BirDuster is a Python based knockoff of the original DirBuster.
BirDuster is a multi threaded Python application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within.
Use PIP: pip3 install --user BirDuster
Clone source:
git clone https://www.github.com/ytisf/BirDuster
cd BirDuster
pip3 install –user -r requirements.txt
python3 BirDuster.py –help
BirDuster has the following flags and options (which you can see with the -h flag):
-h/--help: Show help and exit.-v,-vv,-vvv/--verbosity: Verbosity level.-p/--port: Port to use while dirbusting. Default 80/443.-P/--pfile: If you want to test several ports just write them to a file with newlines.-t/--threads: Amount of concurrent threads. Default is 15.-o/--output: Output CSV of responses. Default is domain_output.csv.-l/--dlist: Directory list file. Default is dir_list.txt.-w/--writereponse: Will write HTTP/S responses to files. Default is False.-i/--ignorecertificate: Ignore SSL certificate errors. Default is False.-u/--useragent: User-Agent to use. Default is random user-agent.--ssl: Use SSL or not. -i flag will automatically turn on SSL.--timeout: Change default socket timeout. Default is 3 seconds.usage: dirbus.py [-h] [-v] [-p PORT] [-P PFILE] [-t THREADS] [-o OUTPUT]
[-l DLIST] [-w] [-i] [-u USERAGENT] [–ssl]
[–timeout TIMEOUT]
domain
positional arguments:
domain domain or host to buster
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…