Skip to content

This Python script is a directory brute force tool for web application security testing. It iterates through a wordlist to test directories against a target URL, aiding in identifying vulnerabilities and hidden resources.

Notifications You must be signed in to change notification settings

Yukta-Chauhan/Directory_Brute-Force_tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Directory Brute Force Tool

Description

This Python script is a simple yet effective directory brute force tool designed to aid in web application penetration testing and security assessments. With the capability to iterate through a provided wordlist and test various directories against a target URL, it assists in identifying potential entry points and hidden resources within a web application's directory structure.

Key Features

  • Flexible: Allows users to specify a custom wordlist file containing directory names to be tested.
  • Versatile: Works with any target URL, enabling testing on various web applications and websites.
  • Efficient: Utilizes the requests library for HTTP requests, providing fast and reliable testing.
  • Informative: Provides feedback on discovered directories, including their URLs and HTTP response status codes.
  • Lightweight: Written in Python with minimal dependencies, making it easy to set up and use in various environments.

Usage

  1. Clone the repository or download the script.
  2. Install the necessary dependencies.
  3. Run the script with the desired parameters: python brute.py -w path/to/wordlist.txt -u target_url

Replace "path/to/wordlist.txt" with the path to your wordlist file and "target_url" with the URL of the web application to test.

Requirement

  • Python: Version 3.x or newer (e.g., Python 3.6+).

Libraries Used:

  • requests : Used for making HTTP requests in Python.
  • argparse : Used for parsing command-line arguments.
  • sys : Used for system-specific parameters and functions.

Whether you're a cybersecurity professional, a web developer, or an enthusiast looking to explore web application security, this directory brute force tool provides a valuable addition to your toolkit, enhancing your ability to identify potential vulnerabilities and strengthen web application defences.

About

This Python script is a directory brute force tool for web application security testing. It iterates through a wordlist to test directories against a target URL, aiding in identifying vulnerabilities and hidden resources.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages