pphack: The Most Advanced Client-Side Prototype Pollution Scanner

Client-Side Prototype Pollution Scanner

pphack

pphack is a CLI tool for scanning websites for client-side prototype pollution vulnerabilities.

Feature

  • Fast (concurrent workers)
  • Default payload covers a lot of cases
  • Payload and Javascript customization
  • Proxy-friendly
  • Support output in a file
  • Rate-limit supported

Install

go install github.com/edoardottt/pphack/cmd/pphack@latest

Use

Print the help

pphack -h

Scan a single URL

pphack -u https://edoardottt.github.io/pp-test/

echo https://edoardottt.github.io/pp-test/ | pphack

Scan a list of URLs

pphack -l targets.txt

cat targets.txt | pphack

Change the concurrency level (default 50)

pphack -u https://edoardottt.github.io/pp-test/ -c 20

Change the connection timeout value (default 10 seconds)

pphack -u https://edoardottt.github.io/pp-test/ -t 20

Use a Proxy

pphack -u https://edoardottt.github.io/pp-test/ -px http://127.0.0.1:8080

Set a rate limit (requests per second)

pphack -u https://edoardottt.github.io/pp-test/ -rl 10

Set a custom User Agent (random by default)

pphack -u https://edoardottt.github.io/pp-test/ -ua “Test User Agent”

Use a custom payload
The default is random (e.g. nqapst)

pphack -u https://edoardottt.github.io/pp-test/ -p injection

Run custom Javascript on target (to verify the target is vulnerable)
Default is window. + payload (e.g. window.nqapst)

pphack -u https://edoardottt.github.io/pp-test/ -js “console.log(3)”

Run custom Javascript on target using a file (to verify the target is vulnerable)

pphack -u https://edoardottt.github.io/pp-test/ -jsf custom.js

Write output in a file

pphack -u https://edoardottt.github.io/pp-test/ -o result.txt

Verbose output

pphack -u https://edoardottt.github.io/pp-test/ -v

Print only results (silent)

pphack -u https://edoardottt.github.io/pp-test/ -s

Copyright (c) 2024 Edoardo Ottavianelli

Source: https://github.com/edoardottt/