ssrfuzz
SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities
Details
Category: Vulnerabilities
Publisher: trickest-mhmdiaa
Created Date: 2/5/2022
Container: quay.io/trickest/ssrfuzz:34f0e89
Source URL: https://github.com/ryandamour/ssrfuzz
Parameters
Command:
--delay
- The time each threads waits between requests in milliseconds (default 100)Command:
--cookie
- Cookie to use for requestsCommand:
--threads
- Number of threads to run ssrfuzz on (default 50)Command:
--timeout
- The amount of time needed to close a connection that could be hung (default 10)Command:
--verbose
- Verbose outputCommand:
--crlf-path
- Add CRLF payloads to all available paths (ie: site.com/%0Atest.php)Command:
--skip-crlf
- Skip CRLF fuzzingCommand:
--http-method
- HTTP Method - GET or POST (default GET)Command:
--skip-scheme
- Skip scheme fuzzingCommand:
--skip-network
- Skip network fuzzingCommand:
--slack-webhook
- Slack webhook to send findings to a channelCommand:
--domains
- Location of domains with PARAMETERS to scanCommand:
--user-agent
- User agent for requests (default Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36)