gobuster
Discover hidden files and directories on web servers using brute-force techniques with a specified wordlist. Configure authentication, extensions, and status codes for targeted scanning.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
basicAuth | No | Basic authentication credentials (username:password) | |
cookie | No | Cookie to include in requests | |
excludeLength | No | Exclude paths of specific lengths | |
extensions | No | File extensions (comma-separated) | |
followRedirect | No | Follow HTTP redirects | |
noTLSValidation | No | Skip TLS certificate validation | |
rawOptions | No | Raw gobuster options | |
statusCodes | No | Valid status codes (comma-separated) | |
target | Yes | Target URL | |
threads | No | Number of threads | |
timeout | No | Timeout for requests | |
useragent | No | User-Agent string | |
wordlist | Yes | Path to wordlist |
Input Schema (JSON Schema)
You must be authenticated.
Other Tools from Pentest MCP
Related Tools
- @BurtTheCoder/mcp-virustotal
- @spences10/mcp-omnisearch
- @bsmi021/mcp-server-webscan
- @DMontgomery40/pentest-mcp
- @spences10/mcp-omnisearch