LazyCSRF is a more useful CSRF PoC generator that runs on Burp Suite.
Motivation
Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. The feature of Burp Suite that I like the most is Generate CSRF PoC
. However, the function to automatically determine the content of request is broken, and it will try to generate PoC using form
even for PoC that cannot be represented by form
, such as cases using JSON for parameters or PUT requests. In addition, multibyte characters that can be displayed in Burp Suite itself are often garbled in the generated CSRF PoC. These were the motivations for creating LazyCSRF.
Difference in display of multibyte characters
The following image shows the difference in the display of multibyte characters between Burp’s CSRF PoC generator and LazyCSRF. LazyCSRF can generate PoC for CSRF without garbling multibyte characters. This is only the case if the characters are not garbled on Burp Suite.
Installation
Download the JAR from GitHub Releases. In Burp Suite, go to the Extensions tab in the Extender tab, and add a new extension. Select the extension type Java
, and specify the location of the JAR.
You can generate a CSRF PoC by selecting Extensions
->LazyCSRF
->Generate CSRF PoC By LazyCSRF
from the menu that opens by right-clicking on Burp Suite.
How To Build
If you use IntelliJ IDEA, you can build it by following Build
-> Build Artifacts
-> LazyCSRF:jar
-> Build
.
You can build it with maven.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…