An automated SSRF finder. Just give the domain name and your server and chill! 😉 It also has options to find XSS and open redirects.
Syntax
./ssrfire.sh -d domain.com -s yourserver.com -f custom_file.txt -c cookies
domain.com —> The domain for which you want to test
yourserver.com —> Your server which detects SSRF. Eg. Burp collaborator
custom_file.txt —> Optional argument. You give your own custom URLs instead of using gau
cookies —> Optional argument. To send requests as an authenticated user
If you don’t have burpsuite professional, you can use interact sh by the awesome projectdiscovery team as your server.
Requirements
Since this uses GAU, FFUF, qsreplace and OpenRedirex, you need GO and python 3.7+. You need not have the tools installed, as the script setup.sh will install everything. You just need to install python and GO. Even if you have the tools installed I would highly recommend you to install them again so that there no conflicts while setting the paths.
If you don’t want to install the tools again, paste this code in your .profile in your home directory and source .profile them. Also, you have to make a small change in the ssrfire.sh on line 10, where you have to replace source /home/hari/.profile without your .profile path. (Only if you are not installing tools through setup.sh)
<div class="snippet-clipboard-content position-relative overflow-auto" data-snippet-clipboard-copy-content="#Replace /path/to/ with the specific directory where the tool is installed #If you already have configured paths for any of the tools, replace that code with the below one. ffuf(){ echo "Usage: ffuf https://www.domain.com/FUZZ payloads.txt" /path/to/ffuf/./main -u $1 -w $2 -b $3 -c -t 100 } gau(){ echo "Usage: gau domain.com" /path/to/gau/./main $1 } gau_s(){ /path/to/gau/./main –subs $1 } openredirex(){ echo "Usage: openredirex urls.txt payloads.txt" python3 /path/to/OpenRedireX/openredirex.py -l $1 -p $2 –keyword FUZZ } qsreplace(){ /path/to/qsreplace/./main $1 }”>
#Replace /path/to/ with the specific directory where the tool is installed
#If you already have configured paths for any of the tools, replace that code with the below one.
ffuf(){
echo "Usage: ffuf https://www.domain.com/FUZZ payloads.txt"
/path/to/ffuf/./main -u $1 -w $2 -b $3 -c -t 100
}gau(){
echo "Usage: gau domain.com"
/path/to/gau/./main $1
}
gau_s(){
/path/to/gau/./main --subs $1
}
openredirex(){
echo "Usage: openredirex urls.txt payloads.txt"
python3 /path/to/OpenRedireX/openredirex.py -l $1 -p $2 --keyword FUZZ
}
qsreplace(){
/path/to/qsreplace/./main $1
}