Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

A fast tool to scan CRLF vulnerability written in Go

License

NotificationsYou must be signed in to change notification settings

gprime31/crlfuzz

 
 

Repository files navigation

made-with-Gogo-reportlicensecontributions welcomegodoc

A fast tool to scan CRLF vulnerability written in Go


Resources

Installation

from Binary

The installation is easy. You can download a prebuilt binary fromreleases page, unpack and run! or with

▶ curl -sSfL https://git.io/crlfuzz| sh -s -- -b /usr/local/bin

from Source

If you have go1.13+ compiler installed and configured:

▶ GO111MODULE=on go install github.com/dwisiswant0/crlfuzz/cmd/crlfuzz@latest

In order to update the tool, you can use-u flag with go get command.

from GitHub

▶ git clone https://github.com/dwisiswant0/crlfuzz▶cd crlfuzz/cmd/crlfuzz▶ go build.▶ mv crlfuzz /usr/local/bin

Usage

Basic Usage

Simply, CRLFuzz can be run with:

▶ crlfuzz -u"http://target"

Flags

▶ crlfuzz -h

This will display help for the tool. Here are all the switches it supports.

FlagDescription
-u, --urlDefine single URL to fuzz
-l, --listFuzz URLs within file
-X, --methodSpecify request method to use(default: GET)
-o, --outputFile to save results
-d, --dataDefine request data
-H, --headerPass custom header to target
-x, --proxyUse specified proxy to fuzz
-c, --concurrentSet the concurrency level(default: 25)
-s, --silentSilent mode
-v, --verboseVerbose mode
-V, --versionShow current CRLFuzz version
-h, --helpDisplay its help

Target

You can define a target in 3 ways:

Single URL

▶ crlfuzz -u"http://target"

URLs from list

▶ crlfuzz -l /path/to/urls.txt

from Stdin

In case you want to chained with other tools.

▶ subfinder -d target -silent| httpx -silent| crlfuzz

Method

By default, CRLFuzz makes requests withGET method.If you want to change it, you can use the-X flag.

▶ crlfuzz -u"http://target" -X"GET"

Output

You can also save fuzzing results to a file with-o flag.

▶ crlfuzz -l /path/to/urls.txt -o /path/to/results.txt

Data

If you want to send a data request using POST, DELETE. PATCH or other methods, you just need to use-d flag.

▶ crlfuzz -u"http://target" -X"POST" -d"data=body"

Adding Headers

May you want to use custom headers to add cookies or other header parts.

▶ crlfuzz -u"http://target" -H"Cookie: ..." -H"User-Agent: ..."

Using Proxy

Using a proxy, proxy string can be specified with aprotocol:// prefix to specify alternative proxy protocols.

▶ crlfuzz -u"http://target" -x http://127.0.0.1:8080

Concurrency

Concurrency is the number of fuzzing at the same time. Default value CRLFuzz provide is25, you can change it by using-c flag.

▶ crlfuzz -l /path/to/urls.txt -c 50

Silent

If you activate this silent mode with the-s flag, you will only see vulnerable targets.

▶ crlfuzz -l /path/to/urls.txt -s| tee vuln-urls.txt

Verbose

Unlike silent mode, it will display error details if there is an error with the-v flag.

▶ crlfuzz -l /path/to/urls.txt -v

Version

To display the current version of CRLFuzz with the-V flag.

▶ crlfuzz -V

Library

You can use CRLFuzz as a library.

package mainimport ("fmt""github.com/dwisiswant0/crlfuzz/pkg/crlfuzz")funcmain() {target:="http://target"method:="GET"// Generates a potentially CRLF vulnerable URLsfor_,url:=rangecrlfuzz.GenerateURL(target) {// Scan against targetvuln,err:=crlfuzz.Scan(url,method,"", []string{},"")iferr!=nil {panic(err)}ifvuln {fmt.Printf("VULN! %s\n",url)}}}

Help & Bugs

If you are still confused or found a bug, pleaseopen the issue. All bug reports are appreciated, some features have not been tested yet due to lack of free time.

License

CRLFuzz released under MIT. SeeLICENSE for more details.

Version

Current version is 1.4.0 and still development.

About

A fast tool to scan CRLF vulnerability written in Go

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go100.0%

[8]ページ先頭

©2009-2025 Movatter.jp