Skip to main content
Glama

gobuster

Discover hidden directories and files on web servers by brute-forcing URLs with a specified wordlist, status codes, and extensions. Supports custom headers, authentication, and multi-threaded requests for efficient penetration testing.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
basicAuthNoBasic authentication credentials (username:password)
cookieNoCookie to include in requests
excludeLengthNoExclude paths of specific lengths
extensionsNoFile extensions (comma-separated)
followRedirectNoFollow HTTP redirects
noTLSValidationNoSkip TLS certificate validation
rawOptionsNoRaw gobuster options
statusCodesNoValid status codes (comma-separated)
targetYesTarget URL
threadsNoNumber of threads
timeoutNoTimeout for requests
useragentNoUser-Agent string
wordlistYesPath to wordlist

Other Tools

Related Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DMontgomery40/pentest-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server