Tamper/modify payload before execute payload
rozium opened this issue · 1 comments
rozium commented
Hi, just want to know how to tamper or modify the payload
The problem is server will decrypt the request before executed
Example request (for base64)
tplmap.py -u 'http://domain.target/page?param1={{*}}'
So instead {{*}}
, the payload will become base64.b64encode("{{*}}")
. Thanks!
epinna commented
Hello,
You should write your own module to do that. Read the other modules under plugin/engines/
and plugin/languages/
and try to create your own.