wfuzz_scan
Execute web application fuzzing to discover hidden directories, files, and parameters by testing various inputs against target URLs.
Instructions
Execute Wfuzz for web application fuzzing.
Args: url: Target URL with FUZZ keyword wordlist: Wordlist file path fuzz_parameter: Parameter to fuzz (default: FUZZ) hide_codes: HTTP status codes to hide threads: Number of concurrent threads follow_redirects: Follow HTTP redirects additional_args: Additional Wfuzz arguments
Returns: Web application fuzzing results
Input Schema
Name | Required | Description | Default |
---|---|---|---|
additional_args | No | ||
follow_redirects | No | ||
fuzz_parameter | No | FUZZ | |
hide_codes | No | 404 | |
threads | No | ||
url | Yes | ||
wordlist | No | /usr/share/wordlists/dirb/common.txt |