>_SSRF Probe
Automated Server-Side Request Forgery detection and exploitation tool with cloud metadata endpoint testing built-in.
Key Features
- Automatic SSRF Detection: Tests common SSRF injection points across URL, header, and body parameters
- Cloud Metadata Probing: Built-in payloads for AWS IMDSv1/v2, GCP, and Azure metadata endpoints
- Blind SSRF Detection: Uses OOB callbacks to detect blind SSRF where response isn't reflected
- Protocol Smuggling: Tests file://, gopher://, dict://, and ftp:// scheme injections
Example Usage
odivex-tools ssrf --url https://target.com/api/fetchodivex-tools ssrf --url https://target.com/api/fetch --probe cloud-metadataodivex-tools ssrf --url-file endpoints.txt --probe allSetup
Install via the OdiVex CLI framework:
npm install -g odivex-toolsWhat is SSRF?
Server-Side Request Forgery (SSRF) occurs when an attacker can induce a server to make HTTP requests to an arbitrary destination. In cloud environments, this is particularly dangerous because it enables access to instance metadata services that expose temporary credentials.
Why This Tool Exists
Manual SSRF testing is tedious. You need to test dozens of endpoints, multiple protocols, and dozens of cloud-specific payloads. SSRF Probe automates the heavy lifting so you can focus on exploiting confirmed findings.
Cloud Metadata Exploitation
When SSRF is confirmed in AWS:
# Retrieve IAM credentials from IMDSv1
odivex-tools ssrf --url "[https://vulnerable.com/fetch?url=INJECT](https://vulnerable.com/fetch?url=INJECT)" \
--probe aws-imds --extract credentials
Related Intelligence
Further exploration based on cross-referenced content.
JWT Attacks: A Complete Practitioner''s Guide
From alg:none bypasses to RS256→HS256 confusion attacks — every JWT vulnerability explained with working payloads.
SSRF via Misconfigured OAuth Callback
A Server-Side Request Forgery vulnerability in the OAuth callback handler allows attackers to redirect callbacks to internal network endpoints.
Cloud Enum
Multi-cloud asset enumeration for AWS, GCP, and Azure. Discovers exposed S3 buckets, public function endpoints, and misconfigured IAM.