https://github.com/d1se0/directorybrute
Directorybrute is a directory and file brute-force tool designed to discover hidden directories and files on web servers using HTTP requests.
https://github.com/d1se0/directorybrute
cibersecurity command-line commands ethical-hacking hacking hackingetico kali-linux linux pentesters pentesting redteam
Last synced: 12 days ago
JSON representation
Directorybrute is a directory and file brute-force tool designed to discover hidden directories and files on web servers using HTTP requests.
- Host: GitHub
- URL: https://github.com/d1se0/directorybrute
- Owner: D1se0
- Created: 2024-06-20T19:12:55.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-06-21T09:57:34.000Z (over 1 year ago)
- Last Synced: 2025-01-19T08:17:47.708Z (12 months ago)
- Topics: cibersecurity, command-line, commands, ethical-hacking, hacking, hackingetico, kali-linux, linux, pentesters, pentesting, redteam
- Language: Python
- Homepage:
- Size: 34.2 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Directorybrute
Directorybrute is a directory and file brute-force tool designed to discover hidden directories and files on web servers using HTTP requests.
---
## Features
- Directory and file brute-forcing on web servers.
- Support for both HTTP and HTTPS.
- Option to specify a custom list of directories.
- Detailed result reporting.
---
## Installation
To install `Directorybrute`, follow these steps:
### Clone the repository from GitHub:
```bash
git clone https://github.com/D1se0/directorybrute.git
```
### Navigate into the cloned repository directory:
```bash
cd directorybrute
```
### Install the required dependencies:
```bash
./requirements.txt
```
or
```bash
pip3 install requests colorama tqdm
```
## Usage
To run `Directorybrute`, use the following command from the command line:
```bash
python3 directorybrute.py [-u URL] [-w WORDLIST] [--hp HIDDEN-PROTOCOL] [-x EXTENSIONS] [-t THREADS] [-f FILE]
```
## Parameters
`-h`, `--help` = show this help message and exit
`-w` WORDLIST, `--wordlist` WORDLIST = Path to the wordlist for brute-forcing.
`-t` THREADS, `--threads` THREADS = Number of concurrent threads (optional, default is 10).
`-u` URL, `--url` URL = URL with BRUTE where it will be replaced to perform brute force (for example, "example.com/BRUTE").
`--https` = Use https instead of http.
`--hp` HP, `--hide-status` HP = Hide specific HTTP status codes (for example, "200,202").
`--hw` HW, `--hide-size` HW = Hide specific content sizes (for example, "128,256").
`-x` EXTENSIONS, `--extensions` EXTENSIONS = Extensions to try, separated by commas (e.g. "txt,html,php").
`--hd`, `--hidden-directories` = Add a period in front of each word to discover hidden directories or files.
`-f` FILE, `--file` FILE = File name to export the results.
### Example usage:
```bash
python3 directorybrute.py -u http://example.com/BRUTE -w [WORDLIST] --hp "404" -x "txt,html,php"
```
## Examples
Here are examples demonstrating the execution process and obtained results:
Running Directorybrute against a website:
```bash
python3 directorybrute.py -u http://example.com/BRUTE -w [WORDLIST] --hp "404"
```
Running with a custom wordlist and more concurrent threads:
```bash
python3 directorybrute.py -u https://example.com -w [WORDLIST] --hp "404" -x "txt,html,php" -t 30
```
## Contributing
Contributions are welcome! Please fork the repository and submit a pull request with your changes.
## License
This project is licensed under the MIT License - see the LICENSE file for details.