AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectively bypassing WAFs.
If you think you can hide your Admin Panel, think again… Find it with AdminPBuster.
AdminPBuster is written by Chris “SaintDruG” Abou-Chabke from Black Hat Ethical Hacking and is designed specifically for Red Teams, Offensive Security Experts, and Bug Bounty Hunters looking to discover hidden or obscured admin panels efficiently.
AdminPBuster is a Red Teaming Recon tool to find hidden admin panels on web applications using brute-forcing.
Instead of bundling a static wordlist and bloating the tool, it fetches an updated admin panel wordlist directly from our GitHub repository.
Key technical goodies:
www.
handling to fix SSL issues-L
curl flag) bypasses WAFs and Cloudflare protections and log only the valid 200 Responses-ua
) to simulate real trafficAdminPBuster focuses on speed, reliability, and accuracy while staying very simple to operate going through 10,000+ wordlists.
Fetch Updated Wordlist
Downloads the latest magic_admin_paths.txt
from GitHub automatically.
Prepare Target Domain
Adds www.
if missing, forces HTTPS, solving common SSL and cert mismatch problems.
Build and Launch Curl Requests
Constructs lightweight curl calls to quickly test admin paths with correct flags.
Multithreaded Scanning
Scans many paths at once using multiple threads to improve speed.
Color-Coded Result Parsing
Displays results with colors based on HTTP response codes for easy reading:
Log Successful Admin Panels
Admin panels found (200 OK) are automatically saved inside a folder under results/{target_domain}/found_panels.txt
.
-ua
This tool has been tested on Kali Linux
Clone the repository:
git clone https://github.com/blackhatethicalhacking/AdminPBuster.git
cd AdminPanelFetcher
Make the installer executable:
chmod +x installer.sh
Run the installer:
./installer.sh
curl
toilet
lolcat
requests
termcolor
urllib3
AdminPBuster.py
executable automaticallyAfter installation, simply run:
./AdminPBuster.py -t example.com -th 10
Optionally with randomized User-Agent:
./AdminPBuster.py -t example.com -th 10 -ua
This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool.
We use it to test under NDA agreements with clients and their consents for pentesting purposes and we never encourage to misuse or take responsibility for any damage caused !
Introducing our Merch Store, designed for the Offensive Security community. Explore a curated collection of apparel and drinkware, perfect for both professionals and enthusiasts. Our selection includes premium t-shirts, hoodies, and mugs, each featuring bold hacking-themed slogans and graphics that embody the spirit of red teaming and offensive security. Hack with style and showcase your dedication to hacker culture with gear that’s as dynamic and resilient as you are. 😊