An intelligent directory brute-forcing tool with automated application detection and dynamic wordlists mechanism
- Open Terminal
- Clone the repository
git clone https://github.com/pwnhubdotc0m/autoBuster.git
- Navigate to the project directory
cd autoBuster
- Create a Python virtual environment
python3 -m venv venv
- Activate the virtual environment
source venv/bin/activate
- Install dependencies
pip3 install -r requirements.txt
- To deactivate the virtual environment
deactivate
- Open
Command Prompt
orPowerShell
- Ensure you have Python and Git installed. To check,
python3 --version
git --version
If not installed, download and install Python & Git
- Clone the repository using 'Git'
git clone https://github.com/pwnhubdotc0m/autoBuster.git
- Navigate to the project directory
cd autoBuster
- Create a Python virtual environment
python3 -m venv venv
- Activate the virtual environment
- On
Command Prompt
venv\Scripts\activate
- On
PowerShell
.\venv\Scripts\activate
- On
- Install dependencies
pip3 install -r requirements.txt
usage: autoBuster.py [-h] [-o {txt,json,csv}] url
AutoBuster: Directory Brute Forcing Tool with Application Detection
positional arguments:
url The target URL to analyze
options:
-h, --help show this help message and exit
-o {txt,json,csv}, --output {txt,json,csv}
Output format for the results (txt, json, or csv)
python3 autoBuster.py -o json https://xyz.com