ffuf-web-fuzzing by jthack/ffuf_claude_skill
npx skills add https://github.com/jthack/ffuf_claude_skill --skill ffuf-web-fuzzingFFUF 是一款用 Go 语言编写的快速 Web 模糊测试工具,旨在渗透测试过程中发现隐藏内容、目录、文件、子域名以及测试漏洞。它比 dirb 或 dirbuster 等传统工具要快得多。
# 使用 Go
go install github.com/ffuf/ffuf/v2@latest
# 使用 Homebrew (macOS)
brew install ffuf
# 二进制下载
# 下载地址: https://github.com/ffuf/ffuf/releases/latest
FUZZ 关键字用作占位符,会被您单词列表中的条目替换。您可以将其放在任何位置:
https://target.com/FUZZ-H "Host: FUZZ"-d "username=admin&password=FUZZ"-w wordlist.txt:CUSTOM 然后使用 代替 广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
CUSTOMFUZZ# 基本目录模糊测试
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ
# 带文件扩展名
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -e .php,.html,.txt,.pdf
# 彩色和详细输出
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -c -v
# 递归(查找嵌套目录)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2
# 虚拟主机发现
ffuf -w /path/to/subdomains.txt -u https://target.com -H "Host: FUZZ.target.com" -fs 4242
# 注意: -fs 4242 过滤掉大小为 4242 的响应(根据默认响应大小进行调整)
# GET 参数名
ffuf -w /path/to/params.txt -u https://target.com/script.php?FUZZ=test_value -fs 4242
# GET 参数值
ffuf -w /path/to/values.txt -u https://target.com/script.php?id=FUZZ -fc 401
# 多个参数
ffuf -w params.txt:PARAM -w values.txt:VAL -u https://target.com/?PARAM=VAL -mode clusterbomb
# 基本 POST 模糊测试
ffuf -w /path/to/passwords.txt -X POST -d "username=admin&password=FUZZ" -u https://target.com/login.php -fc 401
# JSON POST 数据
ffuf -w entries.txt -u https://target.com/api -X POST -H "Content-Type: application/json" -d '{"name": "FUZZ", "key": "value"}' -fr "error"
# 模糊测试多个 POST 字段
ffuf -w users.txt:USER -w passes.txt:PASS -X POST -d "username=USER&password=PASS" -u https://target.com/login -mode pitchfork
# 自定义请求头
ffuf -w /path/to/wordlist.txt -u https://target.com -H "X-Custom-Header: FUZZ"
# 多个请求头
ffuf -w /path/to/wordlist.txt -u https://target.com -H "User-Agent: FUZZ" -H "X-Forwarded-For: 127.0.0.1"
-mc: 匹配状态码(默认: 200-299,301,302,307,401,403,405,500)-ml: 匹配行数-mr: 匹配正则表达式-ms: 匹配响应大小-mt: 匹配响应时间(例如,>100 或 <100 毫秒)-mw: 匹配单词数-fc: 过滤状态码(例如,-fc 404,403,401)-fl: 过滤行数-fr: 过滤正则表达式(例如,-fr "error")-fs: 过滤响应大小(例如,-fs 42,4242)-ft: 过滤响应时间-fw: 过滤单词数关键: 除非有特定原因,否则始终使用 -ac。这在让 Claude 分析结果时尤其重要,因为它能显著减少噪音和误报。
# 自动校准 - 始终使用此选项
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -ac
# 每主机自动校准(对多个主机有用)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -ach
# 自定义自动校准字符串(用于特定模式)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -acc "404NotFound"
为什么 -ac 至关重要:
当 Claude 分析您的 ffuf 结果时,-ac 是强制性的 - 没有它,Claude 将浪费时间筛选成千上万的误报,而不是寻找有趣的反常现象。
# 限制为每秒 2 个请求(隐身模式)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -rate 2
# 在请求之间添加延迟(0.1 到 2 秒随机)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -p 0.1-2.0
# 设置并发线程数(默认: 40)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -t 10
# 最大总执行时间(60 秒)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -maxtime 60
# 每个任务的最大时间(与递归一起使用很有用)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -maxtime-job 60 -recursion
# JSON 输出
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -o results.json
# HTML 输出
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of html -o results.html
# CSV 输出
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of csv -o results.csv
# 所有格式
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of all -o results
# 静默模式(无进度,仅结果)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -s
# 使用 tee 管道输出到文件
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -s | tee results.txt
这是 ffuf 最强大的功能之一,特别是对于具有复杂请求头、Cookie 或令牌的身份验证请求。
工作流程:
req.txt)FUZZ 关键字--request 标志# 从包含原始 HTTP 请求的文件中读取
ffuf --request req.txt -w /path/to/wordlist.txt -ac
示例 req.txt 文件:
POST /api/v1/users/FUZZ HTTP/1.1
Host: target.com
User-Agent: Mozilla/5.0
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
Cookie: session=abc123xyz; csrftoken=def456
Content-Type: application/json
Content-Length: 27
{"action":"view","id":"1"}
使用场景:
专业提示:
-request-proto https(默认为 https)-ac 来过滤掉身份验证后的“未找到”或错误响应# 常见的身份验证模糊测试模式
ffuf --request req.txt -w user_ids.txt -ac -mc 200 -o results.json
# 使用自定义关键字在多个 FUZZ 位置进行模糊测试
ffuf --request req.txt -w endpoints.txt:ENDPOINT -w ids.txt:ID -mode pitchfork -ac
# HTTP 代理(对 Burp Suite 有用)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -x http://127.0.0.1:8080
# SOCKS5 代理
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -x socks5://127.0.0.1:1080
# 通过代理重放匹配的请求
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -replay-proxy http://127.0.0.1:8080
# 使用 Cookie
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -b "sessionid=abc123; token=xyz789"
# 客户端证书身份验证
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -cc client.crt -ck client.key
# URL 编码
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -enc 'FUZZ:urlencode'
# 多重编码
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -enc 'FUZZ:urlencode b64encode'
# SQL 注入测试
ffuf -w sqli_payloads.txt -u https://target.com/page.php?id=FUZZ -fs 1234
# XSS 测试
ffuf -w xss_payloads.txt -u https://target.com/search?q=FUZZ -mr "<script>"
# 命令注入
ffuf -w cmdi_payloads.txt -u https://target.com/execute?cmd=FUZZ -fr "error"
# 处理多个 URL
cat targets.txt | xargs -I@ sh -c 'ffuf -w wordlist.txt -u @/FUZZ -ac'
# 循环处理多个目标并保存结果
for url in $(cat targets.txt); do
ffuf -w wordlist.txt -u $url/FUZZ -ac -o "results_$(echo $url | md5sum | cut -d' ' -f1).json"
done
默认情况下,每次扫描都使用 -ac。这对于高效的渗透测试是不可协商的:
ffuf -w wordlist.txt -u https://target.com/FUZZ -ac
不要为复杂的身份验证而费力使用命令行标志。捕获完整的请求并使用 --request:
# 1. 从 Burp/DevTools 捕获身份验证请求
# 2. 保存到 req.txt,并在适当位置插入 FUZZ 关键字
# 3. 使用 -ac 运行
ffuf --request req.txt -w wordlist.txt -ac -o results.json
使用 -rate 以避免触发 WAF/IDS 或压垮服务器:
ffuf -w wordlist.txt -u https://target.com/FUZZ -rate 2 -t 10
-fs 按大小过滤或 -fc 按状态码过滤-fc 403,404 -fs 1234始终将结果保存到文件以供后续分析:
ffuf -w wordlist.txt -u https://target.com/FUZZ -o results.json -of json
在执行过程中按 ENTER 键进入交互模式,您可以:
小心递归深度,以避免陷入无限循环或压垮服务器:
ffuf -w wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2 -maxtime-job 120
ffuf -w ~/wordlists/common.txt -u https://target.com/FUZZ -mc 200,301,302,403 -ac -c -v
ffuf -w ~/wordlists/raft-large-directories.txt -u https://target.com/FUZZ -e .php,.html,.txt,.bak,.old -ac -c -v -o results.json
# 1. 将您的身份验证请求保存到 req.txt,并插入 FUZZ 关键字
# 2. 运行:
ffuf --request req.txt -w ~/wordlists/api-endpoints.txt -ac -o results.json -of json
ffuf -w ~/wordlists/api-endpoints.txt -u https://api.target.com/v1/FUZZ -H "Authorization: Bearer TOKEN" -mc 200,201 -ac -c
ffuf -w ~/wordlists/subdomains-top5000.txt -u https://FUZZ.target.com -ac -c -v
ffuf -w ~/wordlists/passwords.txt -X POST -d "username=admin&password=FUZZ" -u https://target.com/login -fc 401 -rate 5 -ac
# 使用带有身份验证请求头和 ID 参数中 FUZZ 的 req.txt
ffuf --request req.txt -w numbers.txt -ac -mc 200 -fw 100-200
创建 ~/.config/ffuf/ffufrc 以设置默认配置:
[http]
headers = ["User-Agent: Mozilla/5.0"]
timeout = 10
[general]
colors = true
threads = 40
[matcher]
status = "200-299,301,302,307,401,403,405,500"
-ac 进行自动校准-fs 按大小过滤-fr 进行正则表达式过滤-t 100-ignore-body-rate 2-p 0.5-1.5-t 10-mc all 查看所有响应-v 查看正在发生的情况| 任务 | 命令模板 |
|---|---|
| 目录发现 | ffuf -w wordlist.txt -u https://target.com/FUZZ -ac |
| 子域名发现 | ffuf -w subdomains.txt -u https://FUZZ.target.com -ac |
| 参数模糊测试 | ffuf -w params.txt -u https://target.com/page?FUZZ=value -ac |
| POST 数据模糊测试 | ffuf -w wordlist.txt -X POST -d "param=FUZZ" -u https://target.com/endpoint |
| 带扩展名 | 添加 -e .php,.html,.txt |
