Skip to content

Latest commit

 

History

History
141 lines (109 loc) · 4.86 KB

README.md

File metadata and controls

141 lines (109 loc) · 4.86 KB

BunBuster

Ridiculously fast web & TCP fuzzer designed for brute-forcing directories, subdomains, and files on web servers.

Up to 3.5x faster than ffuf and fully built with Bun. Available for Windows, Mac and Linux.

Screenshot of a BunBuster scan's result, finding 2 paths on a test server Screenshot of a BunBuster scan in progress

* Without using artificial ratelimits, and in my own testing. Might vary depending on your machine.


Installation

  1. Go to the releases page and download the executable for your platform.
  2. Rename the file to bunbuster
  3. If you're on Linux, give the file executable permissions (chmod +x bunbuster)
  4. Add the executable to your PATH:
    • Linux: echo 'export PATH="$PATH:$(pwd)/bunbuster"' >> ~/.bashrc && source ~/.bashrc
    • Windows: setx PATH "%PATH%;%cd%\bunbuster"
    • Mac: echo 'export PATH="$PATH:$(pwd)/bunbuster"' >> ~/.zshrc && source ~/.zshrc

Make sure it has executable permissions (chmod +x bunbuster-xxxxxxx) and to add it to PATH, or else you'll have to cd into the executable's folder and use ./bunbuster instead of bunbuster.

Features

  • Super fast:
    • Optimized for speed, multi-threaded by default.
    • Built with Bun
    • 3.5x faster than ffuf
  • Extensible:
    • Fully-fledged TCP support
    • Fuzz by path, subdomains, parameters, request body, headers and more
  • Filtering:
    • Filter responses by size
    • Filter responses by status code
  • Very customizable:
    • Custom headers
    • Custom methods
    • Fully configurable request parameters
    • Use fuzzing in any request parameter, URL, paths, subdomains and more.
  • Bypass ratelimits:
    • Built-in rate limit detection and evasion by using a backoff delay.
    • Configurable request throttling by using the requests per minute config.
    • Simple IP spoofing by setting a randomized X-Forwarded-For/X-Real-IP header
    • Built-in timeout handling
  • And more:
    • Export as CSV
    • View request sizes
    • Easy to understand docs
    • Very simple to use UI

Note: As all other web fuzzers, you'll need a wordlist. You can download sample ones from the assets/wordlists folder in this repo.


BunBuster vs FFUF speed comparison

Speed comparison: Time to run a full scan
on http://ffuf.me/cd/basic/FUZZ, default settings, same wordlist (7530 words)

Usage

bunbuster <url> [options]

Use FUZZ as the placeholder for fuzzing. This is in order to make it easier to use with other tools like ffuf.
Run bunbuster --help to see all of the available arguments and options.

Examples

Basic

bunbuster http://ffuf.me/cd/basic/FUZZ -w ./wordlists/common.txt

FUZZ between extension and path

bunbuster http://ffuf.me/cd/ext/logs/FUZZ.log -w ./wordlists/common.txt

FUZZ in parameters

bunbuster http://ffuf.me/cd/param/data?FUZZ=1 -w ./wordlists/parameters.txt

Set ratelimiting

bunbuster http://ffuf.test/cd/rate/FUZZ -w ./wordlists/common.txt -rpm 3000 # 50 req/s

Automaric ratelimit detection

bunbuster http://ffuf.test/cd/rate/FUZZ -w ./wordlists/common.txt
# note that -rpm is not set

Proxying

bunbuster http://ffuf.test/cd/rate/FUZZ --proxy https://username:[email protected]:8080

Subdomain Discovery

bunbuster https://FUZZ.example.com -w ./wordlists/subdomains.txt

Custom Headers

bunbuster https://api.example.com/FUZZ \
  -w ./wordlists/all.txt \
  -o '{"headers": {"Authorization": "Bearer TOKEN"}}'

Verbose logging

bunbuster https://api.example.com/FUZZ \
  -w ./wordlists/all.txt \
  --verbose

Roadmap

These features aren't currently implemented but they might be comming soon.

  • Different wordlists that match to different keywords, e.g.
bunbuster https://$FUZZ1.example.com/$FUZZ2 -w "./wordlists/subdomains.txt, ./wordlists/common.txt"
  • Ability to use with bunx

Notes

  • If you don't know how to use this, copy this file and give it to ChatGPT. It will tell you everything you need to know. Don't open an issue.
  • Be mindful of potential IP blocking. BunBuster currently does not have support for Tor, but you can set up a VPN and it should use it too.
  • As always, use this responsibly and only on systems you have explicit permission to test BunBuster is intended for security research and authorized penetration testing. Always obtain proper authorization before scanning or testing any system you do not own or have explicit permission to test.
  • I know that the bundle size might be pretty big, but that's a Bun problem since it embeds its binary directly into the executable. But it's still under 95mb, so prob not a problem for most people.