The Browser-Bruter is first ever browser based automated web pentesting tool for fuzzing web forms by controlling the browser it self. It automates the process of sending payloads to input fields of browser and sends them too server. It completely bypasses the need of breaking the encryption in order to fuzz and insert payloads in BurpSuite scanner and intruder. After fuzzing it generates a comprehensive report including all the data and result of the pentest along with HTTP traffic, this report can be viewed by The Report-Explorer tool which comes with The Browser-Bruter.
Handcrafted in India 🇮🇳
HTTP Manipulation ineffective due to Encryption
https://net-square.com/browserbruter/img/need-1.mp4
Trying to find SQLInjection using SQLMAP
https://net-square.com/browserbruter/img/sqlmap.mp4
Trying to find SQLInjection using BurpSuite
https://net-square.com/browserbruter/img/burp-scan.mp4
BruteForcing login page using FFUF
https://net-square.com/browserbruter/img/ffuf-1-video.mp4
Finding SQL Injection which can not be found in other tools using The Browser Bruter
https://net-square.com/browserbruter/img/sql-injection.mp4
BruteForcing Login page using The Browser Bruter
https://net-square.com/browserbruter/img/brute-force-login-1.mp4
The biggest advantage of using browser bruter for fuzzing the web application is that all of the fuzzing will take place at browser level, so all of the attack will be as they have been manually done by the user by typing payloads in the input fields of the web application on browser.
This approach -
Allows Pentester to fuzz the web application forms when the HTTP body (or part of the body) is encrypted making HTTP proxy tools like ZAP and BurpSuite or SQLMap unable to insert payloads in such traffic. Learn more here.
Creates a way to bypass captchas by allowing the pentester to manually perform the required human interactions and then proceed to payload insertions.
Can fuzz front-end when there is no HTTP traffic, for example when Input is utilized on the client side, i.e. when you want to brute force OTP input which is validated on the client side, so there is no HTTP Traffic.
Removes the burden of session management, auth handling and other micro management like CSRF handling while using HTTP proxy tools.
Requires following python packages:
Tested on latest version (as of March 2024) of each package.
pip3 install -r requirements.txt
Refer documentation for detailed installation guide. - https://net-square.com/browserbruter/SetupInstallation/
The Lab shown in documentation can be setup using docker as follows-
sudo docker run --rm -p 80:80 hpandro/vims
sudo docker container ls -a
sudo docker exec -it [containerid] service mysql start
Navigate to http://localhost/
to test site.BrowserBruter is an open-source project, and we welcome contributions from the community. If you would like to contribute to BrowserBruter, you can do so in several ways:
GitHub Repository: The source code for BrowserBruter is hosted on GitHub. You can contribute by forking the repository, making your changes, and submitting a pull request. Contributions can include bug fixes, new features, documentation improvements, or any other enhancements.
Reporting Issues: If you encounter a bug or issue while using BrowserBruter, please report it on the GitHub issue tracker. Include as much detail as possible, such as steps to reproduce the issue and your environment details.
Feature Requests: If you have a feature request or idea for improving BrowserBruter, you can submit it on the GitHub issue tracker. We welcome feedback and suggestions from the community.
Documentation: Improving the documentation is another valuable way to contribute. If you find any errors or gaps in the documentation, you can submit a pull request to update it.
Spread the Word: You can also contribute by spreading the word about BrowserBruter. Share it with your friends, colleagues, or on social media to help grow the user community.
Thank you for considering contributing to BrowserBruter. Your support is greatly appreciated!
Jafar Pathan at LinkedIn, X (Twitter) and GitHub
Ravi Kumar Paghdal at LinkedIn, X (Twitter) and GitHub
Jatan Raval at LinkedIn, X (twitter) and GitHub
Saumil Shah at LinkedIn, X (twitter) and Github
This project is licensed under the Microsoft Public License
This BrowserBruter (‘Software’) is protected under the Indian Copyright Act and is the exclusively property owned by Net Square Solutions Private Limited (‘Net Square’). The use of this Software (including but not limited to) reproduction, distribution, copying, republication, modification, transmission, sale or offer for sale, alteration in any form (including but not limited to electronic or otherwise) is strictly prohibited without the prior written consent from Net Square. Permission to grant license to use the Software shall be at the sole discretion of Net Square.