| 过滤状态码 | 添加 -fc 404,403 |
| 过滤大小 | 添加 -fs 1234 |
| 速率限制 | 添加 -rate 2 |
| 保存输出 | 添加 -o results.json |
| 详细模式 | 添加 -c -v |
| 递归 | 添加 -recursion -recursion-depth 2 |
| 通过代理 | 添加 -x http://127.0.0.1:8080 |
此技能在 resources/ 目录中包含补充材料:
辅助脚本用法:
# 分析结果以查找有趣的异常
python3 ffuf_helper.py analyze results.json
# 创建身份验证请求模板
python3 ffuf_helper.py create-req -o req.txt -m POST -u "https://api.target.com/users" \
-H "Authorization: Bearer TOKEN" -d '{"action":"FUZZ"}'
# 生成 IDOR 测试单词列表
python3 ffuf_helper.py wordlist -o ids.txt -t numbers -s 1 -e 10000
何时使用资源:
在帮助用户使用 ffuf 时:
-ac - 这对于高效的渗透测试和结果分析是强制性的req.txt 文件ffuf --request req.txt -w wordlist.txt -ac-ac 开始进行自动校准-rate)-o results.json-of html 或 -of csv 以生成对客户友好的格式-ac(如果没有,结果会太嘈杂)每周安装次数
89
仓库
GitHub 星标数
128
首次出现
2026年1月24日
安全审计
安装于
codex77
opencode75
gemini-cli73
cursor71
github-copilot65
claude-code61
FFUF is a fast web fuzzer written in Go, designed for discovering hidden content, directories, files, subdomains, and testing for vulnerabilities during penetration testing. It's significantly faster than traditional tools like dirb or dirbuster.
# Using Go
go install github.com/ffuf/ffuf/v2@latest
# Using Homebrew (macOS)
brew install ffuf
# Binary download
# Download from: https://github.com/ffuf/ffuf/releases/latest
The FUZZ keyword is used as a placeholder that gets replaced with entries from your wordlist. You can place it anywhere:
https://target.com/FUZZ-H "Host: FUZZ"-d "username=admin&password=FUZZ"-w wordlist.txt:CUSTOM then use CUSTOM instead of FUZZ# Basic directory fuzzing
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ
# With file extensions
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -e .php,.html,.txt,.pdf
# Colored and verbose output
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -c -v
# With recursion (finds nested directories)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2
# Virtual host discovery
ffuf -w /path/to/subdomains.txt -u https://target.com -H "Host: FUZZ.target.com" -fs 4242
# Note: -fs 4242 filters out responses of size 4242 (adjust based on default response size)
# GET parameter names
ffuf -w /path/to/params.txt -u https://target.com/script.php?FUZZ=test_value -fs 4242
# GET parameter values
ffuf -w /path/to/values.txt -u https://target.com/script.php?id=FUZZ -fc 401
# Multiple parameters
ffuf -w params.txt:PARAM -w values.txt:VAL -u https://target.com/?PARAM=VAL -mode clusterbomb
# Basic POST fuzzing
ffuf -w /path/to/passwords.txt -X POST -d "username=admin&password=FUZZ" -u https://target.com/login.php -fc 401
# JSON POST data
ffuf -w entries.txt -u https://target.com/api -X POST -H "Content-Type: application/json" -d '{"name": "FUZZ", "key": "value"}' -fr "error"
# Fuzzing multiple POST fields
ffuf -w users.txt:USER -w passes.txt:PASS -X POST -d "username=USER&password=PASS" -u https://target.com/login -mode pitchfork
# Custom headers
ffuf -w /path/to/wordlist.txt -u https://target.com -H "X-Custom-Header: FUZZ"
# Multiple headers
ffuf -w /path/to/wordlist.txt -u https://target.com -H "User-Agent: FUZZ" -H "X-Forwarded-For: 127.0.0.1"
-mc: Match status codes (default: 200-299,301,302,307,401,403,405,500)-ml: Match line count-mr: Match regex-ms: Match response size-mt: Match response time (e.g., >100 or <100 milliseconds)-mw: Match word count-fc: Filter status codes (e.g., -fc 404,403,401)-fl: Filter line count-fr: Filter regex (e.g., -fr "error")-fs: Filter response size (e.g., -fs 42,4242)-ft: Filter response time-fw: Filter word countCRITICAL: Always use -ac unless you have a specific reason not to. This is especially important when having Claude analyze results, as it dramatically reduces noise and false positives.
