A fast tool to scan CRLF vulnerability written in Go
quay.io/trickest/crlfuzz:a797092
-x
Use specified proxy to fuzz-u
Define single URL to fuzz-d
Define request data-H
Pass custom header to target-X
Specify request method to use( default: GET)-l
Fuz URLs within file-c
Set the concurrency level (default: 25)-s
See only vulnerable targets