Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis
View on GitHubrafaelcalleja/claude-market-place
personal-ai-infrastructure
January 21, 2026
Select agents to install to:
npx add-skill https://github.com/rafaelcalleja/claude-market-place/blob/main/plugins/personal-ai-infrastructure/skills/ffuf/SKILL.md -a claude-code --skill ffuf-web-fuzzingInstallation paths:
.claude/skills/ffuf-web-fuzzing/# FFUF (Fuzz Faster U Fool) Skill > **Contributed by:** [Joseph Thacker (@rez0)](https://twitter.com/rez0__) ## Overview FFUF is a fast web fuzzer written in Go, designed for discovering hidden content, directories, files, subdomains, and testing for vulnerabilities during penetration testing. It's significantly faster than traditional tools like dirb or dirbuster. ## Installation ```bash # Using Go go install github.com/ffuf/ffuf/v2@latest # Using Homebrew (macOS) brew install ffuf # Binary download # Download from: https://github.com/ffuf/ffuf/releases/latest ``` ## Core Concepts ### The FUZZ Keyword The `FUZZ` keyword is used as a placeholder that gets replaced with entries from your wordlist. You can place it anywhere: - URLs: `https://target.com/FUZZ` - Headers: `-H "Host: FUZZ"` - POST data: `-d "username=admin&password=FUZZ"` - Multiple locations with custom keywords: `-w wordlist.txt:CUSTOM` then use `CUSTOM` instead of `FUZZ` ### Multi-wordlist Modes - **clusterbomb**: Tests all combinations (default) - cartesian product - **pitchfork**: Iterates through wordlists in parallel (1-to-1 matching) - **sniper**: Tests one position at a time (for multiple FUZZ positions) ## Common Use Cases ### 1. Directory and File Discovery ```bash # Basic directory fuzzing ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ # With file extensions ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -e .php,.html,.txt,.pdf # Colored and verbose output ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -c -v # With recursion (finds nested directories) ffuf -w /path/to/wordlist.txt -u https://target.com/FUZZ -recursion -recursion-depth 2 ``` ### 2. Subdomain Enumeration ```bash # Virtual host discovery ffuf -w /path/to/subdomains.txt -u https://target.com -H "Host: FUZZ.target.com" -fs 4242 # Note: -fs 4242 filters out responses of size 4242 (adjust based on default response size) ``` ### 3. Parameter Fuzzing ```bash # GET parameter names ffuf -w /p
Issues Found: