__ __ __ __
| \ _ | \| \ | \
| $$ / \ | $$ \$$ ______ ______ __ __ ______ ____ \$$ ________ ______ ______
| $$/ $\| $$| \ / \ / \ | \ | \| \ \ | \| \ / \ / \
| $$ $$$\ $$| $$| $$$$$$\| $$$$$$\| $$ | $$| $$$$$$\$$$$\| $$ \$$$$$$$$| $$$$$$\| $$$$$$\
| $$ $$\$$\$$| $$| $$ | $$| $$ | $$| $$ | $$| $$ | $$ | $$| $$ / $$ | $$ $$| $$ \$$
| $$$$ \$$$$| $$| $$__| $$| $$__| $$| $$__/ $$| $$ | $$ | $$| $$ / $$$$_ | $$$$$$$$| $$
| $$$ \$$$| $$ \$$ $$ \$$ $$ \$$ $$| $$ | $$ | $$| $$| $$ \ \$$ \| $$
\$$ \$$ \$$ _\$$$$$$$ _\$$$$$$$ \$$$$$$ \$$ \$$ \$$ \$$ \$$$$$$$$ \$$$$$$$ \$$
| \__| $$| \__| $$ Web Traffic 4nalizer
\$$ $$ \$$ $$
\$$$$$$ \$$$$$$
Wiggumizer is a tool designed for security researchers, penetration testers, and ethical hackers. It is equped with list of pasive checks to identify potential security vulnerabilities in a Web Application. It anaylises history exported from Web Proxy (only Burp Suite is currently supported) to identify potential security vulnerabilities, enabling users to focus their investigative efforts efficiently. As well it has fuzzer module, that allowes to fuzz all endpoints/parameters at once.
Wiggumizer is intended to be used exclusively for ethical and legitimate purposes, such as security assessments, penetration testing, and vulnerability research. Any use of Wiggumize for malicious, unauthorized, or unethical activities is strictly prohibited.
By using Wiggumizer, you acknowledge and agree to adhere to all applicable laws and regulations governing your activities. You are solely responsible for obtaining proper authorization before conducting security assessments on any systems, networks, or applications. The developers and maintainers of Wiggumize disclaim any liability for any misuse, damage, or legal consequences resulting from the misuse of this tool.
Web Traffic 4nalizer
Usage:
wiggumizer [flags]
wiggumizer [command]
Available Commands:
fuzz fuzz all endpoint from history
help Help about any command
scan scan analysis web history and run list of checks on Req\Res body and headers
search powerfull search in browse history
Flags:
-h, --help help for Wiggumize
-V, --version print version
-w, --workers int amount of workers (default 5)
Use "wiggumizer [command] --help" for more information about a command.
In scan mode, Wiggumizer analysis web history and run list of checks on Req\Res body and headers. The result of checks saved in md
format (default file: report.md
).
- LFI Checker: This module is searching for filenames in request parameters. Could be an indication of possible LFI
- Redirect Checker: This module is searching for Redirects
- Secret Checker: This module lokking for sensitive information, such as API keys
- SSRF Checker: This module is searching for URL in request parameters.
- Subdomain Checker: This module is searching for 404 messages form hosting platformas
- XML Checker: This module is searching for XML in request parameters
This module builds map of endpoints and parameters from proxy history file to fuzz.
Usage:
wiggumizer fuzz [flags]
Flags:
--excludeParam strings exclude specific parameters from fuzz
--headers strings replace header if exists, add if it wasn't in original request
-h, --help help for fuzz
-f, --historyFile string path to history file
-m, --maxReq int max amount of requests per second
--parameters strings fuzz only specified parameters
-p, --proxy string proxy
-v, --verbose verbose mode
-l, --wordlist string wordlits to fuzz
Global Flags:
-w, --workers int amount of workers (default 5)
wiggumizer fuzz -f history.xml -m 100 -w 150 -l fuzz.txt -p http://127.0.0.1:8080 --headers="User-Agent: wiggumizer" --headers="X-Custom: wiggumizer"
- No result report. Use proxy to analyse responses
- If body contains list of json objects (example below), only first object is fuzzed
[
{"foo": "bar"},
{"foo": "bar1"}
]
It allows for powerfull search in browse history.
Method
ReqHeader
ReqContentType
ReqBody
ResHeader
ResContentType
ResBody
&
- AND!
- NOT
-i
- Case insensitive search-br
- brief output (only list uniq endpoints)-h
- only headers in output-f
- full output
Search for requests that satisfy the following criteria:
- Request method is POST
- Request body contains the term "admin"
- Response content type is not HTML
- Response body contains the term "success"
Make search case insensitive and output only list uniq endpoints.
ReqMethod POST & ReqBody *admin* & ! ResContentType HTML & ResBody success -br -i