LazyCSRF is a more useful CSRF PoC generator that runs on Burp Suite.
Motivation
Burp Suite is an intercepting HTTP Proxy, and it is the defacto tool for performing web application security testing. The feature of Burp Suite that I like the most is Generate CSRF PoC
. However, the function to automatically determine the content of request is broken, and it will try to generate PoC using form
even for PoC that cannot be represented by form
, such as cases using JSON for parameters or PUT requests. In addition, multibyte characters that can be displayed in Burp Suite itself are often garbled in the generated CSRF PoC. These were the motivations for creating LazyCSRF.
Difference in display of multibyte characters
The following image shows the difference in the display of multibyte characters between Burp’s CSRF PoC generator and LazyCSRF. LazyCSRF can generate PoC for CSRF without garbling multibyte characters. This is only the case if the characters are not garbled on Burp Suite.
Installation
Download the JAR from GitHub Releases. In Burp Suite, go to the Extensions tab in the Extender tab, and add a new extension. Select the extension type Java
, and specify the location of the JAR.
You can generate a CSRF PoC by selecting Extensions
->LazyCSRF
->Generate CSRF PoC By LazyCSRF
from the menu that opens by right-clicking on Burp Suite.
How To Build
If you use IntelliJ IDEA, you can build it by following Build
-> Build Artifacts
-> LazyCSRF:jar
-> Build
.
You can build it with maven.
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…