Fuzz Web Applications for Vulnerabilities
Scan for vulnerabilities in web applications actively by crawling the app and fuzzing inputs
Category
Vulnerability Scanning
Inputs
urls
file
requiredList of URLs
header
string
Header(s) to include in HTTP requests
in-scope
file
List of URLs, paths, or regular expressions to include in scanning
rate-limit
string
Maximum number of requests to send per second per machine
header-file
file
Header(s) to include in HTTP requests
out-of-scope
file
List of URLs, paths, or regular expressions to exclude from scanning
Outputs
findings
Fuzz Web Applications for Vulnerabilities
Description
Scan for vulnerabilities in web applications actively by crawling the app, fuzzing inputs, and reporting insecure behaviors and potential security flaws.
Features
- Scans for a wide range of vulnerabilities by actively injecting payloads and analyzing responses.
- Crawls the web application before and after payload injection to discover endpoints and detect stored vulnerabilities.
- Automatically switches to headless browser crawling when necessary.
- Can scan thousands of web applications simultaneously.
Inputs
Required
- urls: List of URLs
Optional
- exclude-urls: List of URLs, paths, or regular expressions to exclude from scanning
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Improved the finding
description
field to include more relevant information. - Resolved an issue where a scan rule for detecting proxy misconfigurations was generating false positives.
- Improved the finding
- v1.2.0
- Added
header-file
input
- Added