Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/passthehashbrowns/SharpBuster
SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and similar tools, when running a similar tool over a SOCKS proxy is not feasible.
https://github.com/passthehashbrowns/SharpBuster
Last synced: 22 days ago
JSON representation
SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and similar tools, when running a similar tool over a SOCKS proxy is not feasible.
- Host: GitHub
- URL: https://github.com/passthehashbrowns/SharpBuster
- Owner: passthehashbrowns
- Created: 2020-08-31T00:33:02.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-09-02T15:46:03.000Z (over 4 years ago)
- Last Synced: 2024-08-05T17:24:16.179Z (4 months ago)
- Language: C#
- Homepage:
- Size: 463 KB
- Stars: 59
- Watchers: 3
- Forks: 7
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - passthehashbrowns/SharpBuster - SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and similar tools, when running a similar tool over a SOCKS proxy is (C# #)
README
# SharpBuster
This is a C# implementation of a directory brute forcing tool designed to allow for in-memory execution.## Why another directory brute forcing tool?
I couldn't find one written in C# for use with tools such as Cobalt Strike's execute-assembly, where it's not feasible to perform directory fuzzing over a SOCKS proxy.There's also an option to download a wordlist from a remote host to avoid dropping files to disk.
## Usage
Using a wordlist on disk:SharpBuster.exe -u http://google.com -w C:\Windows\Users\Public\wordlist.txt
Downloading a wordlist from a remote host:
SharpBuster.exe -u http://google.com --wordlisturl http://example.com/wordlist.txt
Run with extensions appended to the wordlist:
SharpBuster.exe -u http://google.com --wordlisturl http://example.com/wordlist.txt -e php,aspx
Run with extensions and recurse through directories: (Note: recursion is in the works)
SharpBuster.exe -u http://google.com --wordlisturl http://example.com/wordlist.txt -e php,aspx --recursion true
## Help
```shell
Options:
-u | --url The URL to brute force
-w | --wordlist The full path to the wordlist to use
-wu | --wordlisturl URL of wordlist to use to avoid writing to disk
-bi | --builtin Uses the wordlist hardcoded into the source. Blank by default. Can be used to avoid writing to disk or requesting a remote file.
-e | --ext A comma separated list of extensions to append, ex: php,asp,aspx
-r | --recursive Perform a recurisve search
--username Username for basic authentication
--password Password for authentication
--proxy Address of proxy to use, ex: http://127.0.0.1:8080
--proxy-creds Credentials to use to authenticate to proxy, ex: username:password
--cookie Cookie to use, ex: myCookie=value | If multiple cookies are being used, separate them with a comma
--threads Number of threads to use. Default: 2
--timeout Amount of seconds to wait before timing out. Default: 10 seconds
-k | --insecure Ignore SSL certificate checking
--user-agent User agent to use. Default: SharpBuster
-fc | --filter-codes Codes to exclude from the results. Separated by comma, ex: 403,404,301
-ac | --allow-codes Only allow certain codes. Separated by comma, ex: 200,301,302
-h | --help Show help information
```