All Projects → d4rckh → vaf

d4rckh / vaf

Licence: GPL-3.0 license
Vaf is a cross-platform very advanced and fast web fuzzer written in nim

Programming Languages

nim
578 projects
shell
77523 projects

Projects that are alternatives of or similar to vaf

Dirsearch
Web path scanner
Stars: ✭ 7,246 (+2364.63%)
Mutual labels:  penetration-testing, bug-bounty, fuzzing, bugbounty, fuzzer, pentest-tool
Nightingale
It's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-59.52%)
Mutual labels:  penetration-testing, bug-bounty, bugbounty, pentest-tool, hacking-tools
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-35.37%)
Mutual labels:  penetration-testing, bug-bounty, recon, bugbounty
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+1069.73%)
Mutual labels:  penetration-testing, bug-bounty, recon, bugbounty
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-51.7%)
Mutual labels:  penetration-testing, bug-bounty, recon, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+231.29%)
Mutual labels:  xss, fuzzing, recon, bugbounty
3klcon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (-35.71%)
Mutual labels:  penetration-testing, recon, bugbounty
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-94.9%)
Mutual labels:  bruteforce, penetration-testing, bugbounty
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-88.44%)
Mutual labels:  bruteforce, penetration-testing, hacking-tools
credcheck
Credentials Checking Framework
Stars: ✭ 50 (-82.99%)
Mutual labels:  bug-bounty, bugbounty, pentest-tool
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+67.35%)
Mutual labels:  bruteforce, fuzzing, bugbounty
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-59.52%)
Mutual labels:  bruteforce, bug-bounty, recon
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-36.39%)
Mutual labels:  penetration-testing, bugbounty, burpsuite
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-44.9%)
Mutual labels:  penetration-testing, bugbounty, burpsuite
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+16239.46%)
Mutual labels:  penetration-testing, bug-bounty, fuzzing
Thc Hydra
hydra
Stars: ✭ 5,645 (+1820.07%)
Mutual labels:  bruteforce, penetration-testing, pentest-tool
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads, it has fast performance.
Stars: ✭ 506 (+72.11%)
Mutual labels:  xss, bruteforce, fuzzing
Commodity Injection Signatures
Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (-9.18%)
Mutual labels:  xss, fuzzing, burpsuite
Blackwidow
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (+201.7%)
Mutual labels:  xss, bugbounty, fuzzer
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+1091.5%)
Mutual labels:  penetration-testing, recon, hacking-tools

vaf

A fast, simple, and feature rich web fuzzer written in nim





vaf is a cross-platform web fuzzer with a lot of features. Some of its features include:

Installing

You can install vaf using this one-liner:

curl https://raw.githubusercontent.com/d4rckh/vaf/main/install.sh | sudo bash

Options

Options:
  -h, --help
  -u, --url=URL              Target URL. Replace fuzz area with FUZZ
  -w, --wordlist=WORDLIST    The path to the wordlist.
  -m, --method=METHOD        Request method. Supported: POST, GET (default: GET)
  -H, --header=HEADER        Specify HTTP headers; can be used multiple times. Example: -H 'header1: val1' -H 'header1: val1'
  -pf, --prefix=PREFIX       The prefixes to append to the word (default: )
  -sf, --suffix=SUFFIX       The suffixes to append to the word (default: )
  -t, --threads=THREADS      Number of threads (default: 5)
  -sc, --status=STATUS       The status to filter; to 'any' to print on any status (default: 200)
  -g, --grep=GREP            Only log if the response body contains the string (default: )
  -ng, --notgrep=NOTGREP     Only log if the response body does no contain a string (default: )
  -pd, --postdata=POSTDATA   Specify POST data; used only if '-m post' is set (default: {})
  -x, --proxy=PROXY          Specify a proxy (default: )
  -ca, --cafile=CAFILE       Specify a CA root certificate; useful if you are using Burp/ZAP proxy (default: )
  -o, --output=OUTPUT        Output the results in a file (default: )
  -mr, --maxredirects=MAXREDIRECTS
                             How many redirects should vaf follow; 0 means none (default: 0)
  -v, --version              Print version information
  -pif, --printifreflexive   Print only if the fuzzed word is reflected in the page
  -i, --ignoressl            Do not verify SSL certificates; useful if you are using Burp/ZAP proxy
  -ue, --urlencode           URL encode the fuzzed words
  -pu, --printurl            Print the requested URL
  -ph, --printheaders        Print response headers
  -dbg, --debug              Prints debug information

Examples

Fuzz URL path, show only responses which returned 200 OK

vaf -u https://example.org/FUZZ -w path/to/wordlist.txt -sc OK

Fuzz 'User-Agent' header, show only responses which returned 200 OK

vaf -u https://example.org/ -w path/to/wordlist.txt -sc OK -H "User-Agent: FUZZ"

Fuzz POST data, show only responses which returned 200 OK

vaf -u https://example.org/ -w path/to/wordlist.txt -sc OK -m POST -H "Content-Type: application/json" -pd '{"username": "FUZZ"}'

Contributors

Thanks to everyone who contributed to this project!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].