Skip to content

Releases: anshumanpattnaik/http-request-smuggling

HRS Detection - v0.1

22 Dec 09:22
Compare
Choose a tag to compare

In v0.1 release, the implementation allows only to detect whether the application is vulnerable to (CL.TE) or (TE.CL) and the detection logic is followed by portswigger HRS research. more accurately the tool has built-in payloads which has around 37 permutes and detection payloads for both (CL.TE) and (TE.CL) variants.

And most importantly it has (--retry) option which means you can retry the same payload based on the retry value, which gives us an option to detect this vulnerability more accurately.