Kali Linux

BirDuster : A Multi Threaded Python Script Designed To Brute Force Directories

BirDuster is a Python based knockoff of the original DirBuster.

BirDuster is a multi threaded Python application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within.

Installation

Use PIP: pip3 install --user BirDuster

Clone source:

git clone https://www.github.com/ytisf/BirDuster
cd BirDuster
pip3 install –user -r requirements.txt
python3 BirDuster.py –help

Usage

BirDuster has the following flags and options (which you can see with the -h flag):

  • -h/--help: Show help and exit.
  • -v,-vv,-vvv/--verbosity: Verbosity level.
  • -p/--port: Port to use while dirbusting. Default 80/443.
  • -P/--pfile: If you want to test several ports just write them to a file with newlines.
  • -t/--threads: Amount of concurrent threads. Default is 15.
  • -o/--output: Output CSV of responses. Default is domain_output.csv.
  • -l/--dlist: Directory list file. Default is dir_list.txt.
  • -w/--writereponse: Will write HTTP/S responses to files. Default is False.
  • -i/--ignorecertificate: Ignore SSL certificate errors. Default is False.
  • -u/--useragent: User-Agent to use. Default is random user-agent.
  • --ssl: Use SSL or not. -i flag will automatically turn on SSL.
  • --timeout: Change default socket timeout. Default is 3 seconds.

usage: dirbus.py [-h] [-v] [-p PORT] [-P PFILE] [-t THREADS] [-o OUTPUT]
[-l DLIST] [-w] [-i] [-u USERAGENT] [–ssl]
[–timeout TIMEOUT]
domain
positional arguments:
domain domain or host to buster

R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

5 hours ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

5 hours ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

5 hours ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

1 day ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

1 day ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

1 day ago