wfuzz
Web application fuzzing tool
TLDR
Fuzz URL parameter
SYNOPSIS
wfuzz [-c] [-z type,data] [--hc codes] [options] url
DESCRIPTION
wfuzz is a web application security testing tool that performs brute-force discovery of directories, parameters, forms, and other injection points. It replaces the FUZZ keyword in URLs, headers, or POST data with entries from wordlists or other payload sources.
Multiple injection points can be used simultaneously with FUZ2Z, FUZ3Z markers, allowing combined username and password attacks or multi-parameter fuzzing. Response filtering by status code, line count, word count, or character count hides uninteresting results and highlights anomalies that may indicate vulnerabilities.
Payload sources include wordlist files, numeric ranges, and encoded variants. Multi-threading speeds up testing, and colored output makes results easier to scan. The tool is commonly used for directory enumeration, parameter discovery, and authentication testing in authorized security assessments.
PARAMETERS
-z TYPE,DATA
Payload specification.-c
Color output.--hc CODES
Hide response codes.--hl LINES
Hide by line count.--hw WORDS
Hide by word count.--hh CHARS
Hide by char count.-d DATA
POST data.-H HEADER
HTTP header.-t N
Threads.
CAVEATS
For authorized testing only. Rate limiting may be needed. Large wordlists are slow.
HISTORY
wfuzz was created by Christian Martorella (Edge-Security) for web application testing. It's a standard tool in penetration testing.
