AngryFuzz3r is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb
FEATURES:
• Fuzz url set from an input file
• Concurrent relative path search
• Configurable number of fuzzing workers
• Fuzz CMS ==> Wordpress, Durpal, Joomla
• Generate reports of the valid paths
Installation:
apt update && apt upgrade
$ apt install git
$ apt install python2
$ git clone https://github.com/ihebski/angryFuzzer.git
$ cd angryFuzzer
$ sudo pip install -r requirements.txt
$ pip2 install requests
$ chmod +x *
$ python angryFuzzer.py
How to use
$ python angryFuzzer.py -h
usage: angryFuzzer.py [options]
options:
-h, --help show this help message and exit
-q, --quiet Silent mode ,only reports
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST Custom wordlist
Example:
• Fuzzing an url with default dictionary
python angryFuzzer.py -u http://127.0.0.1
• Fuzzing CMS (wp: in this example !)
python angryFuzzer.py -u http://127.0.0.1 --cms wp
• Fuzzing a custom Wordlist
python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt
Note : any content given in our blog is only for educational purpose our blog does not permote any illegal activity so do it on your own risk.
No comments: