githubEdit

Crawl/Fuzz

Crawlers

Commands:

dirhunt https://url.com/
hakrawler -domain https://url.com/
python3 sourcewolf.py -h
gospider -s "https://example.com/" -o output -c 10 -d 1
gospider -S sites.txt -o output -c 10 -d 1
gospider -s "https://example.com/" -o output -c 10 -d 1 --other-source --include-subs

Fuzzers

ffuf

Discover content:

ffuf -recursion -mc all -ac -c -e .htm,.shtml,.php,.html,.js,.txt,.zip,.bak,.asp,.aspx,.xml -w six2dez/OneListForAll/onelistforall.txt -u https://url.com/FUZZ

Headers discovery:

ffuf -mc all -ac -u https://hackxor.net -w six2dez/OneListForAll/onelistforall.txt -c -H "FUZZ: Hellothereheadertesting123 asd"

Proxy / Burp replay:

ffuf -replay-proxy http:127.0.0.1:8080

Fuzzing extensions (common set):

Backups extensions (examples):

kr (kiterunner)

Repository: https://github.com/assetnote/kiterunner

Examples:

chameleon

Repository: https://github.com/iustin24/chameleon

Example:

Best wordlists for fuzzing

  • https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content

    • raft-large-directories-lowercase.txt

    • directory-list-2.3-medium.txt

    • RobotsDisallowed/top10000.txt

  • https://github.com/assetnote/commonspeak2-wordlists/tree/master/wordswithext

  • https://github.com/random-robbie/bruteforce-lists

  • https://github.com/google/fuzzing/tree/master/dictionaries

  • https://github.com/six2dez/OneListForAll

  • AIO: https://github.com/foospidy/payloads

  • Check https://wordlists.assetnote.io/

circle-info

Pro tip: set the header Host: localhost

Custom generated dictionary examples

Generate paths from gau output:

Get files only:

Other examples:

Hardware devices admin panel

Default HTTP login hunter: https://github.com/InfosecMatter/default-http-login-hunter

Example:

Dirsearch

Example:

dirb

Example:

wfuzz

Example:

gobuster

Example:

Cansina

Repository: https://github.com/deibit/cansina

Example:

Get endpoints from JS

LinkFinder: https://github.com/GerbenJavado/LinkFinder

Examples:

JS enumeration script: https://github.com/KathanP19/JSFScan.sh

Rate limiting tip

If you get HTTP 429 responses, try adding one of these headers (set value to an IP you control or to localhost for bypass attempts):

  • Client-Ip: IP

  • X-Client-Ip: IP

  • X-Forwarded-For: IP

  • X-Forwarded-For: 127.0.0.1

Last updated