gobuster
Discover hidden directories and files on web servers by brute-forcing URLs with a specified wordlist, status codes, and extensions. Supports custom headers, authentication, and multi-threaded requests for efficient penetration testing.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
basicAuth | No | Basic authentication credentials (username:password) | |
cookie | No | Cookie to include in requests | |
excludeLength | No | Exclude paths of specific lengths | |
extensions | No | File extensions (comma-separated) | |
followRedirect | No | Follow HTTP redirects | |
noTLSValidation | No | Skip TLS certificate validation | |
rawOptions | No | Raw gobuster options | |
statusCodes | No | Valid status codes (comma-separated) | |
target | Yes | Target URL | |
threads | No | Number of threads | |
timeout | No | Timeout for requests | |
useragent | No | User-Agent string | |
wordlist | Yes | Path to wordlist |