Kali Linux

DirSearch : A Go Implementation Of Dirsearch

DirSearch software is a Go implementation of the original dirsearch tool written by Mauro Soria. DirSearch is the very first tool I write in Go, mostly to play and experiment with Go’s concurrency model, channels, and so forth.

Purpose

DirSearch takes an input URL ( -url parameter ) and a wordlist ( -wordlist parameter ), it will then perform concurrent HEAD requests using the lines of the wordlist as paths and files eventually brute forcing folders and files on a web server.

It supports a custom file extension ( -ext, default to php ) and other optional arguments:

Usage of dirsearch:
-200only
If enabled, will only display responses with 200 status code.
-consumers int
Number of concurrent consumers. (default 8)
-ext string
File extension. (default “php”)
-maxerrors int
Maximum number of errors to get before killing the program. (default 20)
-url string
Base URL to start enumeration from.
-wordlist string
Wordlist file to use for enumeration. (default “dict.txt”)

Compilation

go get github.com/evilsocket/dirsearch
cd dirsearch
make get_glide
make install_dependencies
make build

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

10 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

10 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

10 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

10 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

10 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

13 hours ago