Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.
Usage
$ lulzbuster -H
Usage
lulzbuster -s [opts] |
Target Options
-s – start url to begin scan with
Http Options
-h – http request type (default: GET) – ? to list types
-x – exclude http status codes (default: 400,404,500,501,502,503
multi codes separated by ‘,’)
-f – follow http redirects. hint: better try appending a ‘/’
with ‘-A’ option first instead of using ‘-f’
-F – num level to follow http redirects (default: 0)
-u – user-agent string (default: built-in windows firefox)
-U – use random built-in user-agents
-c – pass custom header(s) (e.g. ‘Cookie: foo=bar; lol=lulz’)
-a – http auth credentials (format: 🙂
-r – turn on auto update referrer
-j – define http version (default: curl’s default) – ? to list
Timeout Options
-D – num seconds for delay between requests (default: 0)
-C – num seconds for connect timeout (default: 10)
-R – num seconds for request timeout (default: 30)
-T – num seconds to give up and exit lulzbuster completely
(default: none)
Tuning Options
-t – num threads for concurrent scanning (default: 30)
-g – num connection cache size for curl (default: 30)
note: this value should always equal to -t’s value
Other Options
-w – wordlist file
(default: /usr/local/share/lulzbuster/lists/medium.txt)
-A – append any words separated by comma (e.g. ‘/,.php,~bak)
-p – proxy address (format: ://:) – ? to
list supported schemes
-P – proxy auth credentials (format: 🙂
-i – insecure mode (skips ssl/tls cert verification)
-S – smart mode aka eliminate false-positives, more infos,
etc. (use this if speed is not your 1st priority!)
-n – nameservers (default: ‘1.1.1.1,8.8.8.8,208.67.222.222’
multi separated by ‘.’)
-l – log found paths and valid urls to file
Misc
-X – print built-in user-agents
-V – print version of lulzbuster and exit
-H – print this help and exit
Also Read – pwndrop : Self-Deployable File Hosting Service
Notes
Disclaimer
We hereby emphasize, that the hacking related stuff found on nullsecurity.net are only for education purposes. We are not responsible for any damages. You are responsible for your own actions.
Credit: noptrix
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…