Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rewanthtammana/vuln-headers-extension
Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnerabilities.
https://github.com/rewanthtammana/vuln-headers-extension
extensions firefox firefox-extension firefox-webextension scanner
Last synced: 22 days ago
JSON representation
Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnerabilities.
- Host: GitHub
- URL: https://github.com/rewanthtammana/vuln-headers-extension
- Owner: rewanthtammana
- License: mit
- Created: 2017-12-09T10:02:03.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2018-10-28T07:17:51.000Z (about 6 years ago)
- Last Synced: 2024-10-29T16:58:11.406Z (about 1 month ago)
- Topics: extensions, firefox, firefox-extension, firefox-webextension, scanner
- Language: JavaScript
- Homepage: https://medium.com/@rewanthcool/firefox-vuln-headers-extension-e848b6d80d14
- Size: 255 KB
- Stars: 60
- Watchers: 7
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - rewanthtammana/vuln-headers-extension - Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnerabilities. (JavaScript)
README
# vuln-headers-extension
___
This is firefox extension which parses the requests before forwarding to the DNS server to scan for vulnerable URLs which occur due to [Headers](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers).## Highlights
___
The extension currently detects URLs which are vulnerable to
* CORS Misconfiguration
* Host Header Injection
* Missing X-XSS-Protection headers (commented in the code due to its low severity)
* Clickjacking support## Achievements
___
Submitted vulnerabilities to websites like #signup.com , #Chargify, #Hotstar, #Medium, etc using this tool.
Got listed in #Chargify HOF and other organisaitons are resolving the issues.### Screenshots
![https://raw.githubusercontent.com/rewanth1997/vuln-headers-extension/master/GUI.PNG](https://raw.githubusercontent.com/rewanth1997/vuln-headers-extension/master/GUI.PNG)### Installation
___
##### Method 1 -
1. Clone the repo or fork it.
2. Open Firefox and load `about:debugging` in the URL bar.
3. Click the Load Temporary Add-on button and select the `manifest.json` file in your cloned repo.
4. Now the vuln-headers-extension is installed.##### Method 2 -
1. Clone the repo or fork it.
2. Install the [web-ext](https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Getting_started_with_web-ext) tool, a npm package.
3. Change into the directory where you cloned the repo.
4. Type `web-ext run`. This will launch Firefox and install the extension.### Using -
1. Once you install the extension you can see an icon in the tool bar.
2. Click on the icon and a new tab gets opened.
3. Leave it open and do your browsing/work.
4. The extension automatically logs all the vulnerable URLs to the new tab.
5. Now you can submit a report to the respective organisaiton and make it more secure.### Contributing
Want to add more features to it? **Fork the repo** and create a [Pull Request](https://help.github.com/articles/creating-a-pull-request/).
Like this tool, **STAR** it and click on **Watch** to get more updates on this tool.#### Article
https://medium.com/@rewanthcool/firefox-vuln-headers-extension-e848b6d80d14