wfuzz
Wfuzz can be used to look for hidden content, such as files and directories, within a web server, allowing to find further attack vectors. It is worth noting that, the success of this task depends highly on the dictionaries used.
Name:wfuzz
Category:Fuzzing
Publisher:trickest
Created:6/23/2021
Container:
quay.io/trickest/wfuzz:3.1.0
Output Type:
License:Unknown
Source:View Source
Parameters
--field
Do not show the payload but only the specified language expression. Repeat for various fields.-b
Specify a cookie for the requests. Repeat option for various cookies.--efield
Show the specified language expression together with the current payload. Repeat for various fields.-H
Use header (ex:Cookie:id=1312321&user=FUZZ). Repeat option for various headers.--recipe
Reads options from a recipe. Repeat for various recipes.-p
Use Proxy in format ip:port:type. Repeat option for using various proxies.-w
Specify a wordlist file (alias for -z file,wordlist).--ntlm
in format user:pass or FUZZ:FUZZ or domainFUZ2Z:FUZZ-d
Use post data (ex: id=FUZZ&catalogue=1)-Z
Scan mode (Connection errors will be ignored)--basic
in format user:pass or FUZZ:FUZZ or domainFUZ2Z:FUZZ--digest
in format user:pass or FUZZ:FUZZ or domainFUZ2Z:FUZZ--dump-recipe
Prints current options as a recipe-X
Specify an HTTP method for the request, ie. HEAD or FUZZ--script
Equivalent to --script=default-c
Output with colors--zP
Arguments for the specified payload (it must be preceded by -z or -w).--slice
Filter payload's elements using the specified expression. It must be preceded by -z.-D
Maximum link depth level.--dry-run
Print the results of applying the requests without actually making any HTTP request.--zE
Encoder for the specified payload (it must be preceded by -z or -w).--req-delay
Sets the maximum time in seconds the request is allowed to take (CURLOPT_TIMEOUT). Default 90.-z
Specify a payload for each FUZZ keyword used in the form of name[,parameter][,encoder].A list of encoders can be used, ie. md5-sha1. Encoders can be chained, ie. md5@sha1. Encoders category can be used. ie. url
Specify a URL for the request.--filter
Show/hide responses using the specified filter expression (Use BBB for taking values from baseline)-m
Specify an iterator for combining payloads--conn-delay
Sets the maximum time in seconds the connection phase to the server to take (CURLOPT_CONNECTTIMEOUT). Default 90.--hc
Hide responses with the specified code (Use BBB for taking values from baseline)--sc
Show responses with the specified code (Use BBB for taking values from baseline)--hh
Hide responses with the specified code/lines/words/chars (Use BBB for taking values from baseline)--hl
Hide responses with the specified lines (Use BBB for taking values from baseline)--hw
Hide responses with the specified words (Use BBB for taking values from baseline)-R
Recursive path discovery being depth the maximum recursion level.--sh
Show responses with the specified chars (Use BBB for taking values from baseline)--sl
Show responses with the specified lines (Use BBB for taking values from baseline)--sw
Show responses with the specified words (Use BBB for taking values from baseline)-t
Specify the number of concurrent connections (10 default)--no-cache
Disable plugins cache. Every request will be scanned.--prefilter
Filter items before fuzzing using the specified expression. Repeat for concatenating filters.--prev
Print the previous HTTP requests (only when using payloads generating fuzzresults)-V
All parameters bruteforcing (allvars and allpost). No need for FUZZ keyword.--script-args
Provide arguments to scripts. ie. --script-args grep.regex=<A href=(.*?)>-L
Follow HTTP redirections--ip
Specify an IP to connect to instead of the URL's host in the format ip:port--prefilter
Filter items before fuzzing using the specified expression. Repeat for concatenating filters.-s
Specify time delay between requests