Skip to main content
Glama

MCP Pentest

fuzzing_directories

Discover hidden directories and files on web servers using ffuf or wfuzz to identify exposed resources and potential security vulnerabilities during penetration testing.

Instructions

Fuzz directories and files using ffuf/wfuzz

Input Schema

NameRequiredDescriptionDefault
extensionsNoFile extensions to test
targetYesTarget base URL
toolNoFuzzing tool to use

Input Schema (JSON Schema)

{ "properties": { "extensions": { "description": "File extensions to test", "items": { "type": "string" }, "type": "array" }, "target": { "description": "Target base URL", "type": "string" }, "tool": { "description": "Fuzzing tool to use", "enum": [ "ffuf", "wfuzz" ], "type": "string" } }, "required": [ "target" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/adriyansyah-mf/mcp-pentest'

If you have feedback or need assistance with the MCP directory API, please join our Discord server