either version 2
+    of the License, or (at your option) any later version.
 
-	This program is distributed in the hope that it will be useful,
-	but WITHOUT ANY WARRANTY; without even the implied warranty of
-	MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-	GNU General Public License for more details.
+    This program is distributed in the hope that it will be useful,
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+    GNU General Public License for more details.
 
-	You should have received a copy of the GNU General Public License
-	along with this program; if not, write to the Free Software
-	Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+    You should have received a copy of the GNU General Public License
+    along with this program; if not, write to the Free Software
+    Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
 
-	The authors disclaims all responsibility in the use of this tool.
+    The authors disclaims all responsibility in the use of this tool.
 
-	"""
+    """
 
 class bcolors:
     OKGREEN = '\033[92m'
@@ -38,158 +39,179 @@ class bcolors:
     YELLOW = '\033[33m'
 
     def disable(self):
-            self.OKGREEN = ''
-            self.FAIL = ''
-            self.ENDC = ''
+        self.OKGREEN = ''
+        self.FAIL = ''
+        self.ENDC = ''
 
 import sys
 
-if sys.version_info<(3,0,0):
-	print("\n" + bcolors.FAIL + "You need Python3 or later to run this script." + bcolors.ENDC + "\n")
-	exit(1)
+if sys.version_info < (3, 0, 0):
+    print("\n" + bcolors.FAIL + \
+            "You need Python3 or later to run this script." + \
+            bcolors.ENDC + "\n")
+    exit(1)
 
 import urllib.request
 import argparse
-import os
 import time
-import timeit
 
 try:
-	import urllib3
+    import urllib3
 
 except ImportError:
-
-	print("\n" + bcolors.FAIL + 'You need to install urllib3. "sudo pip-3.3 install urllib3"' + bcolors.ENDC + "\n")
-	exit(1)
+    print("\n" + bcolors.FAIL + \
+            'You need to install urllib3. "sudo pip-3.3 install urllib3"' + \
+            bcolors.ENDC + "\n")
+    exit(1)
 
 def logo():
-
-	hello="""
-	  ____                               
-	 |  _ \ __ _ _ __ ___  ___ _ __ ___  
-	 | |_) / _` | '__/ __|/ _ \ '__/ _ \ 
-	 |  __/ (_| | |  \__ \  __/ | | (_) |
-	 |_|   \__,_|_|  |___/\___|_|  \___/ 
+    hello = """
+      ____                               
+     |  _ \ __ _ _ __ ___  ___ _ __ ___  
+     | |_) / _` | '__/ __|/ _ \ '__/ _ \ 
+     |  __/ (_| | |  \__ \  __/ | | (_) |
+     |_|   \__,_|_|  |___/\___|_|  \___/ 
 """
-        
-	print(bcolors.YELLOW + hello + bcolors.ENDC)
 
-	now = time.strftime("%c")
+    print(bcolors.YELLOW + hello + bcolors.ENDC)
+    now = time.strftime("%c")
 
