tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Name:tplmap
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/tplmap:6f21501
Output Type:
License:Unknown
Source:View Source
Parameters
--url
Target URL.--proxy
Use a proxy to connect to the target URL-c
Cookies (e.g. 'Field1=Value1').-H
Extra headers (e.g. 'Header1: Value1').--tpl-code
Inject code in the template engine.--data
Data string to be sent through POST. It must be as query string: param1=value1¶m2=value2.-t
Techniques R(endered) T(ime-based blind). Default: RT.-A
HTTP User-Agent header value.--force-level
Force a LEVEL and CLEVEL to test.-X
Force usage of given HTTP method (e.g. PUT).--upload
Upload file to target.--injection-tag
Use string as injection tag (default '*').-e
Force back-end template engine to this value.--os-cmd
Execute an operating system command.--level
Level of code context escape to perform (1-5, Default:1).--force-overwrite
Force file overwrite when uploading.