F-14 Tomcat is a modern, modular, and fast tool designed for exploiting NoSQL injection vulnerabilities. While currently focused on MongoDB, it provides advanced techniques to bypass WAFs and extract data efficiently using binary search algorithms.
-
Advanced Extraction: Uses Binary Search algorithm for high-speed data extraction (Blind Injection).
-
WAF Evasion: Supports JA3/TLS Fingerprint impersonation (Chrome/Firefox/Safari) to bypass modern WAFs like Cloudflare.
-
Smart Stability: Auto-calibration for network jitter and dynamic content filtering to prevent false positives.
-
Auto-Authentication: Automatically detects session expiration (401/403) and re-authenticates to maintain the session.
-
Multi-Technique:
-
Auth Bypass (Technique A)
-
Blind Injection (Technique B)
-
JS Injection (Technique J)
-
-
Flexible Input: Supports JSON, Form-Data, and GET parameters.
-
Payload Tuning: Customizable prefix/suffix injection for complex syntax requirements.
** 1.Clone the repository**
git clone https://github.com/G0odkid/F14
cd F14** 2.Install dependencies**
pip install -r requirements.txt(Note: Ensure you have python 3.x installed.)
- Basic Scan (Auth Bypass Check) Check if the login page is vulnerable to basic NoSQL injection:
python3 tomcat.py -u [http://target.com/login](http://target.com/login) -d '{"username": "admin", "password": "123"}' --technique A- Data Extraction (Blind Injection) Extract the administrator's password using binary search:
python3 tomcat.py -u [http://target.com/login](http://target.com/login) -d '{"username": "admin", "password": "*"}' --technique B --param "password"- WAF Bypass Mode Impersonate a Chrome browser to bypass WAF protections:
python3 tomcat.py -r request.txt --impersonate chrome120 --technique B- High Stability Mode Set custom timeouts and retries for unstable networks:
python3 tomcat.py -u [http://target.com/api](http://target.com/api) -d '{"id": 1}' --timeout 15 --retries 5-
Support for other NoSQL databases (Redis, CouchDB, Cassandra).
-
Out-of-Band (OOB) extraction via DNS/HTTP.
-
HTML/JSON Report generation.
-
Header Injection support.
Have a question, found a bug, or want to suggest a new feature?
Please open an issue in the Issues tab — contributions and feedback are always welcome