EN
ENNA

CRLFuzz vs DalFox

GitHub Stats

1.5k
Stars
4.9k
146
Forks
517
1
Issues
36
13d ago
Updated
2d ago
MIT
License
MIT
Go
Language
Go

About CRLFuzz

CRLFuzz is a fast tool to scan CRLF (Carriage Return Line Feed) injection vulnerabilities, written in Go. CRLF injection occurs when an attacker can inject \r\n characters into HTTP headers, potentially leading to HTTP response splitting, cache poisoning, cross-site scripting, and session fixation. CRLFuzz tests URLs by injecting CRLF payloads into various positions (query parameters, path, headers) and detecting whether the injected characters appear in the HTTP response headers. It supports reading URLs from stdin (integrating seamlessly with tools like httpx, waybackurls, and gau), concurrent scanning with configurable threads, custom payloads, and output in multiple formats. CRLFuzz is a focused, single-purpose scanner that does one thing well - finding CRLF injection - making it a reliable component in automated vulnerability scanning pipelines.

About DalFox

DalFox is a powerful tool for parameter analysis and detecting cross-site scripting (XSS) vulnerabilities. Built in Go, it automates the generation of payloads and supports DOM-based detection techniques, making it suitable for both reflected and stored XSS. The tool's pipeline support allows for seamless integration into testing workflows. DalFox stands out due to its speed and efficiency in identifying complex XSS vectors across various web applications.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

CRLFuzz only

crlf-injectionresponse-splittingheader-injectionscanner

DalFox only

xssparameter-analysisdom-xssreflected-xss