doona Usage Example

Use the HTTP plugin (-m HTTP) to fuzz the target (-t, stopping after 5 cases (-M 5):

root@kali:~# doona -m HTTP -t -M 5

 Doona 1.0 by Wireghoul (

 + Buffer overflow testing
    1/37   [XAXAX] ......
Max requests (5) completed, index: 5

Packages and Binaries:


Doona is a fork of the Bruteforce Exploit Detector Tool (BED). BED is a program which is designed to check daemons for potential buffer overflows, format string bugs etc.

Installed size: 130 KB
How to install: sudo apt install doona

  • perl

Network fuzzer forked from bed

root@kali:~# doona -h

 Doona 1.0 by Wireghoul (


 ./ -m [module] <options>

 -c <int>      = Execute a health check after every <int> fuzz cases
 -t <target>   = Host to check (default: localhost)
 -p <port>     = Port to connect to (default: module specific standard port)
 -o <timeout>  = seconds to wait after each test (default: 2 seconds)
 -r <index>    = Resumes fuzzing at test case index
 -k            = Keep trying until server passes a health check
 -d            = Dump test case to stdout (use in combination with -r)
 -M <num>      = Exit after executing <num> number of fuzz cases
 -h            = Help (this text)
 use "./ -m [module] -h" for module specific option.

 Only -m is a mandatory switch.

Updated on: 2021-Nov-26