/dirlister

DirLister allows you to quickly parse a directory indexing vulnerability on WordPress

Primary LanguagePythonGNU General Public License v3.0GPL-3.0

About dirLister

dirLister was written in order to help any penetration testers to quickly identify all files within a Directory Listing Vulnerability on WordPress.

More information regarding Directory Listing Vulnerability: https://cwe.mitre.org/data/definitions/548.html

Usage

Print the help to get all necessary information

$ python3 dirlister.py -h
usage: dirlister.py [-h] [--url URL] [--ext EXT] [--log LOG]

Script to quickly scrap directory listing

optional arguments:
  -h, --help  show this help message and exit
  --url URL   Specify the URL to parse
  --ext EXT   Specify extension(s) to search (pdf,png,css,etc.)
  --log LOG   Specify output log file

alt text

Author

Régis SENET (rsenet)

Contributing

Bug reports and pull requests are welcome on GitHub.

License

The project is available as open source under the terms of the GPLv3