PathFinder is a Python tool for discovering hidden directories and files on web servers. It uses multithreading for faster scanning, making it useful for penetration testing and security assessments.
- Python 3.7 or higher
-
Clone this repository:
git clone https://github.com/cybertricksnet/PathFinder.git
-
Change to the directory:
cd PathFinder
-
Install necessary libraries: Install any missing Python libraries by running:
pip install -r requirements.txt
python3 PathFinder.py https://example.com /usr/share/wordlists/dirb/common.txt --threads 100
This will scan the domain https://example.com
using the wordlist common.txt
and 100 threads.
python3 PathFinder.py https://example.com /usr/share/wordlists/dirb/common.txt -e php html js --threads 100
This will attempt to find directories or files with .php
, .html
, and .js
extensions.
You can use a larger wordlist from SecLists for more comprehensive scanning. To download SecLists:
git clone https://github.com/danielmiessler/SecLists.git
Then use a larger wordlist like this:
python3 PathFinder.py https://example.com /path/to/SecLists/Discovery/Web-Content/big.txt --threads 100
The default wordlist comes from DirBuster, typically found on Kali Linux under /usr/share/wordlists/dirb/
. Alternatively, you can use wordlists from SecLists:
- SecLists repository: https://github.com/danielmiessler/SecLists
- Multithreading: Scan multiple directories and files at once for faster results.
- Supports file extensions: You can check for specific file extensions like
.php
,.html
, and.js
. - Custom headers and user agents: Add headers and user-agent strings for advanced use cases.
- You can adjust the number of threads depending on your machine's resources.
- Larger wordlists may take more time but can discover more hidden files and directories.
NOTE: Downloading this repository may trigger a false-positive alert from your anti-virus or anti-malware software. You can whitelist the filepath if necessary. This repository is safe to use and can be used free of charge. However, it is not recommended to store these files on critical systems, as they could pose a risk of local file inclusion attacks if improperly handled.