This Article Is Applicable For Both Termux As Well As Kali Linux
About AngryFuzzer
AngryFuzzer is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb. The Following video will gide you how to install angry fuzzer in Termux, for kali linux the process is same with some minor changes, which we will discuss below.
Watch this video to see how to install angryfuzzer in Termux.
Installation And Usage Of AngryFuzzer In Kali Linux
Download AngryFuzzer from github
git clone https://github.com/ihebski/angryFuzzer.git
To run angryfuzzer use following Commands
cd angryFuzzer
pip install -r requirements.txt
python angryFuzzer.py -h
Options:
-h, --help show this help message and exit
-q, --quiet Silent mode ,only reports
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST Custom wordlist
Example:
Fuzzing an url with default dictionary
python angryFuzzer.py -u http://127.0.0.1
Fuzzing CMS- WORDPRESS
python angryFuzzer.py -u http://127.0.0.1 --cms wp
Fuzzing a custom Wordlist
python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt
That's all for AngryFuzzer, i hope you enjoyed reading this article i will see you soon in my next post till the end keep learning and stay safe.
About AngryFuzzer
AngryFuzzer is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb. The Following video will gide you how to install angry fuzzer in Termux, for kali linux the process is same with some minor changes, which we will discuss below.
Watch this video to see how to install angryfuzzer in Termux.
Installation And Usage Of AngryFuzzer In Kali Linux
Download AngryFuzzer from github
git clone https://github.com/ihebski/angryFuzzer.git
To run angryfuzzer use following Commands
cd angryFuzzer
pip install -r requirements.txt
python angryFuzzer.py -h
Options:
-h, --help show this help message and exit
-q, --quiet Silent mode ,only reports
-u URL, --url=URL URL of the Target
-c CMS, --cms=CMS scan CMS ==> wp ,dp
-w WORDLIST, --wordlist=WORDLIST Custom wordlist
Example:
Fuzzing an url with default dictionary
python angryFuzzer.py -u http://127.0.0.1
Fuzzing CMS- WORDPRESS
python angryFuzzer.py -u http://127.0.0.1 --cms wp
Fuzzing a custom Wordlist
python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt
That's all for AngryFuzzer, i hope you enjoyed reading this article i will see you soon in my next post till the end keep learning and stay safe.
Comments
Post a Comment