Discover and explore top open-source AI tools and projects—updated daily.
Web form fuzzing automation tool
Top 84.8% on SourcePulse
BrowserBruter is a Python-based web application security testing tool that automates web form fuzzing by directly controlling browser interactions. It is designed for penetration testers and security professionals seeking to identify vulnerabilities in web applications, particularly in scenarios where traditional proxy-based tools struggle with encrypted traffic or client-side logic.
How It Works
BrowserBruter leverages Selenium and Selenium-Wire to simulate user interactions within a web browser. This approach allows it to fuzz web forms by injecting payloads directly into browser input fields, mimicking manual testing. This method bypasses the need to decrypt or manipulate HTTP traffic, enabling fuzzing of encrypted payloads, client-side validated inputs (like OTPs), and scenarios where no HTTP traffic is generated. It also simplifies session management and CSRF handling.
Quick Start & Requirements
uv
utility (curl -LsSf https://astral.sh/uv/install.sh | sh
) and then run uv run BrowserBruter.py --help
.uv
is used. Detailed installation guide available at https://net-square.com/browserbruter/SetupInstallation/.Highlighted Details
Maintenance & Community
The project is open-source and welcomes community contributions via GitHub pull requests and issue reporting. Key contributors include Jafar Pathan, Ravi Kumar Paghdal, Jatan Raval, and Saumil Shah.
Licensing & Compatibility
Licensed under the Microsoft Public License (MS-PL). However, a legal warning states that the software is protected under the Indian Copyright Act and its use, reproduction, distribution, modification, etc., is strictly prohibited without prior written consent from Net Square Solutions Private Limited. This creates a significant ambiguity for commercial or closed-source use.
Limitations & Caveats
The license terms present a significant ambiguity and potential restriction for commercial or closed-source integration, despite the MS-PL. The tool allows execution of third-party Python and JavaScript code, with a strong disclaimer warning users of potential risks like data corruption, security breaches, and system instability, placing full responsibility on the user.
5 days ago
Inactive