Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/MindPatch/lorsrf
Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load :artificial_satellite: :crab:
https://github.com/MindPatch/lorsrf
blindssrf bruteforce bugbounty fuzzing hacking penetration-testing pentesting rust ssrf websecurity
Last synced: about 1 month ago
JSON representation
Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load :artificial_satellite: :crab:
- Host: GitHub
- URL: https://github.com/MindPatch/lorsrf
- Owner: knassar702
- License: gpl-3.0
- Created: 2020-06-16T14:01:35.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-04-05T22:31:18.000Z (over 1 year ago)
- Last Synced: 2024-04-11T10:34:12.563Z (8 months ago)
- Topics: blindssrf, bruteforce, bugbounty, fuzzing, hacking, penetration-testing, pentesting, rust, ssrf, websecurity
- Language: Rust
- Homepage:
- Size: 213 KB
- Stars: 283
- Watchers: 5
- Forks: 46
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-offensive-rust - Lorsrf - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load. (Projects)
- awesome-bugbounty-tools - lorsrf - Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods (Exploitation / Server Side Request Forgery)
- awesome-hacking-lists - knassar702/lorsrf - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load :artificial_satellite: :crab: (Rust)
README
# LORSRF - 2.1
![screenshot](.github/workflows/screen.png)***
Lorsrf is a powerful web penetration testing tool designed to identify parameters that can be exploited for SSRF or Out-of-band resource load attacks. By adding an OAST host like Burp Collaborator to the parameter value, Lorsrf can generate an HTTP request that is received in Burp Collaborator, without any actual information about the target.To address this issue, Lorsrf includes a feature that allows you to add specific pieces of target information as variables in your OAST host. This allows you to more easily identify vulnerable parameters and endpoints, ultimately making it easier to secure your web applications.
In addition to the above, Lorsrf also allows you to include additional information in your OAST host using special variables. For example, you can include the endpoint of your target domain, the query of the URL, the current request method, and more.
Overall, Lorsrf is a powerful tool that can be customized to meet your specific web pen-testing needs. Whether you're looking to identify and fix vulnerabilities in your own web applications or assess the security of third-party web apps, Lorsrf is a valuable addition to any pen-testing toolkit.
| Variable | Description |
| ----------- | ----------- |
| %PARAM% | the guessed parameter |
| %PATH% | the endpoint of your target domain |
| %HOST% | the scanning host
| %QUERY% | the query of the url |
| %METHOD% | Current METHOD |you can use these for include more informations in your OAST host
```
target: http://testphp.vulnweb.com/showimage.php
payload: http://%HOST%.%PARAM%.testing.interactsh.com%PATH%
output: http://testphp.vulnweb.com.file.testing.interactsh.com/showimage.php
```by default lorsrf use GET method if you want post method with form body or json you can add these falgs
```bash
$ lorsrf --json --form
```if you want post only add `--post-only` flag
### Install
1. install the last version of rust from https://www.rust-lang.org/tools/install
2. run these commmands
```bash
>>> apt install gcc pkg-config libssl-dev
>>> cargo install --git https://github.com/knassar702/lorsrf
```
or download it from the release page#### Examples
```
$ lorsrf --urls targets.txt -c "http://myhost.com" --wordlist params.txt
```* json
```
$ lorsrf --urls targets.txt -c "http://myhost.com" --wordlist params.txt --json
```* form
```
$ lorsrf --urls targets.txt -c "http://myhost.com" --wordlist params.txt --form
```parameter scanner without geussing
```bash
$ waybackurls http://testphp.vulnweb.com > urls.txt
$ lorsrf --urls urls.txt -c "http://myhost.com" --wordlist params.txt
```* Video: [demo](https://twitter.com/knassar702/status/1472566701027901450)
more options
```bash
Lorsrf 2.0
Khaled Nassar
SSRF Parameter BruteForce ToolUSAGE:
lorsrf [FLAGS] [OPTIONS] --call --urlsFLAGS:
-f, --form Use x-www-form-urlencoded requests via POST method
-h, --help Prints help information
-j, --json Use JSON requests via POST method
--post-only POST method only
-V, --version Prints version informationOPTIONS:
-H, --headers Your Headers [default: ]
-c, --call Your The OAST Host (burpsuite collaborator or interactsh.com)
-p, --proxy SendProxy [default: ]
-u, --urls Your Targets list
--threads Your Threads [default: 10]
-t, --timeout Set the Timeout of the requests [default: 10]
-w, --wordlist Your Parameters Wordlist
```### TODO-LIST
* https://github.com/knassar702/lorsrf/projects/1