Mi fan Penetration Test browser is a chrome kernel based on the addition of some of the popular features of the browser.
Key features include:
1. Automatic modification of HTTP headers (Host, Referer, Cookie, user-agent);
2, post submission.
3, request interception, modification.
4, Agent fast switch.
5, Web page URL extraction.
6, port scanning.
7, directory scanning.
8, basic certification cracked.
9, the form of serious cracking (simulation browser operation, can bypass the front-end JS encryption, but slow, for a small number of password cracking).
10, Domain name counter check (Call Love Station).
11, two level domain name query (call Netcraft).
12, FUZZ, can be customized rules, after the parameter, after the URL, url root path, url question mark after inserting payload, or custom HTTP header, support post (in the Capture Replay table Select Right button).
13, right-click Send to Sqlmap (Automatic identification https/http), need to install Sqlmap, support sqlmap-r/-u parameters, support post (in the Capture Replay table Select Right button).
14. Grab/Modify Replay.
15. The source code is formatted/edited and saved to the current Web page in DOM mode.
Parameter description:
User-agent Head can choose the built-in can also enter their own, enter and then press ENTER.
Proxy switch, you can choose the built-in can also be input, format 192.168.1.1:8080, enter and then press ENTER.
User name password dictionary and fuzz dictionary are placed in the Dict directory, can be modified by themselves.
The browser cache is placed in the AppData folder.
Latest Version: Http://pan.baidu.com/s/1c1NDSVe file name Xmfbrowser
Xiaomi Tool series: MI fan penetration test browser