Skip to content

Instantly share code, notes, and snippets.

@mvc1009
Last active December 21, 2023 20:52
Show Gist options
  • Save mvc1009/05d5dec78a583f0656e2466365d902c6 to your computer and use it in GitHub Desktop.
Save mvc1009/05d5dec78a583f0656e2466365d902c6 to your computer and use it in GitHub Desktop.
Python fuzzer useful in combination with iis-shortnames-scanner
#!/usr/bin/env python3
# Algorithm https://stackoverflow.com/a/68624309
import sys, os, requests
from itertools import combinations_with_replacement
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
s = requests.Session()
url="https://meddigi.htb/"
extension = ".json"
start = "APPSET"
max_length = 5
# only lower case due to we are targetting a IIS
characters = "abcdefgijklmnopqrstuvwxyz1234567890._-( )"
print("[!] Starting fuzzing")
for r in range(1, max_length+1):
for combo in combinations_with_replacement(characters, r=r):
r = s.get(url + start + ''.join(combo) + extension, verify=False, allow_redirects=False)
print("Fuzzing: %s - %s " % (start + ''.join(combo) + extension, r.status_code ))
if (r.status_code == 200):
print("[+] Found: %s" %(url + start + ''.join(combo) + extension))
sys.exit()
print("[!] Ending fuzzing")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment