SlackBuilds Repository

15.0 > Network > gobuster (3.8.2)

Gobuster is a high-performance directory/file, DNS and virtual host
brute-forcing tool written in Go. It's designed to be fast,
reliable, and easy to use for security professionals and
penetration testers.

Features:
- High Performance: Multi-threaded scanning with configurable
concurrency
- Multiple Modes: Directory, DNS, virtual host, S3, GCS, TFTP, and
fuzzing modes
- Security Focused: Built for penetration testing and security
assessments
- Docker Support: Available as a Docker container
- Extensible: Pattern-based scanning and custom wordlists

What Can Gobuster Do?
- Web Directory/File Enumeration: Discover hidden directories and
files on web servers
- DNS Subdomain Discovery: Find subdomains with wildcard support
- Virtual Host Detection: Identify virtual hosts on target web
servers
- Cloud Storage Enumeration: Discover open Amazon S3 and Google
Cloud Storage buckets
- TFTP File Discovery: Find files on TFTP servers
- Custom Fuzzing: Flexible fuzzing with customizable parameters

This script requires network access during build.

This requires: google-go-lang

Maintained by: danix
Keywords: gobuster,directory busting,web,pentest
ChangeLog: gobuster

Homepage:
https://github.com/OJ/gobuster

Source Downloads (64bit):
gobuster-3.8.2.tar.gz (456f3772e47415e1927522bfe32d0388)

Download SlackBuild:
gobuster.tar.gz
gobuster.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
gobuster.SlackBuild
gobuster.info
slack-desc

Validated for Slackware 15.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2026 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds