Skip to content

Wfuzz

Flexible web application fuzzer

PythonGitHub

Description

Wfuzz is a web application brute forcer that can be used to find hidden resources, fuzz parameters, find injection points, and brute-force authentication. It replaces any reference to the FUZZ keyword with the payload data.

Installation

BASH
pip install wfuzz

Basic Usage

BASH
# Directory fuzzing
wfuzz -w wordlist.txt https://target.com/FUZZ

# Parameter fuzzing
wfuzz -w payloads.txt "https://target.com/?param=FUZZ"

Advanced Usage

BASH
# Hide responses by code
wfuzz -w wordlist.txt --hc 404 https://target.com/FUZZ

# Hide by word count
wfuzz -w wordlist.txt --hw 42 https://target.com/FUZZ

# POST data
wfuzz -w passwords.txt -d "user=admin&pass=FUZZ" https://target.com/login

# With cookies
wfuzz -w wordlist.txt -b "session=abc123" https://target.com/FUZZ

# Multiple payloads
wfuzz -z file,users.txt -z file,pass.txt -d "user=FUZZ&pass=FUZ2Z" https://target.com/login

# Header fuzzing
wfuzz -w wordlist.txt -H "X-Header: FUZZ" https://target.com