BirDuster is a Python based knockoff of the original DirBuster.
BirDuster is a multi threaded Python application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within.
pip3 install --user BirDuster
git clone https://www.github.com/ytisf/BirDuster
pip3 install --user -r requirements.txt
python3 BirDuster.py --help
BirDuster has the following flags and options (which you can see with the
--help: Show help and exit.
--verbosity: Verbosity level.
--port: Port to use while dirbusting. Default 80/443.
--pfile: If you want to test several ports just write them to a file with newlines.
--threads: Amount of concurrent threads. Default is 15.
--output: Output CSV of responses. Default is
--dlist: Directory list file. Default is
--writereponse: Will write HTTP/S responses to files. Default is False.
--ignorecertificate: Ignore SSL certificate errors. Default is False.
--useragent: User-Agent to use. Default is random user-agent.
--ssl: Use SSL or not.
-iflag will automatically turn on SSL.
--timeout: Change default socket timeout. Default is 3 seconds.
usage: dirbus.py [-h] [-v] [-p PORT] [-P PFILE] [-t THREADS] [-o OUTPUT]
[-l DLIST] [-w] [-i] [-u USERAGENT] [--ssl]
domain domain or host to buster
Source : KitPloit – PenTest Tools!