nozaki icon indicating copy to clipboard operation
nozaki copied to clipboard

HTTP fuzzer engine security oriented

Results 21 nozaki issues
Sort by recently updated
recently updated
newest added

I think it would be interesting to have a feature to do recursively on found paths or links that were found on this host, which are from the same origin......

feature

It would be amazing if somehow we could fuzz multiple values and multiple contexts. Imagine if a user can use: #6, #7, #8 feature in the unique command

enhancement

**Context** Sending data in the request body, especially with methods like POST, is a common attack vector for vulnerabilities such as SQL Injection, SSRF, RCE, and XSS. Implementing fuzzing for...

enhancement

**Context:** HTTP header fuzzing is crucial for identifying vulnerabilities related to header manipulation, such as injections or exploitation of specific fields. **What is needed to do:** Add a new command-line...

enhancement

Something like: ``` $ nozaki.pl -m GET -u https://target.com/login.php?${substrings} --wordilist substrings.txt ```

enhancement

It would be interesting if the fuzzer itself identified some of the technologies used by the application, consequently, taking the freedom to decide which wordlists to use. References: 1. https://github.com/iustin24/chameleon

**Context:** Filtering requests by content type (Content-Type) is essential for highlighting relevant responses, especially in applications that return multiple formats (e.g., JSON, HTML, etc.). This feature would be particularly useful...