GoSpider β Hacker Tools: Enumerate the web! π©βπ»
By Anna Hammond
November 23, 2021
As a bug bounty hunter, you need to get a good view of all the pages and endpoints your targets host. Manually enumerating these can become labour intensive, boring and on top of that, is prone to errors. Today weβre going to look at GoSpider, a tool that can do all this for us!
Photo by Pixabay on Pexels.com
πββοΈ What is GoSpider?
GoSpider is a tool written in Go by @j3ssiejjj that helps you to enumerate all endpoints on your target!
It takes a URL or a list of URLs and will then query them whilst scanning the responses for more URLs on the same domain. It will do this recursively and thus give you a ton of results!
π±βπ Our first run!
Check out the video below for an example of how you can use GoSpider!
π·ββοΈ Installing GoSpider
Want to install GoSpider? (On Kali)
sudo apt install gospider
π§ Conclusion
GoSpider is a simple, yet helpful tool to find those injection points for your secretive CRLFs. Start using it today and letβs get some bounties!
If you would like to recommend a tool for us to cover next week, then be sure to let us know down below. Also be sure to check outΒ all the previous Hacker Tools articles, such asΒ the last one on Waybackurls.
Did you know that there is a video accompanying this article? Check outΒ the playlist!
You may also like
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way to give back to the community. In response to one of our recent articles, we decided to focus on JSON
November 11, 2025
Hunting for DOM-based XSS vulnerabilities: A complete guide
Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more complex and developers continue to shift application logic to the client-side, more complex client-side vulnerab
November 7, 2025
Exploiting JWT vulnerabilities: A complete guide
Before JSON Web Tokens (JWTs) became popular in today's app development landscape, web applications predominantly used server-side sessions, which presented horizontal scalability issues. JWTs solved this by moving authentication data from the server to the token itself. They are self-contained, sta
