Lulzbuster : A Very Fast & Smart Web Directory

Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.

Usage

$ lulzbuster -H

Usage
lulzbuster -s [opts] |

Target Options
-s – start url to begin scan with

Http Options
-h – http request type (default: GET) – ? to list types
-x – exclude http status codes (default: 400,404,500,501,502,503
multi codes separated by ‘,’)
-f – follow http redirects. hint: better try appending a ‘/’
with ‘-A’ option first instead of using ‘-f’
-F – num level to follow http redirects (default: 0)
-u – user-agent string (default: built-in windows firefox)
-U – use random built-in user-agents
-c – pass custom header(s) (e.g. ‘Cookie: foo=bar; lol=lulz’)
-a – http auth credentials (format: 🙂
-r – turn on auto update referrer
-j – define http version (default: curl’s default) – ? to list

Timeout Options
-D – num seconds for delay between requests (default: 0)
-C – num seconds for connect timeout (default: 10)
-R – num seconds for request timeout (default: 30)
-T – num seconds to give up and exit lulzbuster completely
(default: none)

Tuning Options
-t – num threads for concurrent scanning (default: 30)
-g – num connection cache size for curl (default: 30)
note: this value should always equal to -t’s value
Other Options
-w – wordlist file
(default: /usr/local/share/lulzbuster/lists/medium.txt)
-A – append any words separated by comma (e.g. ‘/,.php,~bak)
-p – proxy address (format: ://:) – ? to
list supported schemes
-P – proxy auth credentials (format: 🙂
-i – insecure mode (skips ssl/tls cert verification)
-S – smart mode aka eliminate false-positives, more infos,
etc. (use this if speed is not your 1st priority!)
-n – nameservers (default: ‘1.1.1.1,8.8.8.8,208.67.222.222’
multi separated by ‘.’)
-l – log found paths and valid urls to file

Misc
-X – print built-in user-agents
-V – print version of lulzbuster and exit
-H – print this help and exit

Also Read – pwndrop : Self-Deployable File Hosting Service

Notes

  • clean code; real project
  • lulzbuster is already packaged and available for BlackArch Linux
  • My master-branches are always stable; dev-branches are created for current work.
  • All of my public stuff you find are officially announced and published via nullsecurity.net.

Disclaimer

We hereby emphasize, that the hacking related stuff found on nullsecurity.net are only for education purposes. We are not responsible for any damages. You are responsible for your own actions.

Credit: noptrix

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

1 day ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

1 day ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

3 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago