logo
DATABASE RESOURCES PRICING ABOUT US

DirDar - A Tool That Searches For (403-Forbidden) Directories To Break It And Get Dir Listing On It

Description

[![](https://1.bp.blogspot.com/-g_I0efdABHQ/YC8mQ-vcncI/AAAAAAAAVXQ/cWwLcl5PSJs0BlU70YYrytRNOVG8h0-MgCNcBGAsYHQ/w640-h346/DirDar_5_windows.jpeg)](<https://1.bp.blogspot.com/-g_I0efdABHQ/YC8mQ-vcncI/AAAAAAAAVXQ/cWwLcl5PSJs0BlU70YYrytRNOVG8h0-MgCNcBGAsYHQ/s1920/DirDar_5_windows.jpeg>) ** bypass forbidden directories - find and identify dir listing - you can use it as directory brute-forcer as well** **Compatabily** This tool is compatible with all kind of operating systems as long as you have GO [compiler](<https://www.kitploit.com/search/label/Compiler> "compiler" ) installed **Install** You can use this command if you have Go installed and configured. go get -u github.com/m4dm0e/dirdar Or you can [download a release](<https://github.com/m4dm0e/dirdar/releases> "download a release" ). To make it easier to execute you can put the directory to the [binary](<https://www.kitploit.com/search/label/Binary> "binary" ) in your environment variable `%PATH%`. **Tool screen:** * Linux [![](https://1.bp.blogspot.com/-oA7JAq_-IRI/YC8mq-CLYKI/AAAAAAAAVXY/zrEhzBhaZ5Q2_u7dRAos2kHd1TFYpzsHQCNcBGAsYHQ/w640-h360/DirDar_4_firstScreen.png)](<https://1.bp.blogspot.com/-oA7JAq_-IRI/YC8mq-CLYKI/AAAAAAAAVXY/zrEhzBhaZ5Q2_u7dRAos2kHd1TFYpzsHQCNcBGAsYHQ/s1920/DirDar_4_firstScreen.png>) * Windows [![](https://1.bp.blogspot.com/-fYwXjkQhcCc/YC8mxutP0_I/AAAAAAAAVXc/pYM207k_yUM0Lwub7g2hNb8YUKyayh0MQCNcBGAsYHQ/w640-h346/DirDar_5_windows.jpeg)](<https://1.bp.blogspot.com/-fYwXjkQhcCc/YC8mxutP0_I/AAAAAAAAVXc/pYM207k_yUM0Lwub7g2hNb8YUKyayh0MQCNcBGAsYHQ/s1920/DirDar_5_windows.jpeg>) **Help&Flags** -threads int Number of threads (Defaulf 40) -err If you want to show errors!(Includes 404 errors) [True-False] -only-ok Print out only OK (Bypassed and dir listing) -single string Only scan single target e.g (-single https://example.com/) -t int Set the timeout of the requests (default 10000) -wl string Forbidden directories WordList * Screenshot [![](https://1.bp.blogspot.com/-7wg7EJJPKVE/YC8m5Y9jPMI/AAAAAAAAVXg/y64tRDKavq8LLQfb1BpnzypKqQdr4BVbACNcBGAsYHQ/w640-h360/DirDar_6_help.png)](<https://1.bp.blogspot.com/-7wg7EJJPKVE/YC8m5Y9jPMI/AAAAAAAAVXg/y64tRDKavq8LLQfb1BpnzypKqQdr4BVbACNcBGAsYHQ/s1920/DirDar_6_help.png>) **Bugs found by DirDar: (Will share the write up ASAP)** * BackUp files at [MTN Group](<https://hackerone.com/mtn_group?type=team> "MTN Group" ) (Triaged) * OLD php [scripts](<https://www.kitploit.com/search/label/Scripts> "scripts" ) to [SQLi](<https://www.kitploit.com/search/label/SQLi> "SQLi" ) at [MTN Group](<https://hackerone.com/mtn_group?type=team> "MTN Group" ) (Triaged) * OLD Files to [information disclosure](<https://www.kitploit.com/search/label/Information%20Disclosure> "information disclosure" ) at [BOSCH](<http://psirt.bosch.com/> "BOSCH" ) (Triaged) **Review:** [![](https://1.bp.blogspot.com/-Kft9UCl8EdY/YC8nHBXgDSI/AAAAAAAAVXs/YUaC94HmZsMxDvZgbf1En20LRIwkQCZ6QCNcBGAsYHQ/w640-h340/391851.png)](<https://asciinema.org/a/391851>) **[Download DirDar](<https://github.com/M4DM0e/DirDar> "Download DirDar" )**