Skip to main content

FUZZmap is a web application vulnerability fuzzing tool designed to detect security flaws.

Project description

FUZZmap

Python 3.13.0 License

Web Application Vulnerability Fuzzing Tool

Current version: 0.1 (SQL Injection)

Fuzzing Parameter Reconnaissance Vulnerability Detection

FUZZmap is a web application vulnerability fuzzing tool designed to detect security flaws. It identifies web application vulnerabilities through automated parameter Reconnaissance and advanced payload testing.

💻 FUZZmap Developers

Korean README is available here README-KR.md

✨ Features

  • Parameter Reconnaissance
  • Common Payload Testing
  • Advanced Payload Testing
    • SQL Injection Detection - Advanced analysis including error-based, time-based, and boolean-based techniques (v0.1)
    • XSS Detection - (Advanced analysis coming in v0.2)
    • SSTI Detection - (Advanced analysis coming in v0.3)
  • Asynchronous Architecture - Utilizes asyncio and semaphores for optimized concurrent testing
  • Expandable Framework - Designed for easy addition of new vulnerability types in future versions

📋 Installation

Using pip

# Installation
pip install fuzzmap

From GitHub

# Git clone
git clone https://github.com/offensive-tooling/FUZZmap.git
cd fuzzmap

# Installation
pip install -e .

🚀 Usage

Command Line Usage

# Test specific parameter
fuzzmap -t <target_url> -m get -p <target_parameter>

# Test multiple parameters
fuzzmap -t <target_url> -m get -p <target_parameter 1>,<target_parameter 2>

# Use POST method
fuzzmap -t <target_url> -m post -p <target_parameter>

# Test with Parameter Reconnaissance 
fuzzmap -t <target_url> -rp

Python Module Usage

import asyncio
from fuzzmap import Controller

async def main():

    # Test with specific parameters
    fm = Controller(target="http://target.com", method="GET", param=["target_parameter"])
    results = await fm.async_run()
    print(results)
    
    # Test with Parameter Reconnaissance
    fm = Controller(target="http://target.com", recon_param=True)
    results = await fm.async_run()
    print(results)

asyncio.run(main())

🛠️ How It Works

FuzzMap operates in four main phases:

  1. Parameter Reconnaissance: Automatically identifies parameters through:

    • URL query extraction
    • Form field analysis (inputs, selects, textareas)
    • Form action paths and methods
    • (JavaScript hidden parameters - release later)
    • (Dynamic parameter collection module - release later)
  2. Common Payload Testing: Tests various vulnerabilities with common payloads:

    • SQL Injection
    • XSS (Cross Site Scripting)
    • SSTI (Server Side Template Injection)
    • (More types to be continuously added)
  3. Advanced Payload Testing (Currently for SQL Injection only):

    • SQL Injection (error-based, time-based, boolean-based)
    • (XSS payloads and features coming in v0.2)
    • (SSTI payloads and features coming in v0.3)
  4. Result Classification: Categorize findings as follows:

    • Vulnerability type and subtype
    • Detection confidence scoring (0-100%)
    • Detection details and evidence

📊 Example Output

handler: common, advanced
🎯 url: http://target.com/
parameters: ['test', 'searchFor']
method: GET
Type: xss
💰 Detected: True
Common_payload: '"><iframe onload=alert('{{1234**3}}');>
Common_Confidence: 50
🔍 Detail_Vuln: Error-Based SQL Injection
Advanced_payload: ' UNION SELECT NULL-- -
Advanced_Confidence: 100
Context: ECT NULL-- -</h2>Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '

------------------------------------------------------------------
handler: common, advanced
🎯 url: http://target.com/
parameters: ['test', 'searchFor']
method: GET
Type: sql_injection
💰 Detected: True
Common_payload: ' || BEGIN DBMS_SESSION.SLEEP(5); END; -- 
Common_Confidence: 70
🔍 Detail_Vuln: Error-Based SQL Injection
Advanced_payload: ' UNION SELECT NULL-- -
Advanced_Confidence: 100
Context: ECT NULL-- -</h2>Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '

⚙️ Command Line Options

-t, --target    🎯 Target URL to scan
-m, --method    📡 HTTP method (GET/POST)
-p, --param     🔍 Parameters to test (comma separated)
-rp, --recon    🔎 Enable parameter reconnaissance
-v, --verbose   📝 Enable verbose output
-h, --help      ℹ️  Show help message

📝 Translations

🔔 Disclaimer

FUZZmap is designed for legitimate security testing with proper authorization. Always ensure you have permission before testing any website or application.


FUZZmap - Slogan (Coming Soon)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fuzzmap-0.1.8.2.tar.gz (34.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fuzzmap-0.1.8.2-py3-none-any.whl (5.4 kB view details)

Uploaded Python 3

File details

Details for the file fuzzmap-0.1.8.2.tar.gz.

File metadata

  • Download URL: fuzzmap-0.1.8.2.tar.gz
  • Upload date:
  • Size: 34.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for fuzzmap-0.1.8.2.tar.gz
Algorithm Hash digest
SHA256 c6454b34508f8a7979d152f2772e0920a0ed73d645aaa4e30205907877ede09e
MD5 7291bd9280a17a9699e2ddbceb91f3b6
BLAKE2b-256 da16b78e14d077b5c3e496f6507c289f6a1c925b70db2c8f1acccd7415722c6a

See more details on using hashes here.

Provenance

The following attestation bundles were made for fuzzmap-0.1.8.2.tar.gz:

Publisher: python-publish.yml on offensive-tooling/FUZZmap

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file fuzzmap-0.1.8.2-py3-none-any.whl.

File metadata

  • Download URL: fuzzmap-0.1.8.2-py3-none-any.whl
  • Upload date:
  • Size: 5.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for fuzzmap-0.1.8.2-py3-none-any.whl
Algorithm Hash digest
SHA256 8396b3208450215815f33e3e6710222ab54e0ab48204e512beb68c3f3c2cfe20
MD5 c66c0f6049c65dec1076f4a15a5af9aa
BLAKE2b-256 5c6a3bee58b682b84cdbc5d4806a485425917e3e09e7efd9a43dd554a03bf732

See more details on using hashes here.

Provenance

The following attestation bundles were made for fuzzmap-0.1.8.2-py3-none-any.whl:

Publisher: python-publish.yml on offensive-tooling/FUZZmap

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page