Ffuf: Difference between revisions
Jump to navigation
Jump to search
Line 27: | Line 27: | ||
|- | |- | ||
| [[#ex-v|<code>-v</code>]] || Verbose output with full URL and redirects || <code>ffuf -u https://target.com/FUZZ -w wordlist.txt -v</code> | | [[#ex-v|<code>-v</code>]] || Verbose output with full URL and redirects || <code>ffuf -u https://target.com/FUZZ -w wordlist.txt -v</code> | ||
|} | |||
== <span id="input"></span>Input Options == | |||
{| class="wikitable" | |||
! Command !! Description !! Usage | |||
|- | |||
| [[#ex-D|<code>-D</code>]] || DirSearch wordlist compatibility mode, use with -e || <code>ffuf -u https://target.com/FUZZ -w dirs.txt -D -e php,html</code> | |||
|- | |||
| [[#ex-e|<code>-e [EXT]</code>]] || Comma-separated list of extensions to append || <code>ffuf -u https://target.com/FUZZ -w dirs.txt -e php,txt</code> | |||
|- | |||
| [[#ex-ic|<code>-ic</code>]] || Ignore comment lines in wordlist || <code>ffuf -u https://target.com/FUZZ -w dict.txt -ic</code> | |||
|- | |||
| [[#ex-input-cmd|<code>--input-cmd</code>]] || Use output from a command as input || <code>ffuf --input-cmd "seq 1 100" --input-num 100 -u https://target.com/id=FUZZ</code> | |||
|- | |||
| [[#ex-input-num|<code>--input-num [NUM]</code>]] || Number of values from input-cmd || <code>ffuf --input-cmd "cat users.txt" --input-num 50 -u https://target.com/FUZZ</code> | |||
|- | |||
| [[#ex-input-shell|<code>--input-shell [SHELL]</code>]] || Shell used to run input-cmd || <code>ffuf --input-shell /bin/zsh --input-cmd "printf '%s\n' {A..Z}" --input-num 26 -u https://target.com/FUZZ</code> | |||
|- | |||
| [[#ex-mode|<code>-mode [TYPE]</code>]] || Multi-wordlist mode: clusterbomb or pitchfork || <code>ffuf -w users.txt:USER -w pass.txt:PASS -mode pitchfork -u https://target.com/login?u=USER&p=PASS</code> | |||
|- | |||
| [[#ex-request|<code>-request [FILE]</code>]] || Use raw HTTP request from file || <code>ffuf -request raw.txt -w dict.txt -u FUZZ</code> | |||
|- | |||
| [[#ex-request-proto|<code>-request-proto [PROTO]</code>]] || Protocol to use with raw request || <code>ffuf -request raw.txt -request-proto http -w dict.txt</code> | |||
|} | |||
== <span id="headers"></span>Headers, Cookies & Methods == | |||
{| class="wikitable" | |||
! Command !! Description !! Usage | |||
|- | |||
| [[#ex-b|<code>-b "COOKIE=VALUE"</code>]] || Send cookies with request || <code>ffuf -u https://target.com/dashboard -b "SESSION=FUZZ" -w tokens.txt</code> | |||
|- | |||
| [[#ex-ignore-body|<code>-ignore-body</code>]] || Skip response body content || <code>ffuf -u https://target.com/FUZZ -w list.txt -ignore-body</code> | |||
|- | |||
| [[#ex-r|<code>-r</code>]] || Follow HTTP redirects || <code>ffuf -u https://target.com/FUZZ -w list.txt -r</code> | |||
|- | |||
| [[#ex-recursion|<code>-recursion</code>]] || Recursively scan directories (FUZZ must be at end) || <code>ffuf -u https://target.com/FUZZ -w dirs.txt -recursion</code> | |||
|- | |||
| [[#ex-recursion-depth|<code>-recursion-depth [N]</code>]] || Max recursion depth for scanning || <code>ffuf -u https://target.com/FUZZ -w dirs.txt -recursion -recursion-depth 2</code> | |||
|- | |||
| [[#ex-recursion-strategy|<code>-recursion-strategy [STR]</code>]] || Recursion strategy: default or greedy || <code>ffuf -u https://target.com/FUZZ -w dirs.txt -recursion-strategy greedy</code> | |||
|- | |||
| [[#ex-replay-proxy|<code>-replay-proxy [URL]</code>]] || Proxy to replay matched requests || <code>ffuf -u https://target.com/FUZZ -w list.txt -replay-proxy http://127.0.0.1:8081</code> | |||
|- | |||
| [[#ex-x|<code>-x [PROXY]</code>]] || Proxy URL to route requests through || <code>ffuf -u https://target.com/FUZZ -w list.txt -x socks5://127.0.0.1:9050</code> | |||
|} | |||
== <span id="filtering"></span>Filtering & Matching == | |||
{| class="wikitable" | |||
! Command !! Description !! Usage | |||
|- | |||
| [[#ex-mr|<code>-mr [REGEX]</code>]] || Match responses with regex in body || <code>ffuf -u https://target.com/FUZZ -w list.txt -mr "^Admin"</code> | |||
|- | |||
| [[#ex-ms|<code>-ms [BYTES]</code>]] || Match responses by size || <code>ffuf -u https://target.com/FUZZ -w list.txt -ms 1024</code> | |||
|- | |||
| [[#ex-mw|<code>-mw [WORDS]</code>]] || Match responses by word count || <code>ffuf -u https://target.com/FUZZ -w list.txt -mw 50</code> | |||
|- | |||
| [[#ex-fl|<code>-fl [LINES]</code>]] || Filter out by number of lines || <code>ffuf -u https://target.com/FUZZ -w list.txt -fl 0</code> | |||
|- | |||
| [[#ex-fr|<code>-fr [REGEX]</code>]] || Filter responses using regex || <code>ffuf -u https://target.com/FUZZ -w list.txt -fr "Not Found"</code> | |||
|} | |||
== <span id="performance"></span>Performance == | |||
{| class="wikitable" | |||
! Command !! Description !! Usage | |||
|- | |||
| [[#ex-rate|<code>-rate [NUM]</code>]] || Max requests per second || <code>ffuf -u https://target.com/FUZZ -w wordlist.txt -rate 200</code> | |||
|- | |||
| [[#ex-maxtime|<code>-maxtime [SEC]</code>]] || Maximum total run time in seconds || <code>ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime 300</code> | |||
|- | |||
| [[#ex-maxtime-job|<code>-maxtime-job [SEC]</code>]] || Maximum time per job || <code>ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime-job 60</code> | |||
|} | |||
== <span id="output"></span>Output & Format == | |||
{| class="wikitable" | |||
! Command !! Description !! Usage | |||
|- | |||
| [[#ex-debug-log|<code>-debug-log [FILE]</code>]] || Write internal log to file || <code>ffuf -u https://target.com/FUZZ -w list.txt -debug-log ffuf.log</code> | |||
|- | |||
| [[#ex-od|<code>-od [DIR]</code>]] || Output directory for matched results || <code>ffuf -u https://target.com/FUZZ -w list.txt -od ./matched</code> | |||
|- | |||
| [[#ex-or-out|<code>-or</code>]] || Don't write output file if no results || <code>ffuf -u https://target.com/FUZZ -w list.txt -o results.json -or</code> | |||
|} | |} | ||
Revision as of 01:03, 27 May 2025
FFUF
FFUF (Fuzz Faster U Fool) is a fast and flexible web fuzzer used for discovering hidden files, directories, subdomains, GET and POST parameters, and more. It is widely used in web application testing, especially during active reconnaissance and content discovery phases.
Common Options
Command | Description | Usage |
---|---|---|
-V |
Show version information | ffuf -V
|
-ac |
Automatically calibrate filtering options | ffuf -u https://target.com/FUZZ -w wordlist.txt -ac
|
-acc "STRING" |
Custom auto-calibration string, implies -ac | ffuf -u https://target.com/FUZZ -w wordlist.txt -acc "Welcome"
|
-c |
Colorize output | ffuf -u https://target.com/FUZZ -w wordlist.txt -c
|
-config [FILE] |
Load configuration from file | ffuf -config ~/.ffufrc
|
-s |
Silent mode (suppress extra info) | ffuf -u https://target.com/FUZZ -w wordlist.txt -s
|
-sa |
Stop on all error cases | ffuf -u https://target.com/FUZZ -w wordlist.txt -sa
|
-se |
Stop on spurious errors | ffuf -u https://target.com/FUZZ -w wordlist.txt -se
|
-sf |
Stop when more than 95% of responses are 403 | ffuf -u https://target.com/FUZZ -w wordlist.txt -sf
|
-v |
Verbose output with full URL and redirects | ffuf -u https://target.com/FUZZ -w wordlist.txt -v
|
Input Options
Command | Description | Usage |
---|---|---|
-D |
DirSearch wordlist compatibility mode, use with -e | ffuf -u https://target.com/FUZZ -w dirs.txt -D -e php,html
|
-e [EXT] |
Comma-separated list of extensions to append | ffuf -u https://target.com/FUZZ -w dirs.txt -e php,txt
|
-ic |
Ignore comment lines in wordlist | ffuf -u https://target.com/FUZZ -w dict.txt -ic
|
--input-cmd |
Use output from a command as input | ffuf --input-cmd "seq 1 100" --input-num 100 -u https://target.com/id=FUZZ
|
--input-num [NUM] |
Number of values from input-cmd | ffuf --input-cmd "cat users.txt" --input-num 50 -u https://target.com/FUZZ
|
--input-shell [SHELL] |
Shell used to run input-cmd | ffuf --input-shell /bin/zsh --input-cmd "printf '%s\n' {A..Z}" --input-num 26 -u https://target.com/FUZZ
|
-mode [TYPE] |
Multi-wordlist mode: clusterbomb or pitchfork | ffuf -w users.txt:USER -w pass.txt:PASS -mode pitchfork -u https://target.com/login?u=USER&p=PASS
|
-request [FILE] |
Use raw HTTP request from file | ffuf -request raw.txt -w dict.txt -u FUZZ
|
-request-proto [PROTO] |
Protocol to use with raw request | ffuf -request raw.txt -request-proto http -w dict.txt
|
Headers, Cookies & Methods
Command | Description | Usage |
---|---|---|
-b "COOKIE=VALUE" |
Send cookies with request | ffuf -u https://target.com/dashboard -b "SESSION=FUZZ" -w tokens.txt
|
-ignore-body |
Skip response body content | ffuf -u https://target.com/FUZZ -w list.txt -ignore-body
|
-r |
Follow HTTP redirects | ffuf -u https://target.com/FUZZ -w list.txt -r
|
-recursion |
Recursively scan directories (FUZZ must be at end) | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion
|
-recursion-depth [N] |
Max recursion depth for scanning | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion -recursion-depth 2
|
-recursion-strategy [STR] |
Recursion strategy: default or greedy | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion-strategy greedy
|
-replay-proxy [URL] |
Proxy to replay matched requests | ffuf -u https://target.com/FUZZ -w list.txt -replay-proxy http://127.0.0.1:8081
|
-x [PROXY] |
Proxy URL to route requests through | ffuf -u https://target.com/FUZZ -w list.txt -x socks5://127.0.0.1:9050
|
Filtering & Matching
Command | Description | Usage |
---|---|---|
-mr [REGEX] |
Match responses with regex in body | ffuf -u https://target.com/FUZZ -w list.txt -mr "^Admin"
|
-ms [BYTES] |
Match responses by size | ffuf -u https://target.com/FUZZ -w list.txt -ms 1024
|
-mw [WORDS] |
Match responses by word count | ffuf -u https://target.com/FUZZ -w list.txt -mw 50
|
-fl [LINES] |
Filter out by number of lines | ffuf -u https://target.com/FUZZ -w list.txt -fl 0
|
-fr [REGEX] |
Filter responses using regex | ffuf -u https://target.com/FUZZ -w list.txt -fr "Not Found"
|
Performance
Command | Description | Usage |
---|---|---|
-rate [NUM] |
Max requests per second | ffuf -u https://target.com/FUZZ -w wordlist.txt -rate 200
|
-maxtime [SEC] |
Maximum total run time in seconds | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime 300
|
-maxtime-job [SEC] |
Maximum time per job | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime-job 60
|
Output & Format
Command | Description | Usage |
---|---|---|
-debug-log [FILE] |
Write internal log to file | ffuf -u https://target.com/FUZZ -w list.txt -debug-log ffuf.log
|
-od [DIR] |
Output directory for matched results | ffuf -u https://target.com/FUZZ -w list.txt -od ./matched
|
-or |
Don't write output file if no results | ffuf -u https://target.com/FUZZ -w list.txt -o results.json -or
|
Input Options
Command | Description | Usage |
---|---|---|
-D |
DirSearch wordlist compatibility mode, use with -e | ffuf -u https://target.com/FUZZ -w dirs.txt -D -e php,html
|
-e [EXT] |
Comma-separated list of extensions to append | ffuf -u https://target.com/FUZZ -w dirs.txt -e php,txt
|
-ic |
Ignore comment lines in wordlist | ffuf -u https://target.com/FUZZ -w dict.txt -ic
|
--input-cmd |
Use output from a command as input | ffuf --input-cmd "seq 1 100" --input-num 100 -u https://target.com/id=FUZZ
|
--input-num [NUM] |
Number of values from input-cmd | ffuf --input-cmd "cat users.txt" --input-num 50 -u https://target.com/FUZZ
|
--input-shell [SHELL] |
Shell used to run input-cmd | ffuf --input-shell /bin/zsh --input-cmd "printf '%s\n' {A..Z}" --input-num 26 -u https://target.com/FUZZ
|
-mode [TYPE] |
Multi-wordlist mode: clusterbomb or pitchfork | ffuf -w users.txt:USER -w pass.txt:PASS -mode pitchfork -u https://target.com/login?u=USER&p=PASS
|
-request [FILE] |
Use raw HTTP request from file | ffuf -request raw.txt -w dict.txt -u FUZZ
|
-request-proto [PROTO] |
Protocol to use with raw request | ffuf -request raw.txt -request-proto http -w dict.txt
|
Headers, Cookies & Methods
Command | Description | Usage |
---|---|---|
-b "COOKIE=VALUE" |
Send cookies with request | ffuf -u https://target.com/dashboard -b "SESSION=FUZZ" -w tokens.txt
|
-ignore-body |
Skip response body content | ffuf -u https://target.com/FUZZ -w list.txt -ignore-body
|
-r |
Follow HTTP redirects | ffuf -u https://target.com/FUZZ -w list.txt -r
|
-recursion |
Recursively scan directories (FUZZ must be at end) | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion
|
-recursion-depth [N] |
Max recursion depth for scanning | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion -recursion-depth 2
|
-recursion-strategy [STR] |
Recursion strategy: default or greedy | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion-strategy greedy
|
-replay-proxy [URL] |
Proxy to replay matched requests | ffuf -u https://target.com/FUZZ -w list.txt -replay-proxy http://127.0.0.1:8081
|
-x [PROXY] |
Proxy URL to route requests through | ffuf -u https://target.com/FUZZ -w list.txt -x socks5://127.0.0.1:9050
|
Filtering & Matching
Command | Description | Usage |
---|---|---|
-mr [REGEX] |
Match responses with regex in body | ffuf -u https://target.com/FUZZ -w list.txt -mr "^Admin"
|
-ms [BYTES] |
Match responses by size | ffuf -u https://target.com/FUZZ -w list.txt -ms 1024
|
-mw [WORDS] |
Match responses by word count | ffuf -u https://target.com/FUZZ -w list.txt -mw 50
|
-fl [LINES] |
Filter out by number of lines | ffuf -u https://target.com/FUZZ -w list.txt -fl 0
|
-fr [REGEX] |
