From 05cb09b5ea9b2440b61abab9bb720909672727c5 Mon Sep 17 00:00:00 2001 From: Will Pennell Date: Sat, 5 Apr 2014 10:25:56 -0400 Subject: [PATCH] Adding powerfuzzer --- tools/powerfuzzer.md | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 tools/powerfuzzer.md diff --git a/tools/powerfuzzer.md b/tools/powerfuzzer.md new file mode 100644 index 0000000..4f14281 --- /dev/null +++ b/tools/powerfuzzer.md @@ -0,0 +1,29 @@ +# powerfuzzer + +Notes +------- +Powerfuzzer is a highly automated and fully customizable web fuzzer (HTTP protocol based application fuzzer) based on many other Open Source fuzzers available and information gathered from numerous security resources and websites. It was designed to be user friendly, modern, effective and working. + +Don't have a clue what a Fuzzer/Fuzz testing is ? Not a problem, read on [here](http://en.wikipedia.org/wiki/Fuzz_testing) + +Currently, it is capable of identifying these problems: +- Cross Site Scripting (XSS) +- Injections (SQL, LDAP, code, commands, and XPATH) +- CRLF +- HTTP 500 statuses (usually indicative of a possible misconfiguration/security flaw incl. buffer overflow) + +Designed and coded to be modular and extendable. Adding new checks should simply entail adding new methods. + + +Help Text +------- +``` +Text output goes here +``` + +Example Usage +------- + +Links +------- +http://www.powerfuzzer.com/