Skip to content

FuzzSwarm is an advanced fuzzing tool designed to brute-force HTTP endpoints and uncover vulnerabilities in web applications and APIs. It efficiently handles large-scale testing through multi-threaded fuzzing, offering support for both GET and POST requests.

License

Notifications You must be signed in to change notification settings

0xBl4nk/FuzzSwarm2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Fuzz Swarm 2.0

Go version Wiki

FuzzSwarm is a powerful multi-threaded fuzzing tool designed for brute-forcing HTTP endpoints and identifying vulnerabilities in web applications and APIs. It supports GET and POST requests, custom headers, and can load headers from a file. Users can perform precise fuzzing with numeric ranges, wordlists, and filter responses by size. FuzzSwarm also offers rate limit and timeout controls, as well as proxy and SSL support for secure testing environments, making it ideal for pentesters and security professionals seeking to uncover web security flaws.

⚡️ Quick start

First, download and install Go. Version 1.23 or higher is required.

Clone FuzzSwarm Repository:

git clone https://github.com/0xBl4nk/FuzzSwarm2

Build the project or use the precompiled binary:

# Build project:
cd FuzzSwarm2
make build

# Usage:
./FuzzSwarm --help

📖 Project Wiki

The best way to better explore all the features of the Fuzz Swarm 2 is to read the project Wiki.

Yes, the most frequently asked questions (FAQ) are also here.

⚙️ Commands & Options

POST Example

Cheat sheet for some uses of Fuzz Swarm 2

./FuzzSwarm -X POST -u http://127.0.0.1/api/2fa \
 -R 1-10000,1 -d '{"number": FUZZ}' \
  -H "Content-Type: application/json" \
   -f 34 -v
Option Description Type Default Required?
-X Select HTTP method string GET No
-R Use number range instead of word list string yes, if you don't use word list
-d Set POST data string No
-H Set custom headers string No
-f Skip answer with answer length int No
-v Show response body bool False No

ImageUsage

Scripts Example

You can use scripts in FuzzSwarm to automate specific attack types, such as SSTI fuzzing, with predefined payloads for more targeted vulnerability testing.

./FuzzSwam --script ssti -u 'http://127.0.0.1/vulnerable?input=FUZZ' -v
Option Description Type Default Required?
--script Select the script to use string No

cgapp_deploy


About

FuzzSwarm is an advanced fuzzing tool designed to brute-force HTTP endpoints and uncover vulnerabilities in web applications and APIs. It efficiently handles large-scale testing through multi-threaded fuzzing, offering support for both GET and POST requests.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published