Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/d4rckh/vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
https://github.com/d4rckh/vaf
bruteforce bug-bounty bugbounty burpsuite fuzzer fuzzing hacking hacking-tools nim penetration-testing pentest-tool recon security-tools vaf web xss
Last synced: about 1 month ago
JSON representation
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
- Host: GitHub
- URL: https://github.com/d4rckh/vaf
- Owner: d4rckh
- License: gpl-3.0
- Created: 2021-04-27T12:46:52.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-05-29T16:39:47.000Z (over 2 years ago)
- Last Synced: 2024-08-01T10:16:37.824Z (4 months ago)
- Topics: bruteforce, bug-bounty, bugbounty, burpsuite, fuzzer, fuzzing, hacking, hacking-tools, nim, penetration-testing, pentest-tool, recon, security-tools, vaf, web, xss
- Language: Nim
- Homepage:
- Size: 2.39 MB
- Stars: 311
- Watchers: 9
- Forks: 41
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
- awesome-bugbounty-tools - vaf - very advanced (web) fuzzer written in Nim. (Recon / Fuzzing)
- awesome-hacking-lists - d4rckh/vaf - Vaf is a cross-platform very advanced and fast web fuzzer written in nim (Nim)
README
vaf is a cross-platform web fuzzer with a lot of features. Some of its features include:
- Fast threading
- HTTP header fuzzing
- Proxying
- [your own feature!](https://github.com/d4rckh/vaf/issues/new?assignees=&labels=enhancement&template=feature_request.md&title=%5Bfeature%5D)
- And more...## Installing
You can install vaf using this one-liner:
```
curl https://raw.githubusercontent.com/d4rckh/vaf/main/install.sh | sudo bash
```## Options
```
Options:
-h, --help
-u, --url=URL Target URL. Replace fuzz area with FUZZ
-w, --wordlist=WORDLIST The path to the wordlist.
-m, --method=METHOD Request method. Supported: POST, GET (default: GET)
-H, --header=HEADER Specify HTTP headers; can be used multiple times. Example: -H 'header1: val1' -H 'header1: val1'
-pf, --prefix=PREFIX The prefixes to append to the word (default: )
-sf, --suffix=SUFFIX The suffixes to append to the word (default: )
-t, --threads=THREADS Number of threads (default: 5)
-sc, --status=STATUS The status to filter; to 'any' to print on any status (default: 200)
-g, --grep=GREP Only log if the response body contains the string (default: )
-ng, --notgrep=NOTGREP Only log if the response body does no contain a string (default: )
-pd, --postdata=POSTDATA Specify POST data; used only if '-m post' is set (default: {})
-x, --proxy=PROXY Specify a proxy (default: )
-ca, --cafile=CAFILE Specify a CA root certificate; useful if you are using Burp/ZAP proxy (default: )
-o, --output=OUTPUT Output the results in a file (default: )
-mr, --maxredirects=MAXREDIRECTS
How many redirects should vaf follow; 0 means none (default: 0)
-v, --version Print version information
-pif, --printifreflexive Print only if the fuzzed word is reflected in the page
-i, --ignoressl Do not verify SSL certificates; useful if you are using Burp/ZAP proxy
-ue, --urlencode URL encode the fuzzed words
-pu, --printurl Print the requested URL
-ph, --printheaders Print response headers
-dbg, --debug Prints debug information
```## Examples
### Fuzz URL path, show only responses which returned 200 OK
```
vaf -u https://example.org/FUZZ -w path/to/wordlist.txt -sc OK
```### Fuzz 'User-Agent' header, show only responses which returned 200 OK
```
vaf -u https://example.org/ -w path/to/wordlist.txt -sc OK -H "User-Agent: FUZZ"
```### Fuzz POST data, show only responses which returned 200 OK
```
vaf -u https://example.org/ -w path/to/wordlist.txt -sc OK -m POST -H "Content-Type: application/json" -pd '{"username": "FUZZ"}'
```# Contributors
Thanks to everyone who contributed to this project!
- [@daanbreur](https://github.com/daanbreur)