Skip to main content
Glama

kali_web_gobuster_dir

Enumerate hidden directories and files on web servers using wordlist brute-forcing to identify potential vulnerabilities during security assessments.

Instructions

Enumerate directories and files on web servers using wordlists.

Gobuster is a fast directory/file brute-forcing tool written in Go.

Features:

  • Fast multi-threaded scanning

  • Customizable file extensions

  • Status code filtering

  • Recursive scanning support

Example:

  • Basic: url="https://example.com", wordlist="/usr/share/wordlists/dirb/common.txt"

  • With extensions: url="https://example.com", extensions="php,html,txt"

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
urlYesTarget URL (e.g., 'https://example.com')
wordlistNoWordlist file path/usr/share/wordlists/dirb/common.txt
extensionsNoFile extensions to append (e.g., 'php,html,txt')
threadsNoNumber of concurrent threads
status_codesNoPositive status codes (comma-separated)200,204,301,302,307,401,403
timeoutNoScan timeout in seconds
user_agentNoCustom User-Agent string
follow_redirectNoFollow redirects

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/azza39925/kali-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server