angryFuzzer – Tool for Information Gathering

AngryFuzz3r is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb project

Discover hidden files and directories on a web server. The application tries to find URL relative paths of the given website by comparing them with a given set.


  • Fuzz URL set from an input file
  • Concurrent relative path search
  • Configurable number of fuzzing workers
  • Fuzz CMS ==> WordPress,Drupal,Joomla
  • Generate reports of the valid paths


$ python -h
Usage: [options]

-h, --help show this help message and exit
-q, --quiet Silent mode ,only repport
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST
Custom wordlist


  • Fuzzing an URL with default dictionary
python -u 
  • Fuzzing CMS (wp: in this example !)
python -u --cms wp 
  • Fuzzing a Custom Wordlist
python -u -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt

How to install

$ git clone
$ cd angryFuzzer
$ python

from KitPloit – PenTest Tools!



Introduce tus datos o haz clic en un icono para iniciar sesión:

Logo de

Estás comentando usando tu cuenta de Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s