Web Tool - WFuzz
Installation
pip install wfuzzFiltering options
--hs/ss "regex" #Hide/Show
#Simple example, match a string: "Invalid username"
#Regex example: "Invalid *"
--hc/sc CODE #Hide/Show by code in response
--hl/sl NUM #Hide/Show by number of lines in response
--hw/sw NUM #Hide/Show by number of words in response
--hh/sh NUM #Hide/Show by number of chars in response
--hc/sc NUM #Hide/Show by response codeOutput options
Encoders options
CheatSheet
Login Form bruteforce
POST, Single list, filter string (hide)
POST, 2 lists, filter code (show)
GET, 2 lists, filter string (show), proxy, cookies
Bruteforce Directory/RESTful bruteforce
Path Parameters BF
Header Authentication
Basic, 2 lists, filter string (show), proxy
NTLM, 2 lists, filter string (show), proxy
Cookie/Header bruteforce (vhost brute)
Cookie, filter code (show), proxy
User-Agent, filter code (hide), proxy
Host
HTTP Verbs (methods) bruteforce
Using file
Using inline list
Directory & Files Bruteforce
Tool to bypass Webs
Last updated

