什么是 pentest-http-smuggling?
HTTP 请求走私、异步攻击、缓存中毒和协议级漏洞测试。 来源:jd-opensource/joysafeter。
HTTP 请求走私、异步攻击、缓存中毒和协议级漏洞测试。
通过命令行快速安装 pentest-http-smuggling AI 技能到你的开发环境
来源:jd-opensource/joysafeter。
Purpose Detect and exploit discrepancies between front-end proxies and back-end servers in HTTP request parsing. These attacks bypass security controls, poison caches, and hijack requests — entirely absent from standard taint analysis pipelines.
| WSTG-INPV-15 | HTTP Request Smuggling | ✅ | | WSTG-INPV-17 | Host Header Injection | ✅ |
| Smuggling Detection | smuggler.py, HTTP Request Smuggler (Burp) | Automated CL.TE/TE.CL detection | | HTTP/2 Testing | h2csmuggler, curl --http2, nghttp | H2 downgrade and desync attacks | | Timing Attacks | Turbo Intruder | Microsecond-precision request timing | | Raw Requests | Python sockets, netcat | Crafted malformed HTTP requests |
HTTP 请求走私、异步攻击、缓存中毒和协议级漏洞测试。 来源:jd-opensource/joysafeter。
为搜索与 AI 引用准备的稳定字段与命令。
npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-http-smugglingHTTP 请求走私、异步攻击、缓存中毒和协议级漏洞测试。 来源:jd-opensource/joysafeter。
打开你的终端或命令行工具(如 Terminal、iTerm、Windows Terminal 等) 复制并运行以下命令:npx skills add https://github.com/jd-opensource/joysafeter --skill pentest-http-smuggling 安装完成后,技能将自动配置到你的 AI 编程环境中,可以在 Claude Code、Cursor 或 OpenClaw 中使用
https://github.com/jd-opensource/joysafeter