feroxbuster
TLDR
Scan a URL for directories and files
SYNOPSIS
feroxbuster [-u url] [-w wordlist] [-x extensions] [-t threads] [-d depth] [-o output] [options]
DESCRIPTION
feroxbuster is a fast, recursive content discovery tool written in Rust. It brute-forces directories and files on web servers by sending HTTP requests from a wordlist, identifying hidden resources through response analysis.
Speed is a key feature: Rust's performance combined with asynchronous requests enables scanning thousands of paths per second. The tool supports recursive scanning, automatically continuing into discovered directories up to a configurable depth.
Advanced filtering options reduce false positives by hiding responses based on status code, response size, word count, line count, or regex patterns. This helps when servers return generic pages for non-existent paths.
The interactive mode provides real-time statistics and allows pausing, resuming, adding new URLs, and adjusting settings during the scan. Results are color-coded by status code for quick interpretation.
Feroxbuster integrates with tools like Burp Suite via proxy support and can save state to resume interrupted scans. Output formats include plain text, JSON, and formats compatible with other security tools.
PARAMETERS
-u, --url url
Target URL to scan.-w, --wordlist file
Wordlist to use (default: built-in seclists).-x, --extensions ext
File extensions to check (comma-separated).-t, --threads n
Number of concurrent threads (default: 50).-d, --depth n
Maximum recursion depth (default: 4, 0 for infinite).-o, --output file
Output file for results.-n, --no-recursion
Disable recursive scanning.-f, --add-slash
Append / to each request.-C, --filter-status codes
Filter out specific HTTP status codes.-S, --filter-size size
Filter out responses of specific size.-W, --filter-words count
Filter out responses with specific word count.-L, --filter-lines count
Filter out responses with specific line count.--proxy url
Proxy to use for requests.-H, --headers header
Custom headers (can be used multiple times).-k, --insecure
Disable TLS certificate verification.-q, --quiet
Minimal output.--json
Output in JSON format.
CAVEATS
Only use on systems you have permission to test. High thread counts may trigger rate limiting or IP bans. Large wordlists with recursion can generate enormous traffic. Some WAFs detect and block the tool's patterns.
HISTORY
feroxbuster was created by Ben "epi" Risher, with the first release around 2020. The name combines "ferox" (Latin for fierce/wild) with "buster." Written in Rust for performance, it quickly gained popularity as a modern alternative to tools like dirb, gobuster, and dirsearch.