# Auto-calibration - ALWAYS USE THIS
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -ac
# Per-host auto-calibration (useful for multiple hosts)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -ach
# Custom auto-calibration string (for specific patterns)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -acc "404NotFound"
Why-ac is essential:
When Claude analyzes your ffuf results,-ac is MANDATORY - without it, Claude will waste time sifting through thousands of false positives instead of finding the interesting anomalies.
# Limit to 2 requests per second (stealth mode)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -rate 2
# Add delay between requests (0.1 to 2 seconds random)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -p 0.1-2.0
# Set number of concurrent threads (default: 40)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -t 10
# Maximum total execution time (60 seconds)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -maxtime 60
# Maximum time per job (useful with recursion)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -maxtime-job 60 -recursion
# JSON output
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -o results.json
# HTML output
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of html -o results.html
# CSV output
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of csv -o results.csv
# All formats
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -of all -o results
# Silent mode (no progress, only results)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -s
# Pipe to file with tee
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -s | tee results.txt
This is one of the most powerful features of ffuf, especially for authenticated requests with complex headers, cookies, or tokens.
Workflow:
req.txt)FUZZ keyword--request flag# From a file containing raw HTTP request
ffuf --request req.txt -w /path/to/wordlist.txt -ac
Example req.txt file:
POST /api/v1/users/FUZZ HTTP/1.1
Host: target.com
User-Agent: Mozilla/5.0
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
Cookie: session=abc123xyz; csrftoken=def456
Content-Type: application/json
Content-Length: 27
{"action":"view","id":"1"}
Use Cases:
Pro Tips:
You can place FUZZ in multiple locations: URL path, headers, body
Use -request-proto https if needed (default is https)
Always use -ac to filter out authenticated "not found" or error responses
Great for IDOR testing: fuzz user IDs, document IDs, etc. in authenticated contexts
ffuf --request req.txt -w user_ids.txt -ac -mc 200 -o results.json
ffuf --request req.txt -w endpoints.txt:ENDPOINT -w ids.txt:ID -mode pitchfork -ac
# HTTP proxy (useful for Burp Suite)
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -x http://127.0.0.1:8080
# SOCKS5 proxy
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -x socks5://127.0.0.1:1080
# Replay matched requests through proxy
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -replay-proxy http://127.0.0.1:8080
# Using cookies
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -b "sessionid=abc123; token=xyz789"
# Client certificate authentication
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -cc client.crt -ck client.key
# URL encoding
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -enc 'FUZZ:urlencode'
# Multiple encodings
ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -enc 'FUZZ:urlencode b64encode'
# SQL injection testing
ffuf -w sqli_payloads.txt -u https://target.com/page.php?id=FUZZ -fs 1234
# XSS testing
ffuf -w xss_payloads.txt -u https://target.com/search?q=FUZZ -mr "<script>"
# Command injection
ffuf -w cmdi_payloads.txt -u https://target.com/execute?cmd=FUZZ -fr "error"
# Process multiple URLs
cat targets.txt | xargs -I@ sh -c 'ffuf -w wordlist.txt -u @/FUZZ -ac'
# Loop through multiple targets with results
for url in $(cat targets.txt); do
ffuf -w wordlist.txt -u $url/FUZZ -ac -o "results_$(echo $url | md5sum | cut -d' ' -f1).json"
done
Use -ac by default for every scan. This is non-negotiable for productive pentesting:
ffuf -w wordlist.txt -u https://target.com/FUZZ -ac
