EN
ENNA

CRLFuzz

MIT

๐Ÿ•ธ Web Scanning ยท Go

CRLFuzz is a fast tool to scan CRLF (Carriage Return Line Feed) injection vulnerabilities, written in Go. CRLF injection occurs when an attacker can inject \r\n characters into HTTP headers, potentially leading to HTTP response splitting, cache poisoning, cross-site scripting, and session fixation. CRLFuzz tests URLs by injecting CRLF payloads into various positions (query parameters, path, headers) and detecting whether the injected characters appear in the HTTP response headers. It supports reading URLs from stdin (integrating seamlessly with tools like httpx, waybackurls, and gau), concurrent scanning with configurable threads, custom payloads, and output in multiple formats. CRLFuzz is a focused, single-purpose scanner that does one thing well - finding CRLF injection - making it a reliable component in automated vulnerability scanning pipelines.

1.5kstars
146forks
1issues
Updated 13d ago

Installation

Go

$ go install github.com/dwisiswant0/crlfuzz/cmd/crlfuzz@latest

brew (macOS)

$ brew install crlfuzz

Use Cases

  • Scanning URLs for CRLF injection vulnerabilities in automated pipelines
  • Detecting HTTP response splitting in query parameters and path components
  • Integrating with subdomain and URL discovery tools for large-scale scanning
  • Testing web application header handling for injection weaknesses

Tags

crlf-injectionresponse-splittingheader-injectionscannergogolangvulnerability-scannervulnerability-scanning

More in Web Scanning