MobSF / CapFuzz

CapFuzz - capture, fuzz & intercept web traffic.
https://opensecurity.in
GNU General Public License v3.0
63 stars 29 forks source link
api api-fuzzer capfuzz https-proxy mobsf-fuzzer web web-fuzzer

CapFuzz (Depreciated, use: https://github.com/MobSF/httptools)

capture | intercept | fuzz

Yet another https proxy to capture and fuzz web apis. Tailor made for fuzzing Mobile App APIs & web services with a scriptable interface. CapFuzz is built on top of mitmproxy

screen shot 2018-03-11 at 2 57 55 pm

Install

$ git clone https://github.com/MobSF/CapFuzz.git
$ cd CapFuzz
$ python setup.py install

Usage

$ capfuzz
usage: capfuzz [-h] [-m MODE] [-p PORT] [-n NAME]

optional arguments:
  -h, --help            show this help message and exit
  -m MODE, --mode MODE  Supported modes
                        1. capture: Capture requests.
                        2. fuzz: Run Fuzzing Server.
                        3. runfuzz: Fuzz on captured requests with default configuration.
                        4. intercept: Intercept and tamper the flow in live.
  -p PORT, --port PORT  Proxy Port
  -n NAME, --name NAME  Project Name
  1. Capture - capfuz -m capture
    • Starts HTTPS proxy at 1337 by default.
    • Install Root CA cert available under capfuzz/ca to browser or system.
  2. Intercept - capfuz -m intercept
    • To Fiddle with request and response in live.
    • Use: capfuzz/core/interceptor.py (The location will be relative to where capfuzz is installed)
  3. Fuzz UI - capfuzz -m fuzz
    • Starts the Fuzzer Web UI for configuration and fuzzing: https://0.0.0.0:1337
  4. Fuzz - capfuzz -m runfuzz
    • Fuzz from command line.