Metadata-Version: 2.1
Name: OOB Fuzz
Version: 0.1.0
Summary: Conduct OOB Fuzzing of targets with payloads towards callback server
Home-page: https://github.com/CasperGN/oobfuzz
Author: Casper G. Nielsen
Author-email: whopsec@protonmail.com
License: UNKNOWN
Description: # oobfuzz
        [![FOSSA Status](https://app.fossa.com/api/projects/git%2Bgithub.com%2FCasperGN%2Foobfuzz.svg?type=shield)](https://app.fossa.com/projects/git%2Bgithub.com%2FCasperGN%2Foobfuzz?ref=badge_shield) [![Total alerts](https://img.shields.io/lgtm/alerts/g/CasperGN/oobfuzz.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/CasperGN/oobfuzz/alerts/) [![Language grade: Python](https://img.shields.io/lgtm/grade/python/g/CasperGN/oobfuzz.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/CasperGN/oobfuzz/context:python) [![GitHub stars](https://img.shields.io/github/stars/CasperGN/oobfuzz)](https://github.com/CasperGN/oobfuzz/stargazers) [![GitHub forks](https://img.shields.io/github/forks/CasperGN/oobfuzz)](https://github.com/CasperGN/ActiveDirectoryEnumeration/network) [![GitHub license](https://img.shields.io/github/license/CasperGN/oobfuzz)](https://github.com/CasperGN/oobfuzz/blob/master/LICENSE)
        
        
        Conduct OOB Fuzzing of targets with payloads towards callback server
        
        *Brought to you with courtesey of **Team Entropy**, with :heart: from*  
        [@ninposec](https://github.com/ninposec), [@mortensteenrasmussen](https://github.com/mortensteenrasmussen) & [@CasperGN](https://github.com/CasperGN)
        
        ## Installation
        
        Run installation via setup:
        ```
        $ sudo -H python3 -m pip install .
        ```
        
        **Reasoning:**  
        OOBFuzz requires [GAU](https://github.com/lc/gau) to run. As such, we need to `apt-get install golang` and fetch the binary with `go get` and move it into `/usr/bin`.
        This requires root permissions (unless obscure suid perhaps?) in order to do so. 
        If in doubt, please chech [setup.py](setup.py) to ensure that nothing malicious is happening.
        
        ## Run
        
        Update the payloads folder containing your own payloads.
        
        Most often want to run as such:  
        ```
        $ python3 fuzzer.py --targets targets.txt --threads 17
        ```
        
        ## External libs and thanks
          
        - [GAU](https://github.com/lc/gau)
        
        
        ## License
        [![FOSSA Status](https://app.fossa.com/api/projects/git%2Bgithub.com%2FCasperGN%2Foobfuzz.svg?type=large)](https://app.fossa.com/projects/git%2Bgithub.com%2FCasperGN%2Foobfuzz?ref=badge_large)
        
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Requires-Python: >=3.4
Description-Content-Type: text/markdown
