gobuster
Discover hidden directories and files on web servers by brute-forcing URLs with a specified wordlist, status codes, and extensions. Supports custom headers, authentication, and multi-threaded requests for efficient penetration testing.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| basicAuth | No | Basic authentication credentials (username:password) | |
| cookie | No | Cookie to include in requests | |
| excludeLength | No | Exclude paths of specific lengths | |
| extensions | No | File extensions (comma-separated) | |
| followRedirect | No | Follow HTTP redirects | |
| noTLSValidation | No | Skip TLS certificate validation | |
| rawOptions | No | Raw gobuster options | |
| statusCodes | No | Valid status codes (comma-separated) | |
| target | Yes | Target URL | |
| threads | No | Number of threads | |
| timeout | No | Timeout for requests | |
| useragent | No | User-Agent string | |
| wordlist | Yes | Path to wordlist |