Tool
CLI
Web Security

ffuf

by ffuf

15.4Kstars
1.5Kforks
165watchers
Updated 19 days ago
About

ffuf is a high-performance web fuzzer written in Go, designed for rapid content discovery, virtual host enumeration, and parameter fuzzing.

Fast web fuzzer written in Go

Primary Use Case

ffuf is primarily used by security professionals, penetration testers, and bug bounty hunters to discover hidden directories, files, subdomains, and vulnerable parameters on web applications. Its speed and efficiency make it ideal for large-scale reconnaissance and identifying potential attack vectors.

Key Features
  • Fast web fuzzer written in Go
  • Content discovery
  • Virtual host discovery
  • GET parameter fuzzing
  • POST data fuzzing
  • External mutator support
  • Configuration files
  • Interactive mode

Installation

  • Download a prebuilt binary from the releases page.
  • On macOS with Homebrew: `brew install ffuf`
  • Using Go compiler: `go install github.com/ffuf/ffuf/v2@latest`
  • From source: `git clone https://github.com/ffuf/ffuf ; cd ffuf ; go get ; go build`

Usage

>_ ffuf -w /path/to/wordlist -u https://target/FUZZ

Typical directory discovery by fuzzing the URL path.

>_ ffuf -w /path/to/vhost/wordlist -u https://target -H "Host: FUZZ" -fs 4242

Virtual host discovery by fuzzing the Host header and filtering by response size.

>_ ffuf -w /path/to/paramnames.txt -u https://target/script.php?FUZZ=test_value -fs 4242

GET parameter name fuzzing.

>_ ffuf -w /path/to/values.txt -u https://target/script.php?valid_name=FUZZ -fc 401

Fuzzing GET parameter values and filtering by HTTP status code.

>_ ffuf -w /path/to/postdata.txt -X POST -d "username=admin\\&password=FUZZ" -u https://target/login.php -fc 401

POST data fuzzing, filtering by HTTP status code.

>_ ffuf -maxtime <seconds>

Set a maximum execution time for the entire process.

Security Frameworks
Reconnaissance
Initial Access
Execution
Usage Insights
  • Can be chained with Metasploit for automated exploitation
  • Useful for continuous security monitoring in CI/CD pipelines
  • Integrate with CI/CD tools to automate fuzzing during deployment
  • Utilize in red team exercises to simulate real-world attacks
  • Combine with other tools for comprehensive vulnerability assessments

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about ffuf. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team80%
Blue Team30%
Purple Team50%
Details
LicenseMIT License
LanguageGo
Open Issues548
Topics
fuzzer
pentesting
infosec
web