request-smuggling
CommunityDetect and exploit HTTP request smuggling.
Software Engineering#vulnerability assessment#penetration testing#web security#waf bypass#http smuggling#request hijacking
AuthorSnailSploit
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill addresses the complex and often overlooked vulnerability of HTTP request smuggling, enabling security professionals to identify and exploit weaknesses in how web servers and proxies interpret HTTP requests.
Core Features & Use Cases
- Vulnerability Detection: Identifies CL.TE, TE.CL, TE.TE, and HTTP/2 desync vulnerabilities.
- Exploitation Techniques: Provides methods for request hijacking, queue poisoning, and bypassing security controls.
- Use Case: When testing a web application protected by a load balancer and WAF, use this Skill to uncover if requests can be smuggled to bypass the WAF and reach backend servers with unintended consequences.
Quick Start
Use the request-smuggling skill to test the target URL for CL.TE vulnerabilities.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: request-smuggling Download link: https://github.com/SnailSploit/Claude-Red/archive/main.zip#request-smuggling Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.