{"id":25823287,"url":"https://github.com/adriank31/http-fuzzer","last_synced_at":"2025-11-23T02:04:20.186Z","repository":{"id":251576213,"uuid":"837808290","full_name":"adriank31/HTTP-fuzzer","owner":"adriank31","description":"Script uses the requests library to send different types of HTTP requests and headers to a specified target URL","archived":false,"fork":false,"pushed_at":"2024-11-20T22:23:40.000Z","size":15,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-02-28T17:46:51.160Z","etag":null,"topics":["http","http-fuzzer","url","web","web-exploits"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/adriank31.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-08-04T05:13:39.000Z","updated_at":"2025-02-16T23:45:13.000Z","dependencies_parsed_at":null,"dependency_job_id":"b068f8d5-eb0e-48d0-b9f7-cc6d5b080624","html_url":"https://github.com/adriank31/HTTP-fuzzer","commit_stats":null,"previous_names":["adriank31/http-fuzzer"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/adriank31/HTTP-fuzzer","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/adriank31%2FHTTP-fuzzer","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/adriank31%2FHTTP-fuzzer/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/adriank31%2FHTTP-fuzzer/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/adriank31%2FHTTP-fuzzer/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/adriank31","download_url":"https://codeload.github.com/adriank31/HTTP-fuzzer/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/adriank31%2FHTTP-fuzzer/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":285889732,"owners_count":27248885,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-11-23T02:00:06.149Z","response_time":135,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["http","http-fuzzer","url","web","web-exploits"],"created_at":"2025-02-28T11:50:54.239Z","updated_at":"2025-11-23T02:04:20.172Z","avatar_url":"https://github.com/adriank31.png","language":"Python","readme":"\u003cdiv id = \"badges\"\u003e\n  \u003ca href = \"https://www.linkedin.com/in/adrian-korwel-83226a300/\"\u003e\n    \u003cimg src = \"https://img.shields.io/badge/LinkedIn-blue?style=for-the-badge\u0026logo=linkedin\u0026logoColor=white\" alt=\"LinkedIn Badge\"/\u003e\n  \u003c/a\u003e\n\n# What is an HTTP-Fuzzer\n\nAn HTTP-Fuzzer is a cybersecurity tool used for testing the robustness of web applications by sending a variety of crafted HTTP requests to identify vulnerabilities. This tool simulates malicious user behavior, such as SQL injection, to discover flaws in input validation, authentication, and other application layers. By automating the process of injecting payloads and testing responses, it enhances the security assessment process, helping security professionals pinpoint weaknesses and improve the resilience of web applications against attacks.\n\n\n# Key Features\n\n- Matrix-style aesthetic with dynamic green console output.\n- Multi-threaded design for efficient and fast scanning of multiple URLs.\n- Support for custom SQL injection payloads from an external file.\n- Support for custom HTTP headers to tailor requests.\n- Detects multiple SQL injection types, including time-based, Boolean-based, and error-based.\n- Seamless integration with pipeline input for scanning large URL lists.\n- Real-time detection logs with detailed information on vulnerabilities.\n\n\n# Installation Using Git\nTo install and set up the HTTP-Fuzzer:\n- Clone the repository:\n  ![image](https://github.com/user-attachments/assets/e6cd26e9-561b-4645-b8d0-9796a72e68ba)\n\n  \n- Install the Dependencies:\n  ![image](https://github.com/user-attachments/assets/cb7496e6-6f14-49f7-bd98-26c20808d98a)\n\n  \n- Make the Script Executable:\n  ![image](https://github.com/user-attachments/assets/14bae775-d4b2-4296-8b47-29ff1ee11e3e)\n\n\n\n# Usage\nThis will display help for the tool. Here are all the options it supports.\n![image](https://github.com/user-attachments/assets/68e32234-0c03-499f-a387-a89ee5cf3d68)\n\n\n\n# Running SQLMAST\n - Single URL Scan:\n   ![image](https://github.com/user-attachments/assets/55685daf-1b07-499c-9955-0364e954427e)\n\n - Pipeline Input for Multiple URLs:\n   ![image](https://github.com/user-attachments/assets/a6f1ecf9-c37a-479a-9ca9-1afa4a34a852)\n\n - Custom Payload File:\n   ![image](https://github.com/user-attachments/assets/786c0556-cd9d-4aeb-96db-2cf58b670dba)\n\n - Custom Headers File:\n   ![image](https://github.com/user-attachments/assets/a4a76939-a683-4c2b-9df3-be54cd9eb73c)\n\n - Adjust Thread Count:\n   ![image](https://github.com/user-attachments/assets/acad5b31-a0f9-4d58-9a8b-f77e0cbf5aa1)\n\n\n# Legal Disclaimer \nUsage of this tool for attacking targets without prior mutual consent is strictly prohibited. It is the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.\n\n\n\n\n\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fadriank31%2Fhttp-fuzzer","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fadriank31%2Fhttp-fuzzer","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fadriank31%2Fhttp-fuzzer/lists"}