Skip to content

r1z4x/OWASPAttackSimulator

Repository files navigation

OWASPAttackSimulator

Go Version Node Version License

A comprehensive security testing framework with attack infrastructure, featuring CLI support and OWASP vulnerability detection.

Features

  • Direct Attack Testing: Run attacks against target URLs with configurable payloads and variations
  • Scenario-based Testing: Execute YAML-based scenarios with automatic session management
  • Comprehensive Testing: XSS, SQLi, SSRF, XXE, CSRF, CORS, AuthZ, and more
  • Multiple Outputs: HTML, JSON, and text report formats
  • Docker Support: Containerized deployment with Docker Compose

Quick Installation

Prerequisites

  • Go 1.23+
  • Node.js 18+
  • SQLite 3

From Source

git clone [email protected]:r1z4x/OWASPAttackSimulator.git
cd OWASPAttackSimulator
make install-deps
make build

Using Docker

docker-compose up -d

Quick Start

# Run a direct attack
simulation attack --target https://target.app

# Run a scenario
simulation scenario --file configs/scenarios/login_attack.yaml

# Generate a report
simulation report --format html --output security_report.html

Documentation

CLI Commands

# Direct attack
simulation attack --target <url> [--payload-set <set>] [--variation-set <sets>]

# Scenario execution
simulation scenario --file <scenario.yaml> [--workers <n>] [--timeout <duration>]

# Report generation
simulation report --format <html|json|text> --output <file>

# gRPC server
simulation server [--port <port>]

Configuration

Configuration is managed through configs/defaults.yaml with environment variable overrides:

export SIMULATION_CONFIG=/path/to/config.yaml
export SIMULATION_DB_PATH=/path/to/database.db
export SIMULATION_LOG_LEVEL=debug

Testing

make test
make test-unit
make test-integration

Contributing

We welcome contributions! Please see our Contributing Guide for details.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Support


⚠️ Legal Notice: This tool is for authorized security testing only. Always obtain proper authorization before testing any system. The authors are not responsible for any misuse of this software.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published