FUZZmap is a web application vulnerability fuzzing tool designed to detect security flaws.
Project description
FUZZmap
FUZZmap is a web application vulnerability fuzzing tool designed to detect security flaws. It identifies web application vulnerabilities through automated parameter Reconnaissance and advanced payload testing.
💻 FUZZmap Developers
✨ Features
- Parameter Reconnaissance
- Common Payload Testing
- Advanced Payload Testing
- SQL Injection Detection - Advanced analysis including error-based, time-based, and boolean-based techniques (v0.1)
- XSS Detection - Advanced analysis including advanced xss in v0.2
- SSTI Detection - (Advanced analysis coming in v0.3)
- Asynchronous Architecture - Utilizes
asyncioand semaphores for optimized concurrent testing - Expandable Framework - Designed for easy addition of new vulnerability types in future versions
📋 Installation
Using pip
# Installation
pip install fuzzmap
From GitHub
# Git clone
git clone https://github.com/offensive-tooling/FUZZmap.git
cd fuzzmap
# Installation
pip install -e .
🚀 Usage
Command Line Usage
# Test specific parameter
fuzzmap -t <target_url> -m get -p <target_parameter>
# Test multiple parameters
fuzzmap -t <target_url> -m get -p <target_parameter 1>,<target_parameter 2>
# Use POST method
fuzzmap -t <target_url> -m post -p <target_parameter>
# Test with Parameter Reconnaissance
fuzzmap -t <target_url> -rp
Python Module Usage
import asyncio
from fuzzmap.core.controller.controller import Controller
async def main():
# Test with specific parameters
fm = Controller(target="http://target.com", method="GET", param=["target_parameter"])
results = await fm.async_run()
# Test with Parameter Reconnaissance
fm = Controller(target="http://target.com", recon_param=True)
results = await fm.async_run()
asyncio.run(main())
🛠️ How It Works
FuzzMap operates in four main phases:
-
Parameter Reconnaissance: Automatically identifies parameters through:
- URL query extraction
- Form field analysis (inputs, selects, textareas)
- Form action paths and methods
- (JavaScript hidden parameters - release later)
- (Dynamic parameter collection module - release later)
-
Common Payload Testing: Tests various vulnerabilities with common payloads:
- SQL Injection
- XSS (Cross Site Scripting)
- SSTI (Server Side Template Injection)
- (More types to be continuously added)
-
Advanced Payload Testing (Currently for SQL Injection only):
- SQL Injection (error-based, time-based, boolean-based)
- (XSS payloads and features coming in v0.2)
- (SSTI payloads and features coming in v0.3)
-
Result Classification: Categorize findings as follows:
- Vulnerability type and subtype
- Detection confidence scoring (0-100%)
- Detection details and evidence
📊 Example Output
handler: common, advanced
🎯 url: http://target.com/
parameters: ['test', 'searchFor']
method: GET
Type: xss
💰 Detected: True
Common_payload: '"><iframe onload=alert('{{1234**3}}');>
Common_Confidence: 50
🔍 Detail_Vuln: Error-Based SQL Injection
Advanced_payload: ' UNION SELECT NULL-- -
Advanced_Confidence: 100
Context: ECT NULL-- -</h2>Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '
------------------------------------------------------------------
handler: common, advanced
🎯 url: http://target.com/
parameters: ['test', 'searchFor']
method: GET
Type: sql_injection
💰 Detected: True
Common_payload: ' || BEGIN DBMS_SESSION.SLEEP(5); END; --
Common_Confidence: 70
🔍 Detail_Vuln: Error-Based SQL Injection
Advanced_payload: ' UNION SELECT NULL-- -
Advanced_Confidence: 100
Context: ECT NULL-- -</h2>Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '
⚙️ Command Line Options
-t, --target 🎯 Target URL to scan
-m, --method 📡 HTTP method (GET/POST)
-p, --param 🔍 Parameters to test (comma separated)
-rp, --recon 🔎 Enable parameter reconnaissance
-v, --verbose 📝 Enable verbose output
-h, --help ℹ️ Show help message
📝 Translations
🔔 Disclaimer
FUZZmap is designed for legitimate security testing with proper authorization. Always ensure you have permission before testing any website or application.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fuzzmap-0.2.2.tar.gz.
File metadata
- Download URL: fuzzmap-0.2.2.tar.gz
- Upload date:
- Size: 39.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
651d50e6961bf7dd6e4fb3263eb9eb3086c8de8952b18e620d47f705463efd0f
|
|
| MD5 |
a0ee1913ff8dcf492f42a2e5ade99ff4
|
|
| BLAKE2b-256 |
1208979bfede5356736eb6e801a61e4fe232b8f268910a9aaf16cdb6bbb9e21e
|
Provenance
The following attestation bundles were made for fuzzmap-0.2.2.tar.gz:
Publisher:
python-publish.yml on offensive-tooling/FUZZmap
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
fuzzmap-0.2.2.tar.gz -
Subject digest:
651d50e6961bf7dd6e4fb3263eb9eb3086c8de8952b18e620d47f705463efd0f - Sigstore transparency entry: 199863419
- Sigstore integration time:
-
Permalink:
offensive-tooling/FUZZmap@f80b9087a80f94b03213f1de11d1f41070e06216 -
Branch / Tag:
refs/tags/v0.2.2 - Owner: https://github.com/offensive-tooling
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@f80b9087a80f94b03213f1de11d1f41070e06216 -
Trigger Event:
push
-
Statement type:
File details
Details for the file fuzzmap-0.2.2-py3-none-any.whl.
File metadata
- Download URL: fuzzmap-0.2.2-py3-none-any.whl
- Upload date:
- Size: 43.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
56f4a27f98234cbb182c86dffad9c6027666900b349d40037c0f45a6c28a2fa2
|
|
| MD5 |
290213c9dec475ec8018b77e2a0ac124
|
|
| BLAKE2b-256 |
e970045411b5117094f8a1fe59a252afb9c3523eb8768733333b45c29cf830dc
|
Provenance
The following attestation bundles were made for fuzzmap-0.2.2-py3-none-any.whl:
Publisher:
python-publish.yml on offensive-tooling/FUZZmap
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
fuzzmap-0.2.2-py3-none-any.whl -
Subject digest:
56f4a27f98234cbb182c86dffad9c6027666900b349d40037c0f45a6c28a2fa2 - Sigstore transparency entry: 199863420
- Sigstore integration time:
-
Permalink:
offensive-tooling/FUZZmap@f80b9087a80f94b03213f1de11d1f41070e06216 -
Branch / Tag:
refs/tags/v0.2.2 - Owner: https://github.com/offensive-tooling
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@f80b9087a80f94b03213f1de11d1f41070e06216 -
Trigger Event:
push
-
Statement type: