commands // 2026-01-05 // ID: REF-Wfuzz Command List

Wfuzz Command List


Wfuzz Command Guide

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kinds of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing, etc.

Top 10 Useful Commands

1. Basic Directory Fuzzing

wfuzz -c -z file,wordlist.txt --hc 404 http://target.com/FUZZ

Explanation:
* -c: Color output.
* -z file,wordlist.txt: Defines the payload (wordlist).
* --hc 404: Hides responses with code 404.
* FUZZ: The keyword Wfuzz replaces with words from the list.

2. Fuzzing Extension

wfuzz -c -z file,wordlist.txt http://target.com/FUZZ.php

Explanation: Finds files with a specific extension (e.g., .php) by appending it to the FUZZ keyword.

3. Fuzzing Parameters (GET)

wfuzz -c -z file,wordlist.txt http://target.com/index.php?FUZZ=test

Explanation: Fuzzes the parameter name to find hidden GET parameters.

4. Fuzzing Values (Post)

wfuzz -c -z file,passwords.txt -d "user=admin&pass=FUZZ" http://target.com/login.php

Explanation: Fuzzes POST data (-d). Replaces FUZZ in the body payload (brute-forcing password).

5. Multiple Fuzzers (User + Pass)

wfuzz -c -z file,users.txt -z file,pass.txt -d "user=FUZZ&pass=FUZ2Z" http://target.com/login

Explanation: Uses multiple payloads. FUZZ maps to the first list, FUZ2Z maps to the second.

6. Filter by Words (Hide Small Pages)

wfuzz -c -z file,wordlist.txt --hw 50 http://target.com/FUZZ

Explanation: Hides results with a specific word count (--hw). Useful if all error pages have exactly 50 words.

7. Filter by Lines

wfuzz -c -z file,wordlist.txt --hl 100 http://target.com/FUZZ

Explanation: Hides results with a specific line count (--hl).

8. Use Proxy

wfuzz -c -z file,wordlist.txt -p 127.0.0.1:8080 http://target.com/FUZZ

Explanation: Routes traffic through a proxy (-p) like Burp Suite.

9. Scan for Subdomains

wfuzz -c -z file,subdomains.txt -H "Host: FUZZ.target.com" http://target.com

Explanation: Fuzzes the Host header to find internal virtual hosts or subdomains.

10. Save Output

wfuzz -c -z file,wordlist.txt -f results.json,json http://target.com/FUZZ

Explanation: Saves the results to a file (-f filename,format).

The Most Powerful Command

Fuzzing for IDOR (Insecure Direct Object References) with immediate anomalies shown:

wfuzz -c -z range,1-1000 --hh 250 http://target.com/profile.php?id=FUZZ

Why it's powerful:
* -z range,1-1000: Generates numbers 1 to 1000 automatically (no file needed).
* --hh 250: Hides "Access Denied" pages (assuming they are 250 characters).
* Result: Shows only the IDs that return a different/valid profile page.