Skip to content

Directory Buster is a GUI based Tool Made with python.this is a simple yet powerful tool for discovering hidden directories and files on a target web server using a wordlist-based approach

License

Notifications You must be signed in to change notification settings

s-r-e-e-r-a-j/DirectoryBuster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

77 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Directory Buster

Directory Buster is a GUI based Tool Made with python.this is a simple yet powerful tool for discovering hidden directories and files on a target web server using a wordlist-based approach. It's designed to assist security professionals and enthusiasts with directory brute-forcing to identify potentially vulnerable or hidden resources on a web server.

Tool Graphical User Interface

VirtualBox_KALILINUX1_08_11_2024_22_00_28

Features:

  • Enter the target URL to start brute-forcing.
  • Choose a wordlist for directory names.
  • Option to save found results to a text file.
  • Scrolled text boxes to display both found and non-found results.
  • Clickable URLs in the "Found Results" section to open them directly in a web browser.
  • Option to stop the brute-force process anytime.

Requirements

  • Python 3.x
  • requests (for sending HTTP requests)
  • tkinter (for the GUI)
  • threading
  • webbrowser

Installation

  1. Clone the repository to your local machine
git clone https://github.com/s-r-e-e-r-a-j/DirectoryBuster.git
  1. Navigate to the DirectoryBuster directory
cd DirectoryBuster
  1. Install the required dependencies:
pip3 install -r requirements.txt
  1. Navigate to the DIRECTORYBUSTER directory
cd DIRECTORYBUSTER
  1. Install the tool
sudo python3 install.py

Then enter y for install

  1. Run the Tool:
directorybuster

How to Use

  • Set the Target URL:

Enter the target URL (e.g., http://example.com) in the "Target URL" input field.

  • Select a Wordlist:

Click the "Browse" button to select a wordlist file. The wordlist file should be a .txt file containing a list of directories to test.

  • Save Results (Optional):

If you want to save the found results, check the "Save found results" checkbox and specify the file location using the "Select Save File" button.

  • Start Directory Busting:

Click the "Start" button to begin the directory busting process. The tool will start testing directories from the wordlist against the target URL.

  • Found Results:

The "Found Results" section will display any discovered directories with a clickable URL. Click on a URL to open it directly in your default web browser.

  • Stop Directory Busting:

Click the "Stop" button anytime to halt the directory busting process.

Example Usage:

  • Enter the target URL http://example.com.
  • Choose a wordlist file (e.g., common-directories.txt).
  • Optionally select a save path for the results.
  • Click "Start" and watch the results populate in real-time.

Picture

VirtualBox_KALILINUX1_08_11_2024_22_00_28

uninstallation

cd DirectoryBuster
cd DIRECTORYBUSTER
sudo python3 install.py

Then Enter n for uninstall

Troubleshooting

  • Error: No wordlist selected Ensure that you have selected a valid wordlist file by clicking the "Browse" button.

  • Error: No target URL entered Enter the target URL before clicking "Start".

  • Error: Cannot save results Ensure that you have selected a valid file path to save the results.

License

This tool is licensed under the MIT License. See LICENSE for more details.

About

Directory Buster is a GUI based Tool Made with python.this is a simple yet powerful tool for discovering hidden directories and files on a target web server using a wordlist-based approach

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages