Automatic SSRF fuzzer and exploitation tool SSRFmap is a tool designed to automatically identify and exploit Server-Side Request Forgery (SSRF) vulnerabilities in web applications. It uses a combination of techniques to identify potential SSRF vulnerabilities and exploit them to gain access to internal systems or data. SSRFmap is a powerful tool that can help security researchers and penetration testers identify and exploit SSRF vulnerabilities, but it should be used responsibly and only for legal and ethical purposes.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
A technique for social engineering and untrusted command execution using ClickOnce technology
A Live CD and Live USB for penetration testing and security assessment
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.