icon Book Free Consultation

DIRSEARCH

Image

About

Dirsearch is Tool that performs bruteforce attack of sensitive directories and files that are found on the websites.

Demo

Lock image

Installation Manual

Step 1: Download or Clone the Dirsearch tool in to your system.

 root@kali:~#git clone https://github.com/maurosoria/dirsearch.git

image

image

Step 2: Navigate to the Dirsearch tool folder.

root@kali:~#cd dirsearch

image

Step 3: Run the tool by executing the installation file.

root@kali:~#python3 dirsearch.py -u -e

image

Sample Output:

image

Options:

 To know the Dirsearch tool help command use,

root@kali:~#python3 dirsearch.py -h, --help

Compulsory Arguments:

    -u URL, --url=URL   URL target

    -L URLLIST, --url-list=URLLIST

                        URL list target

    -e EXTENSIONS, --extensions=EXTENSIONS

                        Extension list separated by comma (Example: php,asp)

    -E, --extensions-list

                        Use predefined list of common extensions

Supported Platforms

  • Windows XP/7/8/10

  • GNU/Linux

  • MacOSX

Features

  • Multithreaded

  • Keep alive connections

  • Support for multiple extensions (-e|--extensions asp,php)

  • Reporting (plain text, JSON)

  • Heuristically detects invalid web pages

  • Recursive brute forcing

  • HTTP proxy support

  • User agent randomization

  • Batch processing

  • Request delaying

  • Option to remove dot from extension when forcing (--nd, example%EXT% instead of example.%EXT%)

  • Options to display only items with response length from range (--min & --max)

  • Option to whitelist response codes (-i 200,500)

  • Option to remove output from console (-q, keeps output to files)

  • Option to add custom suffixes to filenames without dots (--suff .BAK,.old, example.%EXT%%SUFFIX%)

Usage:

How to use

General usage: root@kali:~#python3 dirsearch.py –u https://www.example.com/ -e php

Some examples how to use dirsearch - those are the most common arguments. If you need all, just use the "-h" argument.

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --recursive -R 2

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --recursive -R 4 --scan-subdirs=/,/wp-content/,/wp-admin/

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --exclude-texts=This,AndThat

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt -H "User-Agent: IE"

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt -t 20

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --random-agents

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --json-report=reports/target.json

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --simple- root@kali:~#report=reports/target-paths.txt

  • root@kali:~#python3 dirsearch.py -e php,txt,zip -u https://target -w db/dicc.txt --plain-text-report=reports/target-paths-and-status.json