parameter-pollution
CommunityExploit HTTP parameter handling flaws.
Software Engineering#access control#web security#vulnerability testing#waf bypass#parameter pollution#hpp
AuthorSnailSploit
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps identify and exploit vulnerabilities arising from how web applications and servers process duplicate HTTP parameters, leading to potential bypasses and data manipulation.
Core Features & Use Cases
- Parameter Handling Analysis: Understand how different server technologies (PHP, ASP.NET, Node.js) interpret duplicate parameters.
- Vulnerability Discovery: Detect bypasses for access control, WAFs, and security tokens by manipulating parameter order and values.
- Use Case: When testing a web application, use this Skill to send requests with duplicate parameters like
?user=guest&user=adminto see if you can escalate privileges.
Quick Start
Use the parameter-pollution skill to test for vulnerabilities by sending duplicate parameters to the target URL.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: parameter-pollution Download link: https://github.com/SnailSploit/Claude-Red/archive/main.zip#parameter-pollution Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.