wfuzz_scan
Execute web application fuzzing to discover hidden directories, files, and parameters by testing various inputs against target URLs.
Instructions
Execute Wfuzz for web application fuzzing.
Args: url: Target URL with FUZZ keyword wordlist: Wordlist file path fuzz_parameter: Parameter to fuzz (default: FUZZ) hide_codes: HTTP status codes to hide threads: Number of concurrent threads follow_redirects: Follow HTTP redirects additional_args: Additional Wfuzz arguments
Returns: Web application fuzzing results
Input Schema
Name | Required | Description | Default |
---|---|---|---|
additional_args | No | ||
follow_redirects | No | ||
fuzz_parameter | No | FUZZ | |
hide_codes | No | 404 | |
threads | No | ||
url | Yes | ||
wordlist | No | /usr/share/wordlists/dirb/common.txt |
Input Schema (JSON Schema)
{
"properties": {
"additional_args": {
"default": "",
"title": "Additional Args",
"type": "string"
},
"follow_redirects": {
"default": false,
"title": "Follow Redirects",
"type": "boolean"
},
"fuzz_parameter": {
"default": "FUZZ",
"title": "Fuzz Parameter",
"type": "string"
},
"hide_codes": {
"default": "404",
"title": "Hide Codes",
"type": "string"
},
"threads": {
"default": 10,
"title": "Threads",
"type": "integer"
},
"url": {
"title": "Url",
"type": "string"
},
"wordlist": {
"default": "/usr/share/wordlists/dirb/common.txt",
"title": "Wordlist",
"type": "string"
}
},
"required": [
"url"
],
"type": "object"
}