This page compares popular directory bruteforcing tools and includes handy scripts and online tools for usage.
A fast and simple directory/file bruteforcer written in Rust.
feroxbuster -u http://target -w wordlist.txt -r -x .php,.sql,.bak,.conf
#!/bin/bash # āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā # š Ask for Target URL read -p "š Enter target URL (e.g., https://example.com): " TARGET_URL # š Ask for Wordlist path read -p "š Enter path to wordlist (e.g., /usr/share/seclists/...): " WORDLIST # š§© File extensions to test (compressed, no spaces) EXTS=$(echo ".php,.asp,.aspx,.jsp,.cgi,.pl,.py,.rb,.go,.conf,.cfg,.ini,.yaml,.yml,.json,.xml,.env,.bak,.old,.backup,.zip,.tar,.tar.gz,.rar,.7z,.txt,.log,.md,.csv,.sql,.db,.sqlite,.sqlite3,.test,.dev,.temp,.tmp,.example,.sample,.swp,.orig,.html,.htm,.js,.css,.map,.git,.svn,.DS_Store,.htaccess,.htpasswd,.pdf,.doc,.docx,.xls,.xlsx,.ppt,.pptx,.pem,.crt,.key,.p12,.pfx" | tr -d ' ') # š Start the scan echo -e "\nš Starting feroxbuster scan on $TARGET_URL ..." feroxbuster -u "$TARGET_URL" \ -w "$WORDLIST" \ -x "$EXTS" \ -r -t 100 --depth 3 \ --status-codes 200,204,301,302,403 \ -o "ferox-output.txt" # š¦ Done! echo -e "\nā Scan complete. Output saved to: ferox-output.txt"
ā ļø Actual speeds may vary depending on server response time, connection quality, and system resources.