dirsearch
Web path scanner
Name:dirsearch
Category:Discovery
Publisher:trickest
Created:6/23/2021
Container:
quay.io/trickest/dirsearch:2d21d63
Output Type:
License:Unknown
Source:View Source
Parameters
--ip
Server IP address--raw
Load raw HTTP request from file (use '--scheme' flag to set the scheme)--tor
Use Tor network as proxy--url
Target URL(s), can use multiple flags--auth
Authentication credential (e.g. user:password or bearer token)--cidr
Target CIDR--data
HTTP request data--crawl
Crawl for new paths in responses--delay
Delay between requests--proxy
Proxy URL (HTTP/SOCKS), can use multiple flags--config
Path to configuration file--cookie
Cookie--format
Report format (Available: simple,plain,json,xml,md,csv,html,sqlite,mysql,postgresql)--header
HTTP request header, can use multiple flags--scheme
Scheme for raw request or if there is no scheme in the URL (Default: auto-detect)--capital
Capital wordlist--retries
Number of retries for failed requests--session
Session file--subdirs
Scan sub-directories of the given URL[s] (separated by commas)--threads
Number of threads--timeout
Connection timeout--full-url
Full URLs in the output (enabled automatically in quiet mode)--key-file
File contains client-side certificate private key (unencrypted)--max-rate
Max requests per second--max-time
Maximum runtime for the scan--no-color
No colored output--prefixes
Add custom prefixes to all wordlist entries (separated by commas)--suffixes
Add custom suffixes to all wordlist entries, ignore directories (separated by commas)--wordlists
Wordlist file--auth-type
Authentication type (basic, digest, bearer, ntlm, jwt)--cert-file
File contains client-side certificate--data-file
File contains HTTP request data--interface
Network interface to use--lowercase
Lowercase wordlist--recursive
Brute-force recursively--uppercase
Uppercase wordlist--urls-file
URL list file--wordlists
Wordlists folder--extensions
Extension list separated by commas (e.g. php,asp)--proxy-auth
Proxy authentication credential--quiet-mode
Quiet mode--user-agent
User agent--http-method
HTTP method (default: GET)--nmap-report
Load targets from nmap report (Ensure the inclusion of the -sV flag during nmap scan for comprehensive results)--exclude-text
Exclude responses by text, can use multiple flags--headers-file
File contains HTTP request headers--proxies-file
File contains proxy servers--random-agent
Choose a random User-Agent for each request--replay-proxy
Proxy to replay with found paths--exclude-regex
Exclude responses by regular expression--exclude-sizes
Exclude responses by sizes, separated by commas (e.g. 0B,4KB)--exit-on-error
Exit whenever an error occurs--deep-recursive
Perform recursive scan on every directory depth (e.g. api/users -> api/)--exclude-status
Exclude status codes, separated by commas, support ranges (e.g. 301,500-599)--include-status
Include status codes, separated by commas, support ranges (e.g. 200,300-399)--skip-on-status
Skip target whenever hit one of these status codes, separated by commas, support ranges--exclude-subdirs
Exclude the following subdirectories during recursive scan (separated by commas)--force-recursive
Do recursive brute-force for every found path, not only directories--exclude-redirect
Exclude responses if this regex (or text) matches redirect URL (e.g. '/index.html')--exclude-response
Exclude responses similar to response of this page, path as input (e.g. 404.html)--follow-redirects
Follow HTTP redirects--force-extensions
Add extensions to the end of every wordlist entry. By default dirsearch only replaces the %EXT% keyword with extensions--recursion-status
Valid status codes to perform recursive scan, support ranges (separated by commas)--max-response-size
Maximum response length--min-response-size
Minimum response length--redirects-history
Show redirects history--remove-extensions
Remove extensions in all paths (e.g. admin.php -> admin)--exclude-extensions
Exclude extension list separated by commas (e.g. asp,jsp)--max-recursion-depth
Maximum recursion depth--overwrite-extensions
Overwrite other extensions in the wordlist with your extensions (selected via `-e`)