Ffuf Web Fuzzing

🌐Community
by jthack · vlatest · Repository

Discovers hidden web directories and files through targeted fuzzing using jthack's ffuf tool.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add ffuf-web-fuzzing npx -- -y @trustedskills/ffuf-web-fuzzing
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "ffuf-web-fuzzing": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/ffuf-web-fuzzing"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

The ffuf-web-fuzzing skill enables AI agents to perform fast, efficient web fuzzing using the FFUF (Fuzz Faster U Fool) tool. It automates the discovery of hidden directories, files, and parameters by sending crafted HTTP requests to target servers. This capability helps security professionals identify potential entry points and vulnerabilities in web applications.

When to use it

  • Directory Discovery: Map out the structure of a website to find hidden admin panels or backup files.
  • Parameter Fuzzing: Test input fields for unexpected parameters that might lead to IDOR or injection flaws.
  • Vulnerability Scanning: Quickly probe web servers for common misconfigurations before deeper manual testing.
  • Penetration Testing: Automate the initial reconnaissance phase in authorized security assessments.

Key capabilities

  • Integrates with the FFUF command-line tool for high-speed fuzzing operations.
  • Supports various wordlists to target specific file types or directory names.
  • Executes HTTP requests directly against provided URLs.
  • Returns results indicating successful matches based on status codes or response bodies.

Example prompts

  • "Run a directory fuzzing scan on https://example.com using the standard SecLists directory wordlist."
  • "Fuzz the URL parameters of /login to identify any hidden fields that might bypass authentication."
  • "Execute an HTTP fuzzing test against the target IP to discover non-standard ports or services."

Tips & gotchas

Ensure you have explicit authorization before running fuzzing tools on any target, as unauthorized scanning is illegal. Always configure rate limiting if available to avoid overwhelming the target server and causing service disruption.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
jthack
Installs
46

🌐 Community

Passed automated security scans.