Home

Awesome

<h1 align="center"> <br> <a href="https://github.com/0xinfection/xsrfprobe"><img src="https://i.ibb.co/rQzpKk6/circle-cropped.png" alt="xsrfprobe"/></a> <br> <br> XSRFProbe </h1> <h4 align="center">The Prime Cross Site Request Forgery Audit & Exploitation Toolkit.</h4> <p align="center"> <a href="https://docs.python.org/3/download.html"> <img src="https://img.shields.io/badge/Python-3.x-green.svg"> </a> <a href="https://github.com/0xinfection/XSRFProbe/releases"> <img src="https://img.shields.io/badge/Version-v2.3%20(stable)-blue.svg"> </a> <a href="https://github.com/0xinfection/XSRFProbe/blob/master/LICENSE"> <img src="https://img.shields.io/badge/License-GPLv3-orange.svg"> </a> <a href="https://travis-ci.org/0xInfection/XSRFProbe"> <img src="https://img.shields.io/badge/Build-Passing-brightgreen.svg?logo=travis"> </a> </p>

About:

XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a powerful crawling engine and numerous systematic checks, it is able to detect most cases of CSRF vulnerabilities, their related bypasses and futher generate (maliciously) exploitable proof of concepts with each found vulnerability. For more info on how XSRFProbe works, see XSRFProbe Internals on wiki.

<img src="https://i.imgur.com/xTrfWSt.gif" alt="xsrf-logo"> <p align="center"> <a href="https://github.com/0xinfection/xsrfprobe/wiki">XSRFProbe Wiki</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/Getting-Started">Getting Started</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/General-Usage">General Usage</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/Advanced-Usage">Advanced Usage</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/XSRFProbe-Internals">XSRFProbe Internals</a> • <a href="https://github.com/0xinfection/xsrfprobe#gallery">Gallery</a> </p>

Some Features:

Gallery:

Lets see some real-world scenarios of XSRFProbe in action:

<img src="https://i.imgur.com/AAE1HrE.gif" width=50% /><img src="https://i.imgur.com/TJt103P.gif" width=50% /> <img src="https://i.imgur.com/yzyvXHX.gif" /> <img src="https://i.imgur.com/MhTucgI.gif" width=50% /><img src="https://i.imgur.com/gcfZ9zQ.gif" width=50% />

Usage:

For the full usage info, please take a look at the wiki's — General Usage and Advanced Usage.

Installing via Pypi:

XSRFProbe can be easily installed via a single command:

pip install xsrfprobe

Installing manually:

python3 setup.py install
xsrfprobe --help

Version and License:

XSRFProbe v2.3 release is a Stage 5 Production-Ready (Stable) release and the work is licensed under the GNU General Public License (GPLv3).

Warnings:

Do not use this tool on a live site!

It is because this tool is designed to perform all kinds of form submissions automatically which can sabotage the site. Sometimes you may screw up the database and most probably perform a DoS on the site as well.

Test on a disposable/dummy setup/site!

Disclaimer:

Usage of XSRFProbe for testing websites without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. The author assumes no liability and is not exclusively responsible for any misuse or damage caused by this program.

Author's Words:

This project is based entirely upon my own research and my own experience with web applications on Cross-Site Request Forgery attacks. You can try going through the source code which is highly documented to help you understand how this toolkit was built. Useful pull requests, ideas and issues are highly welcome. If you wish to see what how XSRFProbe is being developed, check out the Development Board.

Copyright © @0xInfection