 def conn_check(url, only200):
-
-	global pathlist
-	pathlist = []
-	try:
-		for line in urllib.request.urlopen("http://"+url+"/robots.txt"):
-			lineStr = str( line, encoding='utf8' )
-			path = lineStr.split(': /')
-			if "Disallow" == path[0]:
-				pathlist.append(path[1].replace("\n","").replace("\r",""))
-				pathlist = list(set(pathlist))
-			try:
-				inx = pathlist.index("/")
-				del pathlist[inx]
-			except:
-				pass
-	except urllib.error.HTTPError:
-		print("\n" + bcolors.FAIL + "No robots.txt file has been found." + bcolors.ENDC + "\n")
-		exit(1)
-	except urllib.error.URLError:
-		print("\n" + bcolors.FAIL + "Please, type a valid URL. This URL can't be resolved." + bcolors.ENDC)
-		print("\n" + bcolors.FAIL + "e.g: python3 parsero.py -u www.behindthefirewalls.com -o -sb" + bcolors.ENDC + "\n")
-		exit(1)	
-
-	http = urllib3.PoolManager()
-	count = 0
-	count_ok = 0			
-	
-	for p in pathlist:		
-		disurl = "http://"+url+'/'+p
-		r1 = http.request('GET', disurl, redirect = False, retries = 5)
-		if r1.status == 200:
-			print (bcolors.OKGREEN + disurl + ' ' + str(r1.status) + ' ' + str(r1.reason) + bcolors.ENDC)
-			count_ok = count_ok+1
-		elif only200 == False:
- 			print (bcolors.FAIL + disurl + ' ' + str(r1.status) + ' ' + str(r1.reason) + bcolors.ENDC)
-		count = count+1
-
-	count_int = int(count)
-	count_ok_int = int(count_ok)
-	if count_ok_int != 0 and only200 == True :
-		print('\n[+] %i links have been analyzed and %i of them are available!!!'%(count_int,count_ok_int))
-	elif count_ok_int != 0 :
-		print('\n[+] %i links have been analyzed and %i of them are available!!!'%(count_int,count_ok_int))
-	elif count_ok_int == 0 and only200 == True :
-		print('\n' + bcolors.FAIL + '[+] %i links have been analyzed but any them are available...'%count_int + bcolors.ENDC)
-	else:
-		print('\n' + bcolors.FAIL + '[+] %i links have been analyzed but any them are available...'%count_int + bcolors.ENDC)
+    global pathlist
+    pathlist = []
+    salida = 1
+    try:
+        for line in urllib.request.urlopen("http://" + url + "/robots.txt"):
+            lineStr = str(line, encoding='utf8')
+            path = lineStr.split(': /')
+            if "Disallow" == path[0]:
+                pathlist.append(path[1].replace("\n", "").replace("\r", ""))
+                pathlist = list(set(pathlist))
+            try:
+                inx = pathlist.index("/")
+                del pathlist[inx]
+            except:
+                pass
+    except urllib.error.HTTPError:
+        print("\n" + bcolors.FAIL + "No robots.txt file has been found." + bcolors.ENDC)
+        salida = 0
+    except urllib.error.URLError:
+        print("\n" + bcolors.FAIL + "Please, type a valid URL. This URL can't be resolved." + bcolors.ENDC)
+        print("\n" + bcolors.FAIL + "e.g: python3 parsero.py -u www.behindthefirewalls.com -o -sb" + bcolors.ENDC + "\n")
+        salida = 0
+
+    http = urllib3.PoolManager()
+    count = 0
+    count_ok = 0
+
+    for p in pathlist:
+        disurl = "http://" + url + '/' + p
+        r1 = http.request('GET', disurl, redirect=False, retries=5)
+        if r1.status == 200:
+            print(bcolors.OKGREEN + disurl + ' ' + str(r1.status) + ' ' + str(r1.reason) + bcolors.ENDC)
+            count_ok = count_ok + 1
+        elif only200 == False:
+            print(bcolors.FAIL + disurl + ' ' + str(r1.status) + ' ' + str(r1.reason) + bcolors.ENDC)
+        count = count + 1
+
+    count_int = int(count)
+    count_ok_int = int(count_ok)
+
+    if salida == 1:
+        if count_ok_int != 0 and only200 == True:
+            print('\n[+] %i links have been analyzed and %i of them are available!!!' % (count_int, count_ok_int))
+        elif count_ok_int != 0:
+            print('\n[+] %i links have been analyzed and %i of them are available!!!' % (count_int, count_ok_int))
+        elif count_ok_int == 0 and only200 == True:
+            print('\n' + bcolors.FAIL + '[+] %i links have been analyzed but any them are available...' % count_int + bcolors.ENDC)
+        else:
+            print('\n' + bcolors.FAIL + '[+] %i links have been analyzed but any them are available...' % count_int + bcolors.ENDC)
 
