Name:tplmap
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/tplmap:6f21501Output Type:
License:Unknown
Source:View Source
Parameters
--urlTarget URL.--proxyUse a proxy to connect to the target URL-cCookies (e.g. 'Field1=Value1').-HExtra headers (e.g. 'Header1: Value1').--tpl-codeInject code in the template engine.--dataData string to be sent through POST. It must be as query string: param1=value1¶m2=value2.-tTechniques R(endered) T(ime-based blind). Default: RT.-AHTTP User-Agent header value.--force-levelForce a LEVEL and CLEVEL to test.-XForce usage of given HTTP method (e.g. PUT).--uploadUpload file to target.--injection-tagUse string as injection tag (default '*').-eForce back-end template engine to this value.--os-cmdExecute an operating system command.--levelLevel of code context escape to perform (1-5, Default:1).--force-overwriteForce file overwrite when uploading.