Exploitation Tools

Fuxploider : Automating File Upload Vulnerability Exploitation

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.

This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server.

Installation

You will need Python 3.6 at least.

git clone https://github.com/almandin/fuxploider.git
cd fuxploider
pip3 install -r requirements.txt

If you have problems with pip (and if you use windows apparently) :

python3 -m pip install -r requirements.txt

For Docker installation

# Build the docker image
docker build -t almandin/fuxploider .

Usage

To get a list of basic options and switches use :

python3 fuxploider.py -h

Basic example :

python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"
Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC)…

23 minutes ago

ripgrep : The Fast, Flexible Search Tool

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex…

27 minutes ago

InfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

InfluxDB is the leading open source time series database for metrics, events, and real-time analytics.…

33 minutes ago

The Strength Of Signed App Control Policies

Before delving into the topic, let's first clarify the role of an Administrator within the…

3 days ago

Embassy : Revolutionizing Embedded Systems With Rust And Asynchronous Programming

Embassy is the next-generation framework for embedded applications. Write safe, correct and energy-efficient embedded code…

3 days ago

AttackRuleMap : Bridging Adversary Simulations And Detection Rules For Enhanced Cybersecurity

This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules,…

3 days ago