 def search_bing(url, searchbing, only200):
-	
-	try:
-		print("\nSearching the Disallows entries in Bing...\n")
-
-		from bs4 import BeautifulSoup
-		
-		count = 0
-		for p in pathlist:
-			disurl = "http://"+url+'/'+p		
-			opener = urllib.request.build_opener()
-			opener.addheaders = [('User-agent', 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0')]
-		
-			url2 = "http://www.bing.com/search?q=site:"+disurl
-			print (url2)
-			
-			page = opener.open(url2)
-			soup = BeautifulSoup(page)
-	
-			http = urllib3.PoolManager()
-			for cite in soup.findAll('cite'):
-				try:
-					if url in cite.text:
-						count = count +1
-						r2 = http.request('GET',  cite.text, redirect = False, retries = 5)
-						if r2.status == 200:
-							print (bcolors.OKGREEN + ' - ' + cite.text + ' ' + str(r2.status) + ' ' + str(r2.reason) + bcolors.ENDC)
-						elif only200 == False:
- 							print (bcolors.FAIL + ' - ' + cite.text + ' ' + str(r2.status) + ' ' + str(r2.reason) + bcolors.ENDC)
-				except UnicodeEncodeError:
-					pass
-
-		if count == 0:
-			print('\n' + bcolors.FAIL + '[+] No Dissallows have been indexed in Bing' + bcolors.ENDC)
-
-	except ImportError:
-		print(bcolors.FAIL + 'You need to install Beautifulsoup. "sudo pip-3.3 install beautifulsoup4"' + bcolors.ENDC)
+    try:
+        print("\nSearching the Disallows entries in Bing...\n")
+        from bs4 import BeautifulSoup
+
+        count = 0
+        for p in pathlist:
+            disurl = "http://" + url + '/' + p
+            opener = urllib.request.build_opener()
+            opener.addheaders = [('User-agent', 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0')]
+            url2 = "http://www.bing.com/search?q=site:" + disurl
+            print(url2)
+
+            page = opener.open(url2)
+            soup = BeautifulSoup(page)
+
+            http = urllib3.PoolManager()
+            for cite in soup.findAll('cite'):
+                try:
+                    if url in cite.text:
+                        count = count + 1
+                        r2 = http.request('GET', cite.text, redirect=False, retries=5)
+                        if r2.status == 200:
+                            print(bcolors.OKGREEN + ' - ' + cite.text + ' ' + str(r2.status) + ' ' + str(r2.reason) + bcolors.ENDC)
+                        elif only200 == False:
+                            print(bcolors.FAIL + ' - ' + cite.text + ' ' + str(r2.status) + ' ' + str(r2.reason) + bcolors.ENDC)
+                except UnicodeEncodeError:
+                    pass
+
+        if count == 0:
+            print("\n" + bcolors.FAIL + '[+] No Dissallows have been indexed in Bing' + bcolors.ENDC)
+
+    except ImportError:
+        print(bcolors.FAIL + 'You need to install Beautifulsoup. "sudo pip-3.3 install beautifulsoup4"' + bcolors.ENDC)
 
 def date(url):
-	print("Starting Parsero v0.75 (https://github.com/behindthefirewalls/Parsero) at " + time.strftime("%x") + " " + time.strftime("%X"))
-	print("Parsero scan report for " + url)
+    print("Starting Parsero v0.81 (https://github.com/behindthefirewalls/Parsero) at " + time.strftime("%x") + " " + time.strftime("%X"))
+    print("Parsero scan report for " + url)
 
