[New Tool] 0d1n v1.0 Web App Bruteforcer and Fuzzer Released
![[New Tool] 0d1n v1.0 Web App Bruteforcer and Fuzzer Released](https://toolswatch.org/wp-content/uploads/2014/09/logo_GitHub.jpg)
0d1n is an open source web application bruteforcer and fuzzer, the main objective is automate exhaustive tests to search anomalies, at other point view this anomalies can be a vulnerability, these test can follow web parameters, files, directories, forms and other things. 0d1n is licensed under GPLv3.
Requirements:
- Need ”GCC” and ”make”
- You must install ”libcurl”
- Search libcurl-devel or libcurl-dev in your portage
- Current version tested only Unix Like systems(Linux, MacOS and *BSD).
Examples:
Brute path: $ ./0d1n --host 'http://host/find.php?search=!&type=^' --payloads payloads/xss-rsnake.txt -find_string_list response2find/find.txt --log out_data22
Brute GET n Find string: $ ./0d1n --host 'http://coolerlab.wordpress.com/^' --payloads test_list1 --find_string_list find_list_one --log thunder27
More Information:
[button size=large style=round color=red align=none url=https://github.com/CoolerVoid/0d1n]Download 0d1n v1.0[/button]
Thanks to our friend Antonio Costa (a.k.a “Cooler_“) for sharing this tool with us 😉