Discover Paths via Directory Brute Force
Brute force a list of web server URLs to discover hidden paths and endpoints
Category
Content Discovery
Inputs
urls
file
requiredList of URLs
header
string
Header(s) to include in HTTP requests
wordlist
file
Custom directory brute force wordlist
rate-limit
string
Maximum number of requests to send per second per machine
header-file
file
Header(s) to include in HTTP requests
Outputs
url-detailsurls
Discover Paths via Directory Brute Force
Description
Brute force a list of web server URLs to discover hidden paths and endpoints.
Features
- Includes heuristic filtering to reduce false positives from masked 404 pages.
- Built-in wordlist with an option to use a custom one tailored to your target.
- Can brute force thousands of web servers simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- wordlist: a custom directory brute force wordlist
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- urls: List of discovered URLs.
- url-details: JSONLines records of URL discovery details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Improved the filtering algorithm to reduce false positives by 50% to 80%.
- v1.2.0
- Added support for using multiple wordlists in a single run.
- Defaulted to URL-encoding space characters in wordlists.
- v1.3.0
- Added
header-file
input
- Added