A recursive content discovery tool

Edit Package feroxbuster
https://epi052.github.io/feroxbuster-docs/

Forced browsing is an attack where the aim is to enumerate and access
resources that are not referenced by the web application, but are
still accessible by an attacker.

feroxbuster uses brute force combined with a wordlist to search for
unlinked content in target directories. These resources may store
sensitive information about web applications and operational systems,
such as source code, credentials, internal network addressing, etc...

This attack is also known as Predictable Resource Location, File
Enumeration, Directory Enumeration, and Resource Enumeration.

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000134 134 Bytes
feroxbuster-2.10.2.tar.gz 0011580811 11 MB
feroxbuster.changes 0000002505 2.45 KB
feroxbuster.spec 0000002603 2.54 KB
vendor.tar.zst 0039257568 37.4 MB
Revision 6 (latest revision is 13)
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 1154185 from Martin Hauke's avatar Martin Hauke (mnhauke) (revision 6)
- Update to version 2.10.2
  * removed scan target headers from feroxbuster-update check.
  * --collect-backups accepts custom backup extension list.
  * fixed issue where --silent included too much info on found dir.
  * --parallel time limit enforced on individual directories
    instead of main thread.
  * query fontconfig to determine if Noto Color Emoji is installed.
  * updated upstream library that was causing tokio-runtime-worker
    panics; they're correctly reported as Err from the library now.
  * fixed issue where early redirect loop would cause ferox to hang
    indefinitely.
Comments 0
openSUSE Build Service is sponsored by