Skip to content
This repository has been archived by the owner on Jun 14, 2024. It is now read-only.

Latest commit

 

History

History
77 lines (54 loc) · 2.87 KB

README.md

File metadata and controls

77 lines (54 loc) · 2.87 KB

DIRBRUTER

DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by launching a dictionary based attack against a webserver and analyse its response.

Python Version OS OS GitHub GitHub repo size GitHub forks GitHub stars

Screenshot from 2023-10-21 02-51-13


Installation

git clone https://github.com/rly0nheart/DirBruter
cd DirBruter
pip install -r requirements.txt

Usage

python dirbruter.py --help
 ____  _        ____             _            
|  _ \(_)_ __  | __ ) _ __ _   _| |_ ___ _ __ 
| | | | | '__| |  _ \| '__| | | | __/ _ \ '__|
| |_| | | |    | |_) | |  | |_| | ||  __/ |   
|____/|_|_|    |____/|_|   \__,_|\__\___|_|   
                                              

usage: dirBruter.py [-h] -w <wordlist> [-o] [-d] [-e <extensions>] url

DirBruter — https://github.com/rly0nheart

positional arguments:
  url                   Target URL

options:
  -h, --help            show this help message and exit
  -w <wordlist>, --wordlist <wordlist>
                        Path to wordlist
  -o, --output          Save found results to a file
  -d, --debug           run in debug mode
  -e <extensions>, --extensions <extensions>
                        Extensions (example ".php,.exe,.bak")

DirBruter is a Python-based CLI tool that looks for hidden or existing directories/files using the brute force method. It basically works by launching a dictionary-based attack against a
webserver and analyzing its response

Disclaimer

This Tool is made for educational purpose, and should not be used in environments without legal authorization. The author will not be responsible for any misuse of this toolkit.

Wordlists

Extensions Wordlist

If you are using default DBwordlist.txt then don't add any other extenstions.

Get the extensions wordlist from SecLists