An easy to use point-and-shoot web fuzzer to quickly identify crashes and weird behaviours.
It's purpose is to point your attention to parameters, headers etc. which may prove to be vulnerable upon further analysis.
Save requests of interest in files (for example by using burp's 'save to file' feature) and point haze to fuzz all the parameters and headers with predefined payloads. All responses identified as crashes will be reported.
haze -t https://targetapp.local burp_reqs/*.txt
You can also browse the app without burp and save requests as .har
files with DevTools. Haze will fuzz only those requests which urls match the target (-t
).
haze -t https://tragetapp.local -har hars/*.har
USAGE:
haze [OPTION]... [REQUEST_FILE]...
ARGS:
REQUEST_FILE File(s) containing the raw http request(s)
in case of .har files pass the -har flag
only the har entries which match the target (-t) value will be fuzzed
GENERAL:
-host, -t Target host (protocol://hostname:port)
-probe, -p Send the probe request only. (Default: false)
-output, -o Directory where the report will be created. (Default: cwd)
-threads, -th Number of threads to use for fuzzing. (Default: 10)
-proxy, -x Proxy address
-har Indicate that the request files are in the har format. (Default: false)
-cookies, -c Cookies string. This will replace `Cookie:` header read from request files
-header, -H Header string. It overwrites headers that are already present in request files.
You can provide multiple values: `-H 'Foo: foo' -H 'Bar: bar'`.
MATCHERS:
-mc Comma-separated list of response codes to report. (Default: 500-599)
-ml Comma-separated list of response lengths to report
-ms A string to match in response
FILTERS:
-fc Comma-separated list of response codes to not report
-fl Comma-separated list of response lengths to not report
-fs A string to filter in response