smuggler
Smuggling tester
A tool for testing HTTP request smuggling and desync issues in web servers.
Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3
13 stars
0 watching
2 forks
Language: Python
last commit: about 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
defparam/smuggler | An HTTP Request Smuggling / Desync testing tool written in Python 3 | 1,819 |
anshumanpattnaik/http-request-smuggling | Detects HTTP Request Smuggling vulnerabilities in web applications | 472 |
portswigger/http-request-smuggler | An extension for Burp Suite to help identify and exploit HTTP Request Smuggling vulnerabilities. | 958 |
defparam/tiscripts | Tools for generating custom request smuggling payloads to exploit vulnerabilities in web applications. | 215 |
benjeems/packetstrider | Analyzes network traffic from SSH connections to detect potential security threats and reverse sessions. | 253 |
detectify/varnish-h2-request-smuggling | A Docker-based test environment for simulating a Varnish HTTP/2 request smuggling vulnerability | 55 |
nachiketrathod/http.request.smuggling.desync.attack | An attacker exploits HTTP request smuggling to manipulate the sequence of requests and deceive both front-end and back-end security controls. | 14 |
trycatchhcf/packetwhisper | A tool for stealthy data transfer using DNS queries and text-based steganography to evade attribution and detection. | 623 |
volkandindar/agartha | An extension for a web application security testing tool that identifies vulnerabilities and exploits HTTP requests for penetration testing. | 355 |
0ang3el/websocket-smuggle | A tool to expose security vulnerabilities in WebSocket reverse proxying allowing HTTP requests to be smuggled through | 336 |
akamai-threat-research/mqtt-pwn | A tool for penetration testing and security assessment of MQTT brokers using various exploitation techniques. | 367 |
bishopfox/h2csmuggler | Smuggling HTTP traffic past proxy rules to bypass access controls | 650 |
omriher/captipper | Analyzes and explores malicious HTTP traffic to understand network flows and detect exploits. | 711 |
jzadeh/aktaion | A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities | 142 |