dirsearch
dirsearch is a command-line tool designed to brute force directories and files in webservers. It offers complex web content discovery with multiple wordlist options, high accuracy, impressive performance, and advanced features.
Description
dirsearch is a feature-rich web path scanner that performs brute-force attacks against web servers to discover hidden directories and files. It supports various wordlist sources, extensions, and modern brute-force techniques, making it suitable for comprehensive web reconnaissance during penetration testing and security assessments.
The tool excels in high-performance scanning with configurable threads, recursive brute-forcing, and advanced request customization including HTTP methods, headers, and proxies. Users can tailor scans for specific needs, such as targeting particular file extensions or crawling responses for additional paths.
dirsearch provides flexible output formats including JSON, XML, CSV, and HTML, along with logging capabilities. Its quiet mode and customizable display options make it suitable for both interactive use and automated security testing pipelines.
How It Works
dirsearch performs brute-force scanning by systematically requesting combinations of dictionary words and file extensions against target web servers. It uses multi-threading for high performance, supports recursive scanning of discovered directories, and employs advanced techniques like forced extensions and deep recursion. The tool handles HTTP methods beyond GET, custom headers/data, proxy chains, and connection controls like timeouts and delays. Response analysis identifies valid paths through status codes and content signatures, with optional crawling of responses for additional discovery.
Installation
sudo apt install dirsearchFlags
Examples
dirsearch -hdirsearch -u http://example.comdirsearch -u http://example.com -e php,aspdirsearch -u http://example.com -w /path/to/wordlist.txtdirsearch -u http://example.com -t 50dirsearch -u http://example.com -rdirsearch -u http://example.com --proxy http://proxy:8080dirsearch -u http://example.com -o results.json --format=json