
CRLFuzz is a powerful tool used for detecting and exploiting vulnerabilities that arise from the presence of Carriage Return (CR) and Line Feed (LF) characters in web applications. These vulnerabilities can lead to serious security issues such as session hijacking, cross-site scripting (XSS) attacks (use Dalfox to automatically scan and exploit XSS vulnerability), and remote code execution (RCE).
How CRLFUZZ works
CRLFuzz works by sending specially crafted HTTP requests to the target web application that contain CR and LF characters in specific locations. The tool then analyzes the responses from the web server to determine whether the presence of these characters has caused any unexpected behavior.
One of the main use cases for CRLFuzz is in detecting CRLF injection vulnerabilities. These types of vulnerabilities arise when an attacker can inject CR and LF characters into an HTTP response header or body, which can then be interpreted by the client in unexpected ways. For example, an attacker could inject a CR and LF sequence into a response header to trick a client into setting a new cookie value, which the attacker can then use to hijack the victim’s session.
Features
CRLFuzz also has a number of other features that make it a useful tool for web application security testing. For example, it can be used to:
- Test for XSS vulnerabilities by injecting script tags containing CR and LF characters into input fields and analyzing the resulting response.
- Also be used to test for RCE vulnerabilities by injecting shell commands into HTTP headers or parameters and analyzing the response.
One of the advantages of CRLFuzz is that it is easy to use, and does not require any advanced technical knowledge. The tool is designed to be user-friendly and intuitive, with a simple command-line interface and a range of options and settings that can be customized to suit the needs of the user.
CRLFuzz Installation
from Binary
The installation is easy. You can download a prebuilt binary from releases page, unpack and run! or with
from Source
If you have go1.13+ compiler installed and configured:
In order to update the tool, you can use -u
flag with go get command.
from GitHub
How to Use CRLFuzz

Basic Usage
Single URL:
URLs from list:
from Stdin
In case you want to chained with other tools.
And also you can set request method like GET or POST. Here is the list of command for CRLFuzz:
Flag | Description |
---|---|
-u, –url | Define single URL to fuzz |
-l, –list | Fuzz URLs within file |
-X, –method | Specify request method to use (default: GET) |
-o, –output | File to save results |
-d, –data | Define request data |
-H, –header | Pass custom header to target |
-x, –proxy | Use specified proxy to fuzz |
-c, –concurrent | Set the concurrency level (default: 25) |
-s, –silent | Silent mode |
-v, –verbose | Verbose mode |
-V, –version | Show current version |
-h, –help | Display its help |