Skip to main content
Glama

MCP Pentest

directory_bruteforce

Discover hidden directories and files on web servers by systematically testing common paths and extensions to identify exposed resources during security assessments.

Instructions

Bruteforce directories and files on web server

Input Schema

NameRequiredDescriptionDefault
extensionsNoFile extensions to check
urlYesTarget URL
use_seclistsNoUse SecLists common lists if no wordlist provided
wordlistNoWordlist to use

Input Schema (JSON Schema)

{ "properties": { "extensions": { "description": "File extensions to check", "items": { "type": "string" }, "type": "array" }, "url": { "description": "Target URL", "type": "string" }, "use_seclists": { "description": "Use SecLists common lists if no wordlist provided", "type": "boolean" }, "wordlist": { "description": "Wordlist to use", "type": "string" } }, "required": [ "url" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'

If you have feedback or need assistance with the MCP directory API, please join our Discord server