H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

✨ DeeZNuTz

✨ Master ✨
Staff member
May 15, 2017
990
759
1,045
A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster.
Features
  • Fast and portable - install hyper and run.
  • Multiconnection scanning.
  • Multithreaded connections.
  • Scalable: scans can be as docile or aggressive as you configure them to be.
  • h2 and h2c support.
  • Configurable directory recursion depth.
Install
You only need to install one dependency. If you don't have hyper, run:
Code:
pip3 install -r requirements.txt
Usage
Code:
usage: h2buster.py [-h] -w wordlist -u target [-r directory_depth]
[-c connections] [-t threads]
h2buster: an HTTP/2 web directory brute-force scanner.
arguments:
-h, --help show this help message and exit
-w wordlist Directory wordlist
-u target Target URL/IP address. Default port is 443 and HTTPS
enabled. To specify otherwise, use ':port' or 'http://'
(port will default to 80 then).
-r directory_depth Maximum recursive directory depth. Minimum is 1, default
is 2, unlimited is 0.
-c connections Number of HTTP/2 connections. Default is 3.
-t threads Number of threads per connection. Default is 15.
Download H2Buster
 

About us

  • Our community has been around for many years and pride ourselves on offering unbiased, critical discussion among people of all different backgrounds. We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu