AngryFuzz3r is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb
FEATURES:
• Fuzz url set from an input file
• Concurrent relative path search
• Configurable number of fuzzing workers
• Fuzz CMS ==> Wordpress, Durpal, Joomla
• Generate reports of the valid paths
Installation:
apt update && apt upgrade
$ apt install git
$ apt install python2
$ git clone https://github.com/ihebski/angryFuzzer.git
$ cd angryFuzzer
$ sudo pip install -r requirements.txt
$ pip2 install requests
$ chmod +x *
$ python angryFuzzer.py
How to use
$ python angryFuzzer.py -h
usage: angryFuzzer.py [options]
options:
-h, --help show this help message and exit
-q, --quiet Silent mode ,only reports
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST Custom wordlist
Example:
• Fuzzing an url with default dictionary
python angryFuzzer.py -u http://127.0.0.1
• Fuzzing CMS (wp: in this example !)
python angryFuzzer.py -u http://127.0.0.1 --cms wp
• Fuzzing a custom Wordlist
python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt
Note : any content given in our blog is only for educational purpose our blog does not permote any illegal activity so do it on your own risk.
Reviewed by Future Comunity
on
00:14
Rating:

No comments: