View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0008895 | Kali Linux | New Tool Requests | public | 2024-09-02 05:44 | 2024-09-02 05:45 |
Reporter | m10x.de | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | new | Resolution | open | ||
Summary | 0008895: TInjA - the Template INJection Analyzer: CLI Scanner for Template Injections | ||||
Description | [Name] - The name of the tool [Version] - The latest (Currently 1.1.4) [Homepage] - https://github.com/Hackmanit/TInjA [Download] - https://github.com/Hackmanit/TInjA/releases/latest [Author] - https://hackmanit.de/ [Licence] - Apache 2.0 [Description] - TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines for eight different programming languages. It is very efficient by utilizing newly developed polyglots, which is a new approach for template injection scanners. [Dependencies] - A standalone binary can be compiled with go. Needed packages for compilation:
[Similar tools] - SSTImap, tplmap. But TInjA uses a different approach, by not only relying on template engine specific payloads, but on newly developed polyglots. [Activity] - It is actively developed and started September 2023 [How to install] - go install -v github.com/Hackmanit/TInjA@latest [How to use] - What are some basic commands/functions to demonstrate it?
[Packaged] - No | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2024-09-02 05:44 | m10x.de | New Issue |