Newsletter
Join the Community
Subscribe to our newsletter for the latest news and updates
See-SURF is an AI-powered security tool designed to find and validate potential Server Side Request Forgery (SSRF) parameters in web applications.

Autonomous AI agent system for complex penetration testing, integrating security tools, long-term memory, and smart task delegation in sandboxed Docker.

Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.

NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.
See-SURF is an AI-powered security scanner designed to detect and validate Server Side Request Forgery (SSRF) vulnerabilities in web applications. It helps protect applications from system and user data compromise by identifying and confirming potential SSRF parameters.
<a> links and <form> inputs, or parses a Burp sitemap file.url, redirect, dest) or URL patterns in values.http://example.com. If the "Example Domain" signature is found, it flags a potential Reflected/Non-Blind SSRF.Installation:
git clone https://github.com/In3tinct/See-SURF.git
cd See-SURF/
pip3 install -r requirements.txtBasic Command:
python3 see-surf.py -H https://www.target.comAI-Enhanced Scanning (New & Recommended):
# Using Google Gemini
python3 see-surf.py -H http://vulnerable-site.com -p google -m gemini-1.5-flash --api-key YOUR_KEY
# Using OpenAI GPT-4
python3 see-surf.py -H http://vulnerable-site.com -p openai -m gpt-4 -a YOUR_KEY
# Using local Ollama
python3 see-surf.py -H http://vulnerable-site.com -p ollama -m llama3Authenticated Scan:
python3 see-surf.py -H https://www.target.com -c "cookie_name1=value1 cookie_name2=value2"Authenticated with Burp Suite Sitemap:
python3 see-surf.py -H https://www.google.com -c cookie_name1=value1 cookie_name2=value2 -b burp_file.xml