Don't struggle with command-line flags for complex auth. Capture the full request and use --request:
# 1. Capture authenticated request from Burp/DevTools
# 2. Save to req.txt with FUZZ keyword in place
# 3. Run with -ac
ffuf --request req.txt -w wordlist.txt -ac -o results.json
Use -rate to avoid triggering WAF/IDS or overwhelming the server:
ffuf -w wordlist.txt -u https://target.com/FUZZ -rate 2 -t 10
-fs to filter by size or -fc to filter by status code-fc 403,404 -fs 1234Always save results to a file for later analysis:
ffuf -w wordlist.txt -u https://target.com/FUZZ -o results.json -of json
Press ENTER during execution to drop into interactive mode where you can:
Be careful with recursion depth to avoid getting stuck in infinite loops or overwhelming the server:
ffuf -w wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2 -maxtime-job 120
ffuf -w ~/wordlists/common.txt -u https://target.com/FUZZ -mc 200,301,302,403 -ac -c -v
ffuf -w ~/wordlists/raft-large-directories.txt -u https://target.com/FUZZ -e .php,.html,.txt,.bak,.old -ac -c -v -o results.json
# 1. Save your authenticated request to req.txt with FUZZ keyword
# 2. Run:
ffuf --request req.txt -w ~/wordlists/api-endpoints.txt -ac -o results.json -of json
ffuf -w ~/wordlists/api-endpoints.txt -u https://api.target.com/v1/FUZZ -H "Authorization: Bearer TOKEN" -mc 200,201 -ac -c
ffuf -w ~/wordlists/subdomains-top5000.txt -u https://FUZZ.target.com -ac -c -v
ffuf -w ~/wordlists/passwords.txt -X POST -d "username=admin&password=FUZZ" -u https://target.com/login -fc 401 -rate 5 -ac
# Use req.txt with authenticated headers and FUZZ in the ID parameter
ffuf --request req.txt -w numbers.txt -ac -mc 200 -fw 100-200
Create ~/.config/ffuf/ffufrc for default settings:
[http]
headers = ["User-Agent: Mozilla/5.0"]
timeout = 10
[general]
colors = true
threads = 40
[matcher]
status = "200-299,301,302,307,401,403,405,500"
-ac for auto-calibration-fs-fr-t 100-ignore-body if you don't need response content-rate 2-p 0.5-1.5-t 10-mc all to see all responses-v to see what's happening| Task | Command Template |
|---|---|
| Directory Discovery | ffuf -w wordlist.txt -u https://target.com/FUZZ -ac |
| Subdomain Discovery | ffuf -w subdomains.txt -u https://FUZZ.target.com -ac |
| Parameter Fuzzing | ffuf -w params.txt -u https://target.com/page?FUZZ=value -ac |
| POST Data Fuzzing | ffuf -w wordlist.txt -X POST -d "param=FUZZ" -u https://target.com/endpoint |
| With Extensions | Add -e .php,.html,.txt |
| Filter Status |
This skill includes supplementary materials in the resources/ directory:
Helper Script Usage:
# Analyze results to find interesting anomalies
python3 ffuf_helper.py analyze results.json
# Create authenticated request template
python3 ffuf_helper.py create-req -o req.txt -m POST -u "https://api.target.com/users" \
-H "Authorization: Bearer TOKEN" -d '{"action":"FUZZ"}'
# Generate IDOR testing wordlist
python3 ffuf_helper.py wordlist -o ids.txt -t numbers -s 1 -e 10000
When to use resources:
When helping users with ffuf:
-ac in every command - This is mandatory for productive pentesting and result analysisreq.txt file with the full HTTP requestffuf --request req.txt -w wordlist.txt -ac-ac for auto-calibration-rate) for production targets-o results.json-of html or for client-friendly formatsWeekly Installs
89
Repository
GitHub Stars
128
First Seen
Jan 24, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykFail
Installed on
codex77
opencode75
gemini-cli73
cursor71
github-copilot65
claude-code61
xget技能:自动执行Shell命令与文件编辑的开发运维工具,提升开发效率
43,100 周安装
Add -fc 404,403 |
| Filter Size | Add -fs 1234 |
| Rate Limit | Add -rate 2 |
| Save Output | Add -o results.json |
| Verbose | Add -c -v |
| Recursion | Add -recursion -recursion-depth 2 |
| Through Proxy | Add -x http://127.0.0.1:8080 |
-of csv-ac (if not, results will be too noisy)
* Focus on anomalies: different status codes, response sizes, timing
* Look for interesting endpoints: admin, api, backup, config, .git, etc.
* Flag potential vulnerabilities: error messages, stack traces, version info
* Suggest follow-up fuzzing on interesting findings