Kali Linux

Request_Smuggler : Http Request Smuggling Vulnerability Scanner

Request_Smuggler is a Http request smuggling vulnerability scanner. Based on the amazing research by James Kettle. The tool can help to find servers that may be vulnerable to request smuggling vulnerability.

Usage

USAGE:
request_smuggler [OPTIONS] –url
FLAGS:
-h, –help Prints help information
-V, –version Prints version information
OPTIONS:
–amount-of-payloads low/medium/all [default: low]
-t, –attack-types
[ClTeMethod, ClTePath, ClTeTime, TeClMethod, TeClPath, TeClTime] [default: “ClTeTime” “TeClTime”]
–file
send request from a file
you need to explicitly pass \r\n at the end of the lines
-H, –header Example: -H ‘one:one’ ‘two:two’
-X, –method [default: POST]
-u, –url
-v, –verbose
0 – print detected cases and errors only,
1 – print first line of server responses
2 – print requests [default: 0]
–verify how many times verify the vulnerability [default: 2]

Installation

  • Linux
    • from releases
    • from source code (rust should be installed)

git clone https://github.com/Sh1Yo/request_smuggler
cd request_smuggler
cargo build –release

using cargo install

cargo install request_smuggler –version 0.1.0-alpha.2

Mac

  • from source code (rust should be installed)

git clone https://github.com/Sh1Yo/request_smuggler
cd request_smuggler
cargo build –release

using cargo install

cargo install request_smuggler –version 0.1.0-alpha.2

  • Windows
    • from releases
R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

15 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago