Advanced Automation Fuzzing Tool for Vulnerability Discovery
VoidFuzzer is a professional automation fuzzing tool designed for offensive security professionals, bug bounty hunters, and penetration testers.
It automates the process of:
- URL collection
- Parameter discovery
- Live endpoint filtering
- Automated vulnerability scanning
VoidFuzzer integrates multiple powerful security tools into one automated workflow.
✔ Automated URL collection
✔ Query parameter discovery
✔ Live endpoint filtering
✔ Automated vulnerability scanning using nuclei
✔ Parallel processing for faster execution
✔ Fully automated fuzzing pipeline
✔ Designed for bug bounty & pentesting
VoidFuzzer performs the following steps automatically:
Uses:
gau
to collect historical URLs from multiple sources.
Uses:
uro
to extract only fuzzable URLs containing parameters.
Example:
https://example.com/page?id=123
Uses:
httpx-toolkit
to verify which URLs are alive.
Dead endpoints are removed.
Uses:
nuclei
to perform automated DAST scanning.
Detects:
- XSS
- SQLi
- SSRF
- Open Redirect
- RCE
- Misconfigurations
Install required tools before using VoidFuzzer:
gau
uro
httpx-toolkit
nuclei
Install using:
go install github.com/lc/gau/v2/cmd/gau@latest
go install github.com/s0md3v/uro@latest
go install github.com/projectdiscovery/httpx/cmd/httpx@latest
go install github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
Clone repository:
git clone https://github.com/lucifer0xf/voidfuzzer.git
Enter directory:
cd voidfuzzer
Make executable:
chmod +x voidfuzzer.sh
Run tool:
./voidfuzzer.sh
Run tool:
./voidfuzzer.sh
Enter target:
example.com
OR
targets.txt
VoidFuzzer generates:
filtered_urls.txt
Contains:
- Live fuzzable URLs
nuclei_results.txt
Contains:
- Vulnerabilities detected
./voidfuzzer.sh
Enter the target domain or subdomains list file: example.com
Output:
[INFO] Fetching URLs using gau...
[INFO] Filtering URLs...
[INFO] Checking live URLs...
[INFO] Running nuclei scan...
[INFO] Automation completed successfully!
VoidFuzzer uses:
gau
URL collection
uro
URL filtering
httpx-toolkit
Live host detection
nuclei
Vulnerability scanning
VoidFuzzer uses:
xargs -P10
This allows:
- 10 parallel threads
- Faster scanning
- Bug bounty hunters
- Pentesters
- Red teamers
- Security researchers
- Offensive security engineers
Target Input
↓
gau (collect URLs)
↓
uro (filter parameters)
↓
httpx (check live URLs)
↓
nuclei (scan vulnerabilities)
↓
Results Output
Reconnaissance
Web Application Security
Automation & Fuzzing
API Security Testing
Vulnerability Research
Exploit Development
Red Team Operations
OSINT Intelligence
"Security is not a product, it's a process."

