Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

HTTP Smuggling Visualizer / Simulator

License

NotificationsYou must be signed in to change notification settings

kizzx2/SmugPal

Repository files navigation

HTTP Smuggling simulator / visualizer and command line generator.

Workbench for developing HTTP Smuggling / Desync exploits interactively and visually.

Inspired byRegexPal,revshells.com

Features

  • real time interactive colorization of request splits
  • command line generator (netcat / socat for HTTPS)
  • HTTP/2 support (ALPN Negotiation)
  • ready to useTE.CL template
  • ready to useCL.TE template
  • ready to useCL.0 template
  • ready to useH2.TE template
  • ready to useH2.CL template
  • ready to use "H2.WS Upgrade" template (slide 36 inthis deck)

Help Wanted / TODO

  • Support multiple requests in HTTP2 inputs
  • As you can see the current UI does not look great. PRs welcome to improve the look & feel of the app.

Note about HTTP/2 without HTTPS

The current payload template assumes HTTPS when used with HTTP/2. This is because as of writing, apparentlymitmproxy does not support prior-knowledge H2 connections. When I tried with Burp I got similar results so I assume it is also the same case.

If you want to use it without HTTPS, simply comment out the line that saysctx.wrap_socket in the script.


[8]ページ先頭

©2009-2025 Movatter.jp