A recursive content discovery tool
https://epi052.github.io/feroxbuster-docs/
Forced browsing is an attack where the aim is to enumerate and access
resources that are not referenced by the web application, but are
still accessible by an attacker.
feroxbuster uses brute force combined with a wordlist to search for
unlinked content in target directories. These resources may store
sensitive information about web applications and operational systems,
such as source code, credentials, internal network addressing, etc...
This attack is also known as Predictable Resource Location, File
Enumeration, Directory Enumeration, and Resource Enumeration.
- Links to network:utilities / feroxbuster
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:mnhauke/feroxbuster && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000246 246 Bytes | |
feroxbuster-2.10.1.tar.gz | 0011576836 11 MB | |
project.diff | 0000002129 2.08 KB | |
vendor.tar.zst | 0037468612 35.7 MB |
Revision 9 (latest revision is 20)
Martin Hauke (mnhauke)
committed
(revision 9)
- Update to version 2.10.1 * fixed scan menu range issue. * enable reading extensions from file. * fixed collect backups filtering. * added http/2 support. * allowed --json in conjunction with --silent. - Update to version 2.10.0 * Adds server and client certificate management; enables mTLS. --server-certs --client-cert --client-key - Update to version 2.9.5 * support raw urls. - Update to version 2.9.4 * reduced memory usage overall * improved speed during link extraction - Update to version 2.9.3 * added extensions and status codes into auto filtering decision calculus.
Comments 0