Working with See-SURF Tool on Kali Linux OS

Example 1: Run with default threads=10, no cookies/session, and NO verbose mode 

python3 see-surf.py -H https://www.google.com

This is the basic usage of the See-SURF tool.

Example 2: Space separate Cookies can be supplied for an authenticated session crawling 

python3 see-surf.py -H https://www.google.com -c cookie_name1=value1 cookie_name2=value2

We can pass the cookies values in the -c flag.

Example 3: Supplying no. of threads and verbose mode (Verbose Mode Is Not Recommended If You Don’t Want To Spend Longer Time But The Possibility Of Bug Finding Increases)

python3 see-surf.py -H https://www.google.com -c cookie_name1=value1 cookie_name2=value2 -t 20 -v

For getting the output in a more readable format we can use the -v flag.


See-SURF – Python Based Scanner To Find Potential SSRF Parameters

SSRF(Server-side request forgery) is a trending vulnerability identified in most web applications in which attackers can cause server-side applications to make HTTP requests to arbitrary domains or subdomains. See-SURF tool is an automated approach cyber security tool that can find the potential SSRF parameters in the web application by crawling the website. This tool is developed in the Python language and is also available on the GitHub platform for free. This tool can be used as a scanner in the phase of Vulnerability Scanning.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Similar Reads

Installation of See-SURF Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system....

Working with See-SURF Tool on Kali Linux OS

Example 1: Run with default threads=10, no cookies/session, and NO verbose mode...

Contact Us