View Issue Details

IDProjectCategoryView StatusLast Update
0008895Kali LinuxNew Tool Requestspublic2024-09-02 05:45
Reporterm10x.de Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
Summary0008895: TInjA - the Template INJection Analyzer: CLI Scanner for Template Injections
Description

[Name] - The name of the tool

[Version] - The latest (Currently 1.1.4)

[Homepage] - https://github.com/Hackmanit/TInjA

[Download] - https://github.com/Hackmanit/TInjA/releases/latest

[Author] - https://hackmanit.de/

[Licence] - Apache 2.0

[Description] - TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines for eight different programming languages. It is very efficient by utilizing newly developed polyglots, which is a new approach for template injection scanners.

[Dependencies] - A standalone binary can be compiled with go. Needed packages for compilation:

  • github.com/fatih/color
  • github.com/go-rod/rod
  • github.com/spf13/cobra
  • github.com/spf13/viper
  • moul.io/http2curl

[Similar tools] - SSTImap, tplmap. But TInjA uses a different approach, by not only relying on template engine specific payloads, but on newly developed polyglots.

[Activity] - It is actively developed and started September 2023

[How to install] - go install -v github.com/Hackmanit/TInjA@latest

[How to use] - What are some basic commands/functions to demonstrate it?

  • Scan a single URL: tinja url -u "http://example.com/"
  • Scan URLs provided in a file: tinja url -u "file:/path/to/file"
  • Scan a single URL by passing a file with a raw HTTP request: tinja raw -R "/path/to/file"

[Packaged] - No

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2024-09-02 05:44 m10x.de New Issue