Gobuster | Fast Directory & DNS Brute Forcing Tool

A powerful and fast penetration testing utility, Gobuster is a Go-based tool designed for advanced directory, file, and DNS subdomain brute-forcing tasks.

Powerful Features

Gobuster provides comprehensive brute-forcing capabilities for penetration testers and security researchers

Directory Brute-Forcing

Efficiently discover hidden directories and files using custom wordlists with advanced pattern matching capabilities.

DNS Subdomain Enumeration

Discover subdomains through DNS brute-forcing with support for multiple DNS servers and wildcard detection.

Multi-threaded Performance

Leverage Go's concurrency model for high-speed scanning with configurable thread counts and timeout settings.

Custom Wordlist Support

Support for custom wordlists with file extensions, pattern matching, and intelligent filtering capabilities.

Comprehensive Output Formats

Multiple output formats including plain text, JSON, and custom formats with detailed response information.

Advanced Filtering

Smart filtering of responses based on status codes, content length, and regex patterns for precise results.

Professional Use Cases

Essential tool for security professionals, penetration testers, and bug bounty hunters

Web Application Security Testing

Discover hidden endpoints, administrative interfaces, and sensitive files during penetration testing engagements.

Bug Bounty Programs

Identify subdomains and hidden assets that may contain vulnerabilities for bug bounty hunting.

Infrastructure Assessment

ucture by discovering subdomains and exposed services.

Compliance Auditing

Verify that no unauthorized or hidden endpoints exist in production environments.

Installation Guide

Follow these instructions to install Gobuster on your system:

Linux

Install Gobuster on Linux using a package manager or by compiling from source: Using apt (Debian/Ubuntu): sudo apt install gobuster From source: Ensure Go is installed, then run go install gobuster.org/OJ/gobuster/v3@latest

macOS

Install Gobuster on macOS using Homebrew or from source: Using Homebrew: brew install gobuster From source: Install Go, then run go install gobuster.org/OJ/gobuster/v3@latest

Windows​

Install Gobuster on Windows by downloading the binary or compiling from source: Binary: Download the latest release from the GitHub releases page. From source: Install Go, then run go install gobuster.org/OJ/gobuster/v3@latest

Command Reference

Comprehensive overview of Gobuster’s command-line options and flags

Option Description Default
-u, --url Target URL Required
-w, --wordlist Path to the wordlist Required
-t, --threads Number of concurrent threads 10
-x, --extensions File extensions to search for None
--timeout HTTP timeout 10s

Performance Benchmarks

Optimized for speed and efficiency in large-scale security assessments

Requests per second capability
10000 +
CPU utilization efficiency
100 %
Average response time per request
0.5 ms
What is Gobuster?

Gobuster is a command-line tool used for brute-forcing URIs, directories, files, and DNS subdomains.

Gobuster was developed by OJ Reeves (OJ/gobuster) for penetration testing purposes.

Gobuster is written in the Go programming language.

Its primary use is discovering hidden directories, files, and subdomains on web servers.

Yes, Gobuster is open-source and available on GitHub.

Gobuster works on Linux, Windows, and macOS.

Common modes are directory brute-forcing, DNS subdomain enumeration, and vhost discovery.

Gobuster uses custom wordlists, often from SecLists or custom-created lists.

It can be installed using apt install gobuster or by compiling from source.

Yes, it can discover hidden files based on extensions provided.

Yes, Gobuster supports both HTTP and HTTPS.

Basic syntax: gobuster dir -u <URL> -w <wordlist>.

The -u option specifies the target URL.

The -w option specifies the wordlist file to use.

The -t option sets the number of concurrent threads.

What does the -x option do in Gobuster?

The -x option defines file extensions to brute-force.

The default timeout is 10 seconds per request.

Yes, Gobuster supports proxies using the –proxy option.

Yes, with the vhost mode, Gobuster can discover virtual hosts.

DNS mode allows brute-forcing of DNS subdomains.

Yes, Gobuster can brute-force subdomains on HTTPS domains.

Yes, Gobuster is generally faster due to being written in Go.

No, Gobuster does not natively support resuming scans.

No, Gobuster does not natively support recursion for deeper directory discovery.

Yes, using the -o option, results can be saved.

No, Gobuster does not perform brute-forcing of usernames or passwords.

Gobuster is simpler and older, while FFUF offers more advanced features.

You can check the latest release on the Gobuster GitHub page

Yes, Gobuster findings are often included in professional penetration testing reports.

Gobuster is legal for ethical use, but unauthorized scans on systems you don’t own are illegal.

Scroll to Top