Scripts2026年5月15日·1 分钟阅读

Gobuster — Fast Directory and DNS Brute-Force Scanner

A fast brute-force tool written in Go for discovering hidden directories, files, DNS subdomains, virtual hosts, and S3 buckets during security assessments.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Needs Confirmation · 64/100策略:需确认
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
Gobuster Overview
通用 CLI 安装命令
npx tokrepo install a6cb1aa6-509b-11f1-9bc6-00163e2b0d79

Introduction

Gobuster is a command-line tool for brute-forcing URIs, DNS subdomains, virtual host names, S3 buckets, and TFTP servers. Written in Go for speed and concurrency, it is a staple in web application penetration testing for discovering attack surfaces that are not linked in the visible application.

What Gobuster Does

  • Brute-forces directories and files on web servers using wordlists
  • Enumerates DNS subdomains through dictionary-based queries
  • Discovers virtual hosts by fuzzing the Host header against a target
  • Searches for open Amazon S3 buckets and Google Cloud Storage buckets
  • Supports custom status code filtering, authentication headers, and proxy routing

Architecture Overview

Gobuster is written in Go and uses goroutines for massively concurrent requests. Each mode (dir, dns, vhost, s3, tftp, fuzz) implements a shared interface for target generation, request dispatch, and result processing. The wordlist reader streams entries to a worker pool, keeping memory usage constant regardless of wordlist size.

Self-Hosting & Configuration

  • Single static binary with no external dependencies
  • Install via Go toolchain or download prebuilt binaries from GitHub Releases
  • Wordlists are provided externally; SecLists and dirb ship common options
  • Configure threads, timeouts, and proxy settings via CLI flags
  • Supports output to file in plain text or JSON format

Key Features

  • High concurrency with configurable thread count for speed tuning
  • Wildcard DNS detection to avoid false positives during subdomain enumeration
  • Custom header injection and cookie support for authenticated scanning
  • Pattern-based file extension brute-forcing (e.g., .php, .bak, .conf)
  • Quiet mode and machine-readable JSON output for pipeline integration

Comparison with Similar Tools

  • Feroxbuster — Rust-based recursive content discovery; Gobuster is non-recursive by default and lighter
  • ffuf — flexible web fuzzer with more fuzzing modes; Gobuster focuses on brute-force simplicity
  • dirb — classic directory scanner; Gobuster is significantly faster due to Go concurrency
  • dirsearch — Python-based with smart wordlist features; Gobuster trades features for raw speed
  • wfuzz — Python web fuzzer with advanced payload processing; heavier than Gobuster for simple tasks

FAQ

Q: How fast is Gobuster compared to dirb? A: Gobuster is typically 5-10x faster due to Go goroutine-based concurrency, depending on thread count and target response time.

Q: Can Gobuster do recursive scanning? A: The dir mode does not recurse by default. For recursive content discovery, consider pairing Gobuster with a wrapper script or using Feroxbuster.

Q: What wordlists should I use? A: The SecLists project provides comprehensive wordlists. Common starting points are common.txt and raft-medium-directories.txt for directory scanning.

Q: Does it support authenticated endpoints? A: Yes. You can pass cookies, authorization headers, and client certificates via CLI flags to scan authenticated areas.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产