SSRFmap
Last updated
Last updated
Automatic SSRF fuzzer and exploitation tool
Help
Launch a portscan on localhost and read default files
Launch a portscan against an HTTPS endpoint using a custom user-agent
Triggering a reverse shell on a Redis (Specify LHOST and LPORT)
Inject inside a header, a GET or a POST parameter, you only need to specify the parameter name
When the target is protected by a WAF or some filters you can try a wide range of payloads and encoding with the parameter --level