Vulnerability Analysiscrlfvulnerabilityscannerfuzzinggo

CRLFuzz

Fast tool to scan CRLF vulnerabilities written in Go. CRLFuzz scans for CRLF vulnerabilities in a fast way using Go.

Description

CRLFuzz is a specialized tool designed to detect CRLF (Carriage Return Line Feed) vulnerabilities, which can lead to HTTP response splitting and other web-based attacks. It performs fuzzing on target URLs to identify injection points where CRLF sequences can manipulate server responses.

Use cases include penetration testing web applications, auditing HTTP headers, and identifying misconfigurations in web servers that allow CRLF injection. The tool is particularly useful for security researchers and pentesters scanning for these specific vulnerabilities at scale.

Developers emphasize caution, noting users are responsible for their actions and the tool assumes no liability for misuse or damage.

How It Works

CRLFuzz fuzzes HTTP requests to target URLs or lists of URLs by injecting CRLF sequences into various parts of the request, such as headers or data payloads. It uses concurrency for speed, defaulting to 20 threads, and supports custom methods, headers, proxies, and data. The tool analyzes responses for signs of CRLF injection success, like unauthorized header injection or response splitting.

Installation

bash
sudo apt install crlfuzz

Flags

-u, --url <URL>Define single URL to fuzz
-l, --list <FILE>Fuzz URLs within file
-X, --method <METHOD>Specify request method to use (default: GET)
-o, --output <FILE>File to save results
-d, --data <DATA>Define request data
-H, --header <HEADER>Pass custom header to target
-x, --proxy <URL>Use proxy to fuzz
-c, --concurrent <i>Set the concurrency level (default: 20)

Examples

Display help and usage information for the tool
crlfuzz -h
Fuzz a single URL for CRLF vulnerabilities
crlfuzz -u https://example.com
Fuzz multiple URLs from a file
crlfuzz -l urls.txt
Fuzz a URL using POST method
crlfuzz -u https://example.com -X POST
Fuzz a URL and save results to file
crlfuzz -u https://example.com -o results.txt
Fuzz with custom request data including CRLF
crlfuzz -u https://example.com -d "param=value\r\nInjected: header"
Fuzz with custom header
crlfuzz -u https://example.com -H "Custom: value"
Fuzz through proxy with increased concurrency
crlfuzz -u https://example.com -x http://proxy:8080 -c 50
Updated 2026-04-16kali.org ↗