angryFuzzer - Tools for information gathering and discover vulnerabilities
Tools for information gathering
Video Tutorial :
Video Tutorial :
Features
- Fuzz url set from an input file
- Concurrent relative path search
- Configurable number of fuzzing workers
- Fuzz CMS ==> Wordpress,Durpal,Joomla
- Generate reports of the valid paths
Usage
$ python angryFuzzer.py -h
Usage: angryFuzzer.py [options]
Options:
-h, --help show this help message and exit
-q, --quiet Silent mode ,only reports
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST
Custom wordlist
Example:
- Fuzzing an url with default dictionary
python angryFuzzer.py -u http://127.0.0.1
- Fuzzing CMS (wp: in this exemple !)
python angryFuzzer.py -u http://127.0.0.1 --cms wp
- Fuzzing a custom Wordlist
python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt
How to install
Clone
- Clone the repository with:
$ git clone https://github.com/ihebski/angryFuzzer.git
$ cd angryFuzzer
$ python angryFuzzer.py
Dependencies
- Install the required dependencies with:
$ sudo pip install -r requirements.txt
Comments
Post a Comment