ffuf-claude-skill
Web Fuzzing with Ffuf
Ffuf (Fast Web Fuzzer) helps security professionals discover hidden web resources. This skill provides patterns and guidance for integrating ffuf into Claude Code workflows for efficient web reconnaissance.
下載技能 ZIP
在 Claude 中上傳
前往 設定 → 功能 → 技能 → 上傳技能
開啟並開始使用
測試它
正在使用「ffuf-claude-skill」。 Run ffuf directory scan on http://example.com
預期結果:
Executing ffuf scan with common wordlist...
Results Summary:
- /admin (Status: 200) - 2.3KB
- /api (Status: 301) - Redirect
- /backup (Status: 403) - Forbidden
- /login (Status: 200) - 5.1KB
Found 4 interesting directories. Recommend checking /admin and /login for further testing.
正在使用「ffuf-claude-skill」。 Scan for PHP files on example.com
預期結果:
Running extension fuzzing with .php extensions...
Discovered endpoints:
- /index.php (200)
- /admin.php (200)
- /api/users.php (200)
- /config.php (403)
4 PHP files found. /config.php returned 403 - may contain sensitive configuration.
安全審計
安全All static findings are false positives. The hardcoded URLs at lines 4 and 22 are legitimate GitHub repository links in documentation. The 'weak cryptographic algorithm' flags at lines 3 and 20 incorrectly identify 'ffuf' (Fast Web Fuzzer) as a cryptographic algorithm - it is actually a well-known web fuzzing security tool. No actual security risks detected.
高風險問題 (1)
低風險問題 (1)
風險因素
🌐 網路存取 (2)
品質評分
你能建構什麼
Directory Discovery Scan
Scan target web servers for hidden directories and files using common wordlists
Parameter Fuzzing
Discover hidden parameters in web applications that may reveal functionality or vulnerabilities
Subdomain Enumeration
Identify valid subdomains during the reconnaissance phase of security assessments
試試這些提示
Run an ffuf scan to discover directories on [TARGET_URL] using the common wordlist. Show me the results.
Perform an ffuf scan on [TARGET_URL] but filter out 403 and 404 status codes. Use a medium-sized wordlist.
Scan [TARGET_URL] for common file extensions like .php, .asp, .txt using ffuf. Exclude 404 responses.
Run a recursive ffuf scan on [TARGET_URL] starting with the /api/ path. Use the small wordlist and match responses with 200 status.
最佳實務
- Start with small wordlists and progressively increase size to avoid overwhelming the target
- Use appropriate filters to exclude noisy responses like 404 and 403 status codes
- Always obtain proper authorization before scanning any target that you do not own
避免
- Running ffuf without rate limiting which may trigger WAF blocks or DOS protection
- Using default wordlists without customization for the specific target technology
- Ignoring redirect chains - ffuf follows redirects by default which may miss discovery