GoSpider β Hacker Tools: Enumerate the web! π©βπ»
By Anna Hammond
November 23, 2021
As a bug bounty hunter, you need to get a good view of all the pages and endpoints your targets host. Manually enumerating these can become labour intensive, boring and on top of that, is prone to errors. Today weβre going to look at GoSpider, a tool that can do all this for us!
Photo by Pixabay on Pexels.com
πββοΈ What is GoSpider?
GoSpider is a tool written in Go by @j3ssiejjj that helps you to enumerate all endpoints on your target!
It takes a URL or a list of URLs and will then query them whilst scanning the responses for more URLs on the same domain. It will do this recursively and thus give you a ton of results!
π±βπ Our first run!
Check out the video below for an example of how you can use GoSpider!
π·ββοΈ Installing GoSpider
Want to install GoSpider? (On Kali)
sudo apt install gospider
π§ Conclusion
GoSpider is a simple, yet helpful tool to find those injection points for your secretive CRLFs. Start using it today and letβs get some bounties!
If you would like to recommend a tool for us to cover next week, then be sure to let us know down below. Also be sure to check outΒ all the previous Hacker Tools articles, such asΒ the last one on Waybackurls.
Did you know that there is a video accompanying this article? Check outΒ the playlist!
You may also like
April 1, 2026
BugQuest 2026: 31 Days of Broken Access Control
In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding the basics of authentication and authorization to spotting subtle authorization bypasses in real code, we broke down one of th
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. This month's challenge, brought forward by Kulindu, presented us with a Secure Search Portal that, on the surface, appeared to be well protected. A strict Content Secu
March 20, 2026
Exploiting broken access control vulnerabilities
Broken access control vulnerabilities have consistently remained at the top of the OWASP Top 10, and for a good reason. As web applications continue to grow in complexity, with the introduction of role-based access controls, multi-tenant support, and granular permission models, the likelihood of acc
