ssrfuzz
SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities
Name:ssrfuzz
Category:Vulnerabilities
Publisher:trickest-mhmdiaa
Created:2/5/2022
Container:
quay.io/trickest/ssrfuzz:34f0e89
Output Type:
License:Unknown
Source:View Source
Parameters
--delay
The time each threads waits between requests in milliseconds (default 100)--cookie
Cookie to use for requests--threads
Number of threads to run ssrfuzz on (default 50)--timeout
The amount of time needed to close a connection that could be hung (default 10)--verbose
Verbose output--crlf-path
Add CRLF payloads to all available paths (ie: site.com/%0Atest.php)--skip-crlf
Skip CRLF fuzzing--http-method
HTTP Method - GET or POST (default GET)--skip-scheme
Skip scheme fuzzing--skip-network
Skip network fuzzing--slack-webhook
Slack webhook to send findings to a channel--domains
Location of domains with PARAMETERS to scan--user-agent
User agent for requests (default Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36)