dirsearch
TLDR
Scan a URL with default wordlist
SYNOPSIS
dirsearch [-u url] [-l urllist] [-w wordlist] [-e extensions] [-t threads] [-o output] [options]
DESCRIPTION
dirsearch is a web content discovery tool that brute-forces directories and files on web servers. It sends HTTP requests for paths from a wordlist, identifying existing resources by analyzing server responses.
The tool is commonly used in penetration testing and security assessments to discover hidden content, backup files, admin panels, configuration files, and other resources not linked from the main application. It uses response status codes, content length, and other heuristics to determine validity.
Dirsearch includes built-in wordlists but supports custom lists for targeted scanning. Extensions can be specified to test multiple file types (e.g., checking for both /admin and /admin.php). The recursive mode continues scanning discovered directories.
Advanced features include proxy support, custom headers, authentication, rate limiting, and multiple output formats. The tool can filter results by status code, response size, or content patterns to reduce false positives.
PARAMETERS
-u, --url url
Target URL to scan.-l, --urls-file file
File containing list of URLs to scan.-w, --wordlist file
Custom wordlist(s) to use (comma-separated).-e, --extensions ext
Extensions to append (comma-separated, e.g., php,asp,js).-t, --threads n
Number of concurrent threads (default: 25).-r, --recursive
Enable recursive scanning.-R, --max-recursion-depth n
Maximum recursion depth.-x, --exclude-status codes
Exclude status codes from results.-i, --include-status codes
Include only these status codes.-o, --output file
Save results to file.--format type
Output format: plain, simple, json, xml, md, csv, html.-H, --header header
Custom header (can be used multiple times).--cookie cookie
Set cookies for requests.--user-agent ua
Custom User-Agent string.--random-agent
Use random User-Agent.-b, --follow-redirects
Follow HTTP redirects.--timeout seconds
Connection timeout.--proxy url
Use HTTP/SOCKS proxy.-q, --quiet
Quiet mode (minimal output).
CAVEATS
Only use on systems you have permission to test. High thread counts may trigger rate limiting or get blocked. Some WAFs may block dirsearch's default patterns. Large wordlists significantly increase scan time. Recursive scanning can be very slow on large sites.
HISTORY
dirsearch was created by Mauro Soria as a Python-based alternative to tools like DirBuster and gobuster. It has been actively maintained since 2014 and is widely used in the security community. The tool's ease of use and comprehensive features made it popular for web application security testing.


