https://github.com/adriank31/http-fuzzer
Script uses the requests library to send different types of HTTP requests and headers to a specified target URL
https://github.com/adriank31/http-fuzzer
http http-fuzzer url web web-exploits
Last synced: 4 months ago
JSON representation
Script uses the requests library to send different types of HTTP requests and headers to a specified target URL
- Host: GitHub
- URL: https://github.com/adriank31/http-fuzzer
- Owner: adriank31
- Created: 2024-08-04T05:13:39.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-20T22:23:40.000Z (over 1 year ago)
- Last Synced: 2025-02-28T17:46:51.160Z (about 1 year ago)
- Topics: http, http-fuzzer, url, web, web-exploits
- Language: Python
- Homepage:
- Size: 14.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# What is an HTTP-Fuzzer
An HTTP-Fuzzer is a cybersecurity tool used for testing the robustness of web applications by sending a variety of crafted HTTP requests to identify vulnerabilities. This tool simulates malicious user behavior, such as SQL injection, to discover flaws in input validation, authentication, and other application layers. By automating the process of injecting payloads and testing responses, it enhances the security assessment process, helping security professionals pinpoint weaknesses and improve the resilience of web applications against attacks.
# Key Features
- Matrix-style aesthetic with dynamic green console output.
- Multi-threaded design for efficient and fast scanning of multiple URLs.
- Support for custom SQL injection payloads from an external file.
- Support for custom HTTP headers to tailor requests.
- Detects multiple SQL injection types, including time-based, Boolean-based, and error-based.
- Seamless integration with pipeline input for scanning large URL lists.
- Real-time detection logs with detailed information on vulnerabilities.
# Installation Using Git
To install and set up the HTTP-Fuzzer:
- Clone the repository:

- Install the Dependencies:

- Make the Script Executable:

# Usage
This will display help for the tool. Here are all the options it supports.

# Running SQLMAST
- Single URL Scan:

- Pipeline Input for Multiple URLs:

- Custom Payload File:

- Custom Headers File:

- Adjust Thread Count:

# Legal Disclaimer
Usage of this tool for attacking targets without prior mutual consent is strictly prohibited. It is the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.