 def main():
-	parse = argparse.ArgumentParser()
-	parse.add_argument('-u', action='store', dest='url', help='Type the URL which will be analyzed')
-	parse.add_argument('-o', action='store_true', dest='only200', help='Show only the "HTTP 200" status code')
-	parse.add_argument('-sb', action='store_true', dest='searchbing', help='Search in Bing indexed Disallows')
-
-	logo()
-
-	args = parse.parse_args()
-	if args.url == None:
-		parse.print_help()
-		print("\n")
-		exit(1)
-
-	url = str(args.url)
-	only200 = args.only200
-	searchbing = args.searchbing
-	date(url)
-	conn_check(url, only200)
-	if searchbing == True:
-		search_bing(url, searchbing, only200)
-
-if __name__=="__main__":
-	start_time = time.time()
-	main()
-	print("\nFinished in", time.time() - start_time, "seconds\n")
+    parse = argparse.ArgumentParser()
+    parse.add_argument('-u', action='store', dest='url', help='Type the URL which will be analyzed')
+    parse.add_argument('-o', action='store_true', dest='only200', help='Show only the "HTTP 200" status code')
+    parse.add_argument('-sb', action='store_true', dest='searchbing', help='Search in Bing indexed Disallows')
+    parse.add_argument('-f', action='store', dest='file', help='Scan a list of domains from a list')
+
+    args = parse.parse_args()
+
+    if args.file == None and args.url == None:
+        logo()
+        parse.print_help()
+        print("\n")
+        exit(1)
+
+    urls = []
+    if args.file != None:
+        try:
+            hostFile = open(args.file, 'r')
+        except IOError:
+            logo()
+            print(bcolors.FAIL + "[-] The file '"'%s'"' doesn't exist." % (args.file) + "\n" + bcolors.ENDC)
+            exit(1)
+
+        for line in hostFile.readlines():
+            line = line.split("\n")
+            urls.append(str(line[0]))
+
+    if args.url != None:
+        urls.append(str(args.url))
+
+    urls = filter(None, urls)
+    urls = list(set(urls))
+    logo()
+    for url in urls:
+        if url.find("http://") == 0:
+            url = url.replace("http://", "")
+        start_time = time.time()
+        only200 = args.only200
+        searchbing = args.searchbing
+        date(url)
+        conn_check(url, only200)
+        if searchbing == True:
+            search_bing(url, searchbing, only200)
+        print("\nFinished in %0.2f seconds.\n" % (time.time() - start_time))
+
+if __name__ == "__main__":
+    main()
+
diff --git a/setup.py b/setup.py
new file mode 100644
index 0000000..342eb9b
--- /dev/null
+++ b/setup.py
@@ -0,0 +1,47 @@
+# parsero - A Python based Robots.txt audit tool
+# Copyright (c) 2013-2014 Javier Nieto <javier.nieto at behindthefirewalls.com>
+#
+# Released under the GPLv2+ license. See LICENSE file for details.
+#
+from setuptools import setup
+import os
+
+def read(fname):
+    return open(os.path.join(os.path.dirname(__file__), fname)).read()
+
+if __name__ == '__main__':
+    setup(
+        name = 'parsero',
+        version="0.81",
+        description = 'A Python based Robots.txt audit tool',
+        long_description = read('README.md'),
+        author = 'Javier Nieto',
+        author_email = 'javier.nieto@behindthefirewalls.com',
+        maintainer = 'Fabian Affolter, C0r3dump, fikoborquez',
+        maintainer_email = 'fabian@affolter-engineering.ch, coredump@autistici.org',
+        url = 'https://github.com/behindthefirewalls/Parsero',
+        license = 'GPLv2+',
+        platforms = 'Linux',
+        py_modules = ['parsero'],
+        entry_points = {
+            'console_scripts': ['parsero = parsero:main'],
+        },
+        include_package_data = True,
+        install_requires = [
+            'beautifulsoup4',
+            'urllib3',
+            'pip'
+        ],
+        keywords = 'Robots.txt Audit Webserver',
+        classifiers = [
+                'Development Status :: 5 - Production/Stable',
+                'Environment :: Console',
+                'Intended Audience :: End Users/Desktop',
+                'Intended Audience :: System Administrators',
+                'License :: OSI Approved :: GNU General Public License v2 or later (GPLv2+)',
+                'Operating System :: POSIX',
+                'Programming Language :: Python :: 3.3',
+                'Topic :: Internet :: WWW/HTTP',
+                'Topic :: Internet :: WWW/HTTP :: Indexing/Search'
+                ],
+    )