kali_web_gobuster_dir
Enumerate hidden directories and files on web servers using wordlist brute-forcing to identify potential vulnerabilities during security assessments.
Instructions
Enumerate directories and files on web servers using wordlists.
Gobuster is a fast directory/file brute-forcing tool written in Go.
Features:
Fast multi-threaded scanning
Customizable file extensions
Status code filtering
Recursive scanning support
Example:
Basic: url="https://example.com", wordlist="/usr/share/wordlists/dirb/common.txt"
With extensions: url="https://example.com", extensions="php,html,txt"
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Target URL (e.g., 'https://example.com') | |
| wordlist | No | Wordlist file path | /usr/share/wordlists/dirb/common.txt |
| extensions | No | File extensions to append (e.g., 'php,html,txt') | |
| threads | No | Number of concurrent threads | |
| status_codes | No | Positive status codes (comma-separated) | 200,204,301,302,307,401,403 |
| timeout | No | Scan timeout in seconds | |
| user_agent | No | Custom User-Agent string | |
| follow_redirect | No | Follow redirects |