LinuxCommandLibrary

feroxbuster

TLDR

Scan a URL for directories and files

$ feroxbuster --url [https://example.com]
copy
Use a custom wordlist
$ feroxbuster --url [https://example.com] --wordlist [path/to/wordlist.txt]
copy
Scan with specific extensions
$ feroxbuster --url [https://example.com] --extensions [php,html,txt]
copy
Scan recursively to a specific depth
$ feroxbuster --url [https://example.com] --depth [3]
copy
Scan with multiple threads
$ feroxbuster --url [https://example.com] --threads [100]
copy
Filter out specific status codes
$ feroxbuster --url [https://example.com] --filter-status [404,403]
copy
Output results to a file
$ feroxbuster --url [https://example.com] --output [results.txt]
copy
Scan through a proxy
$ feroxbuster --url [https://example.com] --proxy [http://127.0.0.1:8080]
copy

SYNOPSIS

feroxbuster [-u url] [-w wordlist] [-x extensions] [-t threads] [-d depth] [-o output] [options]

DESCRIPTION

feroxbuster is a fast, recursive content discovery tool written in Rust. It brute-forces directories and files on web servers by sending HTTP requests from a wordlist, identifying hidden resources through response analysis.
Speed is a key feature: Rust's performance combined with asynchronous requests enables scanning thousands of paths per second. The tool supports recursive scanning, automatically continuing into discovered directories up to a configurable depth.
Advanced filtering options reduce false positives by hiding responses based on status code, response size, word count, line count, or regex patterns. This helps when servers return generic pages for non-existent paths.
The interactive mode provides real-time statistics and allows pausing, resuming, adding new URLs, and adjusting settings during the scan. Results are color-coded by status code for quick interpretation.
Feroxbuster integrates with tools like Burp Suite via proxy support and can save state to resume interrupted scans. Output formats include plain text, JSON, and formats compatible with other security tools.

PARAMETERS

-u, --url url

Target URL to scan.
-w, --wordlist file
Wordlist to use (default: built-in seclists).
-x, --extensions ext
File extensions to check (comma-separated).
-t, --threads n
Number of concurrent threads (default: 50).
-d, --depth n
Maximum recursion depth (default: 4, 0 for infinite).
-o, --output file
Output file for results.
-n, --no-recursion
Disable recursive scanning.
-f, --add-slash
Append / to each request.
-C, --filter-status codes
Filter out specific HTTP status codes.
-S, --filter-size size
Filter out responses of specific size.
-W, --filter-words count
Filter out responses with specific word count.
-L, --filter-lines count
Filter out responses with specific line count.
--proxy url
Proxy to use for requests.
-H, --headers header
Custom headers (can be used multiple times).
-k, --insecure
Disable TLS certificate verification.
-q, --quiet
Minimal output.
--json
Output in JSON format.

CAVEATS

Only use on systems you have permission to test. High thread counts may trigger rate limiting or IP bans. Large wordlists with recursion can generate enormous traffic. Some WAFs detect and block the tool's patterns.

HISTORY

feroxbuster was created by Ben "epi" Risher, with the first release around 2020. The name combines "ferox" (Latin for fierce/wild) with "buster." Written in Rust for performance, it quickly gained popularity as a modern alternative to tools like dirb, gobuster, and dirsearch.

SEE ALSO

gobuster(1), dirsearch(1), ffuf(1), dirb(1)

Copied to clipboard