Welcome to PARAKRAM, an advanced and efficient Directory Buster tool designed to streamline web URL directory busting. This tool is capable of detecting page extensions (such as .html, .jsp, .php) and automatically appending those extensions to each wordlist entry when the --auto-extension flag is enabled.
PARAKRAM’s aim is to make directory busting faster, smarter, and more user-friendly. If you're looking for a tool to perform web application security testing, PARAKRAM is here to assist you in uncovering hidden directories with ease.
- Automatic Extension Detection: Automatically detects page extensions like
.html,.jsp, and.phpand appends them to each wordlist entry during scans if the--auto-extensionflag is enabled. - Efficiency: Optimized for fast directory busting with flexible configuration.
- User-Friendly: Simple command-line interface (CLI) for easy setup and use.
PARAKRAM is lightweight and easy to use, with no external dependencies required. To get started, follow these steps:
-
Clone the repository to your local machine:
git clone https://github.com/yourusername/PARAKRAM.git cd PARAKRAM -
Make sure the script has execution permissions:
chmod +x parakram
-
You can now run PARAKRAM from your terminal.
PARAKRAM is a command-line tool that allows you to perform directory busting with ease. Here’s how to use it:
./parakram --url http://example.com --wordlist /path/to/wordlist.txtThis will start the directory busting scan using the provided wordlist against the target URL.
To make PARAKRAM automatically detect and append extensions, simply add the --auto-extension flag:
./parakram --url http://example.com --wordlist /path/to/wordlist.txt --auto-extensionThis option will help the tool detect extensions like .html, .jsp, .php, and append them to each entry in the wordlist during the scan. It's useful when you’re unsure about the file extensions of hidden directories.
Scan a website with a custom wordlist:
./parakram --url http://example.com --wordlist /path/to/wordlist.txtEnable automatic extension detection:
./parakram --url http://example.com --wordlist /path/to/wordlist.txt --auto-extensionScan a website with verbose output:
./parakram --url http://example.com --wordlist /path/to/wordlist.txt --verbose--url: The target website URL. --wordlist: Path to the wordlist file used for directory busting. --auto-extension: Automatically detects and appends common file extensions to each wordlist entry. --verbose: Enable detailed output for debugging purposes. --help: Display help and available commands.
I’m happy to allow and encourage fruitful enhancements to this tool. If you have ideas for features or improvements, please feel free to fork the repository and submit a pull request. I appreciate your contributions and look forward to improving PARAKRAM together!
This project is licensed under the MIT License - see the LICENSE file for details.
