Awesome
<h1 align="center"> <br> <a href="https://github.com/0xinfection/xsrfprobe"><img src="https://i.ibb.co/rQzpKk6/circle-cropped.png" alt="xsrfprobe"/></a> <br> <br> XSRFProbe </h1> <h4 align="center">The Prime Cross Site Request Forgery Audit & Exploitation Toolkit.</h4> <p align="center"> <a href="https://docs.python.org/3/download.html"> <img src="https://img.shields.io/badge/Python-3.x-green.svg"> </a> <a href="https://github.com/0xinfection/XSRFProbe/releases"> <img src="https://img.shields.io/badge/Version-v2.3%20(stable)-blue.svg"> </a> <a href="https://github.com/0xinfection/XSRFProbe/blob/master/LICENSE"> <img src="https://img.shields.io/badge/License-GPLv3-orange.svg"> </a> <a href="https://travis-ci.org/0xInfection/XSRFProbe"> <img src="https://img.shields.io/badge/Build-Passing-brightgreen.svg?logo=travis"> </a> </p>About:
XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a powerful crawling engine and numerous systematic checks, it is able to detect most cases of CSRF vulnerabilities, their related bypasses and futher generate (maliciously) exploitable proof of concepts with each found vulnerability. For more info on how XSRFProbe works, see XSRFProbe Internals on wiki.
<img src="https://i.imgur.com/xTrfWSt.gif" alt="xsrf-logo"> <p align="center"> <a href="https://github.com/0xinfection/xsrfprobe/wiki">XSRFProbe Wiki</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/Getting-Started">Getting Started</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/General-Usage">General Usage</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/Advanced-Usage">Advanced Usage</a> • <a href="https://github.com/0xinfection/xsrfprobe/wiki/XSRFProbe-Internals">XSRFProbe Internals</a> • <a href="https://github.com/0xinfection/xsrfprobe#gallery">Gallery</a> </p>Some Features:
- Performs several types of checks before declaring an endpoint as vulnerable.
- Can detect several types of Anti-CSRF tokens in POST requests.
- Works with a powerful crawler which features continuous crawling and scanning.
- Out of the box support for custom cookie values and generic headers.
- Accurate Token-Strength Detection and Analysis using various algorithms.
- Can generate both normal as well as maliciously exploitable CSRF proof of concepts.
- Well documented code and highly generalised automated workflow.
- The user is in control of everything whatever the scanner does.
- Has a user-friendly interaction environment with full verbose support.
- Detailed logging system of errors, vulnerabilities, tokens and other stuffs.
Gallery:
Lets see some real-world scenarios of XSRFProbe in action:
<img src="https://i.imgur.com/AAE1HrE.gif" width=50% /><img src="https://i.imgur.com/TJt103P.gif" width=50% /> <img src="https://i.imgur.com/yzyvXHX.gif" /> <img src="https://i.imgur.com/MhTucgI.gif" width=50% /><img src="https://i.imgur.com/gcfZ9zQ.gif" width=50% />
Usage:
For the full usage info, please take a look at the wiki's — General Usage and Advanced Usage.
Installing via Pypi:
XSRFProbe can be easily installed via a single command:
pip install xsrfprobe
Installing manually:
- For the basics, the first step is to install the tool:
python3 setup.py install
- Now, the tool can be fired up via:
xsrfprobe --help
- After testing XSRFProbe on a site, an output folder is created in your present working directory as
xsrfprobe-output
. Under this folder you can view the detailed logs and information collected during the scans.
Version and License:
XSRFProbe v2.3
release is a Stage 5 Production-Ready (Stable)
release and the work is licensed under the GNU General Public License (GPLv3).
Warnings:
Do not use this tool on a live site!
It is because this tool is designed to perform all kinds of form submissions automatically which can sabotage the site. Sometimes you may screw up the database and most probably perform a DoS on the site as well.
Test on a disposable/dummy setup/site!
Disclaimer:
Usage of XSRFProbe for testing websites without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. The author assumes no liability and is not exclusively responsible for any misuse or damage caused by this program.
Author's Words:
This project is based entirely upon my own research and my own experience with web applications on Cross-Site Request Forgery attacks. You can try going through the source code which is highly documented to help you understand how this toolkit was built. Useful pull requests, ideas and issues are highly welcome. If you wish to see what how XSRFProbe is being developed, check out the Development Board.
Copyright © @0xInfection