Minimal Directory Brute Force Tool
Designed for educational use and bug bounty practice.
pathveil/
│
├── img/
│ └── pathveil_demo.png
│
├── pathveil/
│ ├── __init__.py
│ ├── scanner.py
│ ├── wordlist.py
│ └── utils.py
│
├── wordlists/
│ └── common.txt
│
├── main.py
├── README.md
└── requirements.txt
- HTTP status code detection (200, 301, 302, 401, 403)
- Adjustable request timeout via
-tflag - Memory-efficient wordlist streaming (generator-based)
- Modular architecture
- Clean CLI interface with ASCII banner
- Clone the repository:
git clone https://github.com/cursedwind/pathveil.git
cd pathveil- Create a virtual environment and install dependencies:
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements.txt- Basic scan:
python main.py -u https://example.com -w wordlists/common.txt- Custom timeout:
python main.py -u https://example.com -w wordlists/common.txt -t 10- wordlists/common.txt → Minimal and practical starter list
- Supports large wordlists via streaming (RAM-friendly)
- Use only on systems you own or have explicit permission to test.
- This tool is intended for educational and authorized security research purposes.
- Unauthorized use may be illegal.
