Ad End 1 May 2026
Ad End 4 April 2026
test banner
banner Expire 25 April 2025
adv exp at 20 April 2026
ad End 25 April 2026
banner Expire 10 May 2026
ad End 5 May 2026
What's new
UniCvv
banner Expire 20 October 2024
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Trump cc shop
BidenCash Shop
Blackstash cc shop
Kfc CLub
Yale Lodge
best shop

Dark_Code_x

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,858
Reaction score
740
Points
212
Awards
2
  • Somebody Likes you
  • First post
A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster.
Features

  • Fast and portable - install hyper and run.
  • Multiconnection scanning.
  • Multithreaded connections.
  • Scalable: scans can be as docile or aggressive as you configure them to be.
  • h2 and h2c support.
  • Configurable directory recursion depth.
Install
You only need to install one dependency. If you don't have hyper, run:
Code:
pip3 install -r requirements.txt
Usage
Code:
usage: h2buster.py [-h] -w wordlist -u target [-r directory_depth]
[-c connections] [-t threads]
h2buster: an HTTP/2 web directory brute-force scanner.
arguments:
-h, --help show this help message and exit
-w wordlist Directory wordlist
-u target Target URL/IP address. Default port is 443 and HTTPS
enabled. To specify otherwise, use ':port' or 'http://'
(port will default to 80 then).
-r directory_depth Maximum recursive directory depth. Minimum is 1, default
is 2, unlimited is 0.
-c connections Number of HTTP/2 connections. Default is 3.
-t threads Number of threads per connection. Default is 15.
Click to expand...
 
Ad End 1 November 2024
Top