LinuxCommandLibrary

wfuzz

Web application fuzzing tool

TLDR

Fuzz URL parameter

$ wfuzz -c -z file,[wordlist.txt] "[http://target/?param=FUZZ]"
copy
Fuzz directory
$ wfuzz -c -z file,[dirs.txt] "[http://target/FUZZ]"
copy
POST data fuzzing
$ wfuzz -c -z file,[wordlist.txt] -d "user=admin&pass=FUZZ" "[http://target/login]"
copy
Filter by response code
$ wfuzz -c --hc 404 -z file,[wordlist.txt] "[http://target/FUZZ]"
copy
Filter by response size
$ wfuzz -c --hl 0 -z file,[wordlist.txt] "[http://target/FUZZ]"
copy
Multiple fuzz points
$ wfuzz -c -z file,[users.txt] -z file,[passwords.txt] "[http://target/?u=FUZ2Z&p=FUZZ]"
copy

SYNOPSIS

wfuzz [-c] [-z type,data] [--hc codes] [options] url

DESCRIPTION

wfuzz is a web application security testing tool that performs brute-force discovery of directories, parameters, forms, and other injection points. It replaces the FUZZ keyword in URLs, headers, or POST data with entries from wordlists or other payload sources.
Multiple injection points can be used simultaneously with FUZ2Z, FUZ3Z markers, allowing combined username and password attacks or multi-parameter fuzzing. Response filtering by status code, line count, word count, or character count hides uninteresting results and highlights anomalies that may indicate vulnerabilities.
Payload sources include wordlist files, numeric ranges, and encoded variants. Multi-threading speeds up testing, and colored output makes results easier to scan. The tool is commonly used for directory enumeration, parameter discovery, and authentication testing in authorized security assessments.

PARAMETERS

-z TYPE,DATA

Payload specification.
-c
Color output.
--hc CODES
Hide response codes.
--hl LINES
Hide by line count.
--hw WORDS
Hide by word count.
--hh CHARS
Hide by char count.
-d DATA
POST data.
-H HEADER
HTTP header.
-t N
Threads.

CAVEATS

For authorized testing only. Rate limiting may be needed. Large wordlists are slow.

HISTORY

wfuzz was created by Christian Martorella (Edge-Security) for web application testing. It's a standard tool in penetration testing.

SEE ALSO

ffuf(1), gobuster(1), dirb(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community