feroxbuster_scan
Perform recursive directory scanning to discover hidden files and directories on web servers using brute-force wordlist attacks for security testing.
Instructions
Execute Feroxbuster for fast recursive directory scanning.
Args: url: Target URL wordlist: Wordlist file path threads: Number of concurrent threads depth: Maximum recursion depth extensions: File extensions to search for filter_codes: HTTP status codes to filter out timeout: Request timeout in seconds additional_args: Additional Feroxbuster arguments
Returns: Recursive directory discovery results
Input Schema
Name | Required | Description | Default |
---|---|---|---|
additional_args | No | ||
depth | No | ||
extensions | No | ||
filter_codes | No | 404 | |
threads | No | ||
timeout | No | ||
url | Yes | ||
wordlist | No | /usr/share/wordlists/dirb/common.txt |
Input Schema (JSON Schema)
{
"properties": {
"additional_args": {
"default": "",
"title": "Additional Args",
"type": "string"
},
"depth": {
"default": 4,
"title": "Depth",
"type": "integer"
},
"extensions": {
"default": "",
"title": "Extensions",
"type": "string"
},
"filter_codes": {
"default": "404",
"title": "Filter Codes",
"type": "string"
},
"threads": {
"default": 10,
"title": "Threads",
"type": "integer"
},
"timeout": {
"default": 7,
"title": "Timeout",
"type": "integer"
},
"url": {
"title": "Url",
"type": "string"
},
"wordlist": {
"default": "/usr/share/wordlists/dirb/common.txt",
"title": "Wordlist",
"type": "string"
}
},
"required": [
"url"
],
"type": "object"
}