SSRFmap is a specialized security tool designed to automate the detection and exploitation of Server Side Request Forgery (SSRF) vulnerabilities. It takes as input a Burp request file and a user-specified parameter to fuzz, enabling you to fast-track the identification of SSRF attack surfaces. It includes multiple exploitation “modules” for common SSRF-based attacks or pivoting techniques, such as DNS zone transfers, MySQL/Postgres command execution, Docker API info leaks, and network scans. Because SSRF often leads to lateral movement or internal network access, SSRFmap is especially useful for red-teamers and pentesters who want to explore chains rather than just the vulnerability surface. The repository also demonstrates a pragmatic mindset; rather than just “find SSRF”, it tries to “exploit SSRF” for impact, helping security testers build full end-to-end workflows.
Features
- Accepts Burp request files as fuzzing input
- Module-based exploitation for SSRF chains (e.g., DNS AXFR, database RCE)
- Parameter fuzzing for user-specified URL parameters
- Internal network and port scanning capabilities built-in
- Supports exploiting service-APIs (Redis, Docker, MySQL, Postgres) via SSRF pivoting
- Command-line driven integration with pentest workflows