tplmap
CommunityDetect and exploit Server-Side Template Injection.
AuthorAeonDave
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates the detection and exploitation of Server-Side Template Injection (SSTI) vulnerabilities across a wide range of template engines, enabling security professionals to identify and demonstrate Remote Code Execution (RCE) risks.
Core Features & Use Cases
- Automated SSTI Detection: Scans web applications for vulnerabilities in popular template engines like Jinja2, Twig, Smarty, and others.
- Exploitation: Facilitates achieving Remote Code Execution (RCE) through identified SSTI flaws.
- File Operations: Supports uploading and downloading files to and from the target server via SSTI.
- Use Case: A penetration tester can use this Skill to quickly assess a web application for SSTI vulnerabilities and, if found, demonstrate the potential impact by executing commands on the server.
Quick Start
Use the tplmap skill to detect SSTI vulnerabilities on the target URL http://example.com/page?name=* by running the command python2 tplmap.py -u "http://example.com/page?name=*"
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: tplmap Download link: https://github.com/AeonDave/malskill/archive/main.zip#tplmap Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.