Lulzbuster : A Very Fast & Smart Web Directory

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

Usage

$ lulzbuster -H

Usage
lulzbuster -s [opts] |

Target Options
-s – start url to begin scan with

Http Options
-h – http request type (default: GET) – ? to list types
-x – exclude http status codes (default: 400,404,500,501,502,503
multi codes separated by ‘,’)
-f – follow http redirects. hint: better try appending a ‘/’
with ‘-A’ option first instead of using ‘-f’
-F – num level to follow http redirects (default: 0)
-u – user-agent string (default: built-in windows firefox)
-U – use random built-in user-agents
-c – pass custom header(s) (e.g. ‘Cookie: foo=bar; lol=lulz’)
-a – http auth credentials (format: 🙂
-r – turn on auto update referrer
-j – define http version (default: curl’s default) – ? to list

Timeout Options
-D – num seconds for delay between requests (default: 0)
-C – num seconds for connect timeout (default: 10)
-R – num seconds for request timeout (default: 30)
-T – num seconds to give up and exit lulzbuster completely
(default: none)

Tuning Options
-t – num threads for concurrent scanning (default: 30)
-g – num connection cache size for curl (default: 30)
note: this value should always equal to -t’s value
Other Options
-w – wordlist file
(default: /usr/local/share/lulzbuster/lists/medium.txt)
-A – append any words separated by comma (e.g. ‘/,.php,~bak)
-p – proxy address (format: ://:) – ? to
list supported schemes
-P – proxy auth credentials (format: 🙂
-i – insecure mode (skips ssl/tls cert verification)
-S – smart mode aka eliminate false-positives, more infos,
etc. (use this if speed is not your 1st priority!)
-n – nameservers (default: ‘1.1.1.1,8.8.8.8,208.67.222.222’
multi separated by ‘.’)
-l – log found paths and valid urls to file

Misc
-X – print built-in user-agents
-V – print version of lulzbuster and exit
-H – print this help and exit

Also Read – pwndrop : Self-Deployable File Hosting Service

Notes

  • clean code; real project
  • lulzbuster is already packaged and available for BlackArch Linux
  • My master-branches are always stable; dev-branches are created for current work.
  • All of my public stuff you find are officially announced and published via nullsecurity.net.

Disclaimer

We hereby emphasize, that the hacking related stuff found on nullsecurity.net are only for education purposes. We are not responsible for any damages. You are responsible for your own actions.

Credit: noptrix

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago