epinna / tplmap

Server-Side Template Injection and Code Injection Detection and Exploitation Tool
GNU General Public License v3.0
3.75k stars 670 forks source link

Tamper/modify payload before execute payload #54

Closed rozium closed 5 years ago

rozium commented 5 years ago

Hi, just want to know how to tamper or modify the payload The problem is server will decrypt the request before executed

Example request (for base64) tplmap.py -u 'http://domain.target/page?param1={{*}}' So instead {{*}}, the payload will become base64.b64encode("{{*}}"). Thanks!

epinna commented 5 years ago

Hello,

You should write your own module to do that. Read the other modules under plugin/engines/ and plugin/languages/ and try to create your own.