/Project-Forgery

A tool for generating Cross-Site Request Forgery (CSRF) exploit HTML for security testing

Primary LanguagePython

PROJECT FORGERY

An Automated CSRF Exploit Generator

A tool for generating Cross-Site Request Forgery (CSRF) exploit HTML for security testing.

Table of Contents

Walkthrough Article

https://medium.com/@enessyibrahim/project-forgery-automating-csrf-exploit-generation-fd953ca8186a

About

The CSRF Exploit Generator is a security testing tool designed to assist in the identification and testing of Cross-Site Request Forgery (CSRF) vulnerabilities in web applications. It simplifies the process of generating CSRF exploit HTML for both POST and GET requests.

Why CSRF Exploit Generator?

Web applications are susceptible to CSRF attacks when they trust requests made by authenticated users without proper verification. To uncover these vulnerabilities, security professionals and developers often need to craft CSRF exploits. The CSRF Exploit Generator streamlines this process, making it easier to demonstrate and test the potential impact of CSRF vulnerabilities.

Key Features

  • Automatic HTML Generation: Quickly create CSRF exploit HTML for POST and GET requests.
  • Parameter Customization: Customize parameter names and values to match your target application.
  • User-Friendly Interface: The command-line tool provides an easy-to-use interface for generating exploits.

Whether you're a security researcher, penetration tester, or developer, the CSRF Exploit Generator is a valuable addition to your security testing toolkit.

Installation

pip install -r requirements.txt

Usage

python3 csrf_script.py

POST Request Usage

image

GET Request Usage

image

POST Request Exploit Script

image

GET Request Exploit Script

image