Filter responses using regex | ffuf -u https://target.com/FUZZ -w list.txt -fr "Not Found"
|
Performance
Command | Description | Usage |
---|---|---|
-rate [NUM] |
Max requests per second | ffuf -u https://target.com/FUZZ -w wordlist.txt -rate 200
|
-maxtime [SEC] |
Maximum total run time in seconds | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime 300
|
-maxtime-job [SEC] |
Maximum time per job | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime-job 60
|
Output & Format
Command | Description | Usage |
---|---|---|
-debug-log [FILE] |
Write internal log to file | ffuf -u https://target.com/FUZZ -w list.txt -debug-log ffuf.log
|
-od [DIR] |
Output directory for matched results | ffuf -u https://target.com/FUZZ -w list.txt -od ./matched
|
-or |
Don't write output file if no results | ffuf -u https://target.com/FUZZ -w list.txt -o results.json -or
|
Input Options
Command | Description | Usage |
---|---|---|
-D |
DirSearch wordlist compatibility mode (use with -e ) |
ffuf -u https://target.com/FUZZ -w dirs.txt -D -e php,html
|
-e [EXT] |
Comma-separated list of extensions (extends FUZZ ) |
ffuf -u https://target.com/FUZZ -w dirs.txt -e php,txt
|
-ic |
Ignore wordlist comments | ffuf -u https://target.com/FUZZ -w dict.txt -ic
|
--input-cmd |
Use command output as input (requires --input-num ) |
ffuf --input-cmd "seq 1 100" --input-num 100 -u https://target.com/id=FUZZ
|
--input-num [NUM] |
Number of inputs to test with --input-cmd |
ffuf --input-cmd "cat users.txt" --input-num 50 -u https://target.com/FUZZ
|
--input-shell [SHELL] |
Shell used for --input-cmd |
ffuf --input-shell /bin/zsh --input-cmd "printf '%s\n' {A..Z}" --input-num 26 -u https://target.com/FUZZ
|
-mode [TYPE] |
Multi-wordlist mode: clusterbomb / pitchfork |
ffuf -w users.txt:USER -w pass.txt:PASS -mode pitchfork -u https://target.com/login?u=USER&p=PASS
|
-request [FILE] |
Use raw HTTP request from file | ffuf -request raw.txt -w dict.txt -u FUZZ
|
-request-proto [PROTO] |
Protocol when using raw request (http/https) | ffuf -request raw.txt -request-proto http -w dict.txt
|
Headers, Cookies & Methods
Command | Description | Usage |
---|---|---|
-b "COOKIE=VALUE" |
Add cookie header | ffuf -u https://target.com/dashboard -b "SESSION=FUZZ" -w tokens.txt
|
-ignore-body |
Do not fetch response body | ffuf -u https://target.com/FUZZ -w list.txt -ignore-body
|
-r |
Follow redirects | ffuf -u https://target.com/FUZZ -w list.txt -r
|
-recursion |
Recursive scan (URL must end in FUZZ ) |
ffuf -u https://target.com/FUZZ -w dirs.txt -recursion
|
-recursion-depth [N] |
Maximum recursion depth | ffuf -u https://target.com/FUZZ -w dirs.txt -recursion -recursion-depth 2
|
-recursion-strategy [STR] |
Recursion strategy: default / greedy |
ffuf -u https://target.com/FUZZ -w dirs.txt -recursion-strategy greedy
|
-replay-proxy [URL] |
Replay matched requests through proxy | ffuf -u https://target.com/FUZZ -w list.txt -replay-proxy http://127.0.0.1:8081
|
-x [PROXY] |
Send requests via proxy (HTTP/SOCKS5) | ffuf -u https://target.com/FUZZ -w list.txt -x socks5://127.0.0.1:9050
|
Filtering & Matching
Command | Description | Usage |
---|---|---|
-mr [REGEX] |
Match body using regular expression | ffuf -u https://target.com/FUZZ -w list.txt -mr "^Admin"
|
-ms [BYTES] |
Match exact response size | ffuf -u https://target.com/FUZZ -w list.txt -ms 1024
|
-mw [WORDS] |
Match by word count | ffuf -u https://target.com/FUZZ -w list.txt -mw 50
|
-fl [LINES] |
Filter by line count | ffuf -u https://target.com/FUZZ -w list.txt -fl 0
|
-fr [REGEX] |
Filter responses matching regex | ffuf -u https://target.com/FUZZ -w list.txt -fr "Not Found"
|
Performance
Command | Description | Usage |
---|---|---|
-rate [NUM] |
Limit requests per second | ffuf -u https://target.com/FUZZ -w wordlist.txt -rate 200
|
-maxtime [SEC] |
Max total runtime | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime 300
|
-maxtime-job [SEC] |
Max runtime per job | ffuf -u https://target.com/FUZZ -w wordlist.txt -maxtime-job 60
|
Output & Format
Command | Description | Usage |
---|---|---|
-debug-log [FILE] |
Write debug log to file | ffuf -u https://target.com/FUZZ -w list.txt -debug-log ffuf.log
|
-od [DIR] |
Directory to store matched results | ffuf -u https://target.com/FUZZ -w list.txt -od ./matched
|
-or |
Skip creating output file when no results | ffuf -u https://target.com/FUZZ -w list.txt -o results.json -or
|
Examples
Target URL
ffuf -u https://target.com/FUZZ -w /usr/share/wordlists/dirb/common.txt
# Output:
# /admin [Status: 301, Size: 0, Words: 1, Lines: 1]
# /login [Status: 200, Size: 1024, Words: 132, Lines: 15]
Wordlist Option
ffuf -u https://target.com/FUZZ -w wordlist.txt
# Output:
# /secret [Status: 403, Size: 512, Words: 22, Lines: 4]
Input from Command
ffuf -u https://target.com/FUZZ --input-cmd "seq 1 100"
# Output:
# /12 [Status: 200, Size: 900, Words: 100, Lines: 10]
Fuzz Numeric Range
ffuf -u https://target.com/user?id=FUZZ --input-num 1-100
# Output:
# user?id=42 [Status: 200, Size: 1500, Words: 150, Lines: 20]
Filter by Status Code
ffuf -u https://target.com/FUZZ -w wordlist.txt -fc 404
# Output:
# All 404 responses are hidden
Match Specific Status Code
ffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200
# Output:
# /dashboard [Status: 200, Size: 2048, Words: 250, Lines: 25]
Filter by Word Count
ffuf -u https://target.com/FUZZ -w wordlist.txt -fw 0
# Output:
# Only responses with more than 0 words are shown
Match by Line Count
ffuf -u https://target.com/FUZZ -w wordlist.txt -ml 10
# Output:
# /help [Status: 200, Size: 850, Words: 90, Lines: 10]
Filter by Size
ffuf -u https://target.com/FUZZ -w wordlist.txt -fs 1234
# Output:
# /about [Status: 200, Size: 1234, Words: 140, Lines: 12]
Filter by Regex
ffuf -u https://target.com/FUZZ -w wordlist.txt --filter-regex "Not Found"
# Output:
# Only responses that do not contain "Not Found" in the body are shown
Output to File
ffuf -u https://target.com/FUZZ -w wordlist.txt -o results.txt
# Output:
# Results saved to results.txt
Specify Output Format
ffuf -u https://target.com/FUZZ -w wordlist.txt -o results.json -of json
# Output:
# Results saved in JSON format to results.json
Show Redirect Location
ffuf -u https://target.com/FUZZ -w wordlist.txt -or
# Output:
# /old-page [Status: 301, Redirect: /new-page]
Custom Header Fuzzing
ffuf -u http://127.0.0.1/ -H "Host: FUZZ.target.com" -w subdomains.txt
# Output:
# Host: admin.target.com [Status: 200, Size: 5120, Words: 500, Lines: 30]
Use POST Method
ffuf -X POST -d "username=admin&password=FUZZ" -u https://target.com/login -w rockyou.txt
# Output:
# Password guess "letmein" returns Status: 302 (Login success redirect)
POST Data with FUZZ
ffuf -X POST -d "q=FUZZ" -u https://target.com/search -w payloads.txt
# Output:
# Payload "admin" produces search results page (Status: 200)
Threads for Speed
ffuf -u https://target.com/FUZZ -w wordlist.txt -t 100
# Output:
# Much faster scan due to increased concurrency
Delay Between Requests
ffuf -u https://target.com/FUZZ -w wordlist.txt -p 0.5
# Output:
# Slower scan with 0.5s delay between requests (useful to avoid rate limits)
Set Request Timeout
ffuf -u https://target.com/FUZZ -w wordlist.txt --timeout 5
# Output:
# Requests that take more than 5 seconds will be skipped