We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
required: [descr]qsfuzz is a tool that allows to write simple rules in YAML that define what value to inject[/descr] required: [link]https://github.com/ameenmaali/qsfuzz[/link] required: [tags]String_fuzz,Query_fuzz[/tags] required: [image]https://images-ext-2.discordapp.net/external/UQZs0gNthef_3tboGhu8HaNseNk_RR-3B4CCNqGUhCQ/https/opengraph.githubassets.com/9dd25ecb4ab66a80a322478cc30334eaef0acc961c7efedfdf59666efd43be19/ameenmaali/qsfuzz[/image] optional: [long_descr]qsfuzz (Query String Fuzz) is a tool that allows you to write simple rules in YAML that define what value you want to inject, and what is the outcome you expect if that injection is successful. Pass in a list of URLs, with query strings, and qsfuzz will replace the query string values with your injections to determine if it's vulnerable.[/long_descr]
The text was updated successfully, but these errors were encountered:
Problem occured with the following fields: short_descr
Check the guidelines.
Sorry, something went wrong.
Sorry for the error in the guidelines, it's fixed now.
No branches or pull requests
required: [descr]qsfuzz is a tