This tool is designed to detect potential HTTP request smuggling vulnerabilities in web applications. It supports both HTTP/1.1 and HTTP/2 request smuggling techniques and provides detailed analysis of the responses.
- HTTP/1.1 Request Smuggling (TE.CL and CL.TE)
- HTTP/2 Request Smuggling
- Random User-Agent selection
- Detailed response comparison
- Interactive mode for single URL or batch processing from file
git clone https://github.com/Hacking-Notes/HR-Smuggler.gitpython request_smuggling.py -u <target_url> -b <burp_collaborator_url>
python request_smuggling.py -f <file_with_urls> -b <burp_collaborator_url>- -u, --url: Single URL to test
- -f, --file: File containing multiple URLs to test (one URL per line)
- -b, --burp: Burp Collaborator URL (required)
python request_smuggling.py -u http://example.com -b http://collaborator.compython request_smuggling.py -f urls.txt -b http://collaborator.comThe tool compares the responses for potential indicators of request smuggling, including differences in:
- Status codes
- Headers
- Response bodies
If potential request smuggling is detected, further steps are suggested for verification and documentation.
- Check the Burp Collaborator server for unexpected requests.
- Verify if the Collaborator URL was accessed during the test.
- Perform additional tests to understand the impact and potential exploitation paths.
- Document the findings and report the vulnerability if confirmed.
