Pathprober is a Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once.
Brute-forcing website directories or HTTP pathname and validate using HTTP response code is not relevant anymore. This tool will help you to perform a penetration test, because it could validate the directories using specific-word or 2 words at once and the results will more accurate.
Installation
git clone https://github.com/xchopath/pathprober
cd pathprober/
Requirements
pip3 install -r requirements.txt
Support
Sample usage
Multiple target, multiple path, and multiple words:
python3 pathprober.py -T target.txt -P path.txt -w “APP_NAME” -w2 “DB_PASSWORD”
Single target, multiple path, and single word:
python3 pathprober.py -t https://redacted.com/ -P path.txt -w “APP_NAME”
Multiple target, single path, multiple words, and save output to file:
python3 pathprober.py -T target.txt -p /.env -w “APP_NAME” -w2 “TWILIO” -o output.txt
Need More Help?
bash:~/pathprober$ python3 pathprober.py –help
_ _ _ _ _
|] || | || |] |/ | | |] | |/ | | | | | | | | \ || |] |_ | \
Probe HTTP pathname filtered by words
usage: pathprober.py [-h] [-t https://example.com] [-p pathname] [-T target.txt] [-P path.txt] [-w Word] [-w2 Word] [-o output.txt]
PathProber – Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once
optional arguments:
-h, –help show this help message and exit
-t https://example.com
Single website target
-p pathname Single pathname
-T target.txt Multiple target separated by newline
-P path.txt Multiple pathname separated by newline
-w Word A word that you want to find in a path
-w2 Word A second word that you want to find in a path
-o output.txt Save the results to file
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…