Categories: Kali Linux

DeepSearch – Advanced Web Dir Scanner For Bruteforce

DeepSearch is a simple command line tool for bruteforce directories and files in websites. you can also use Dark web browser to surf anonymously.

DeepSearch Installation

$ git clone https://github.com/m4ll0k/DeepSearch.git deepsearch
$ cd deepsearch 
$ pip3 install requests
$ python3 deepsearch.py

Also ReadInvisi-Shell : Hide Your Powershell Script In Plain Sight(Bypass all Powershell security features)

Usage

Basic:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt

Force extension for every wordlist entry (support one extension):

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -f

Make a request by hostname (ip):

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -b

Force lowercase for every wordlist entry:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -l

Force uppercase for every wordlist entry:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -p

Show only status code separated by comma:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -o 200,301,302

Exclude status code separated by comma:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -x 501,502,503,401

URL Injection Point (%word%):

python3 deepsearch.py -u http://testphp.vulnweb.com/test%1%.php -e php -w wordlist.txt

URL Injection Point (%%):

python3 deepsearch.py -u http://testphp.vulnweb.com/id/%%/index.html -e php -w wordlist.txt

URL Injection Point in Parameters:

python3 deepsearch.py -u http://testphp.vulnweb.com/index.php?id=%2%&user=1 -e php -w wordlist.txt

python3 deepsearch.py -u http://testphp.vulnweb.com/index.php?%id%=1&user=2 -e php -w wordlist.txt

Add Headers:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -H "Content-Type:text/html\nETag:1234"

Proxy:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -P 127.0.0.1:8080

URLs by list:

python3 deepsearch.py -U my_urls.txt -e php -w wordlist.txt

Other Options:

python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -t 10 -T 3 -d 2 -R -c "test=test" --random-agent

Screenshot

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

R K

Recent Posts

ParadeDB : Revolutionizing Postgres For Advanced Search And Analytics

ParadeDB is an Elasticsearch alternative built on Postgres. We're modernizing the features of Elasticsearch's product…

10 hours ago

Invoke-AtomicAssessment : Unleashing The Power Of Adversary Emulation For Enhanced Cybersecurity

Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.…

10 hours ago

Wicked Panda APT Adversary Simulation

This is a simulation of attack by the Wicked Panda group (APT-41) targeting U.S. state…

10 hours ago

Cyberbro : Revolutionizing Threat Intelligence With Simplified IoC Analysis

A simple application that extracts your IoCs from garbage input and checks their reputation using…

10 hours ago

B(l)utter

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. Currently, the application supports…

1 day ago

FLARE-VM : A Comprehensive Guide To Establishing A Reverse Engineering Lab On Windows

Welcome to FLARE-VM - a collection of software installations scripts for Windows systems that allows…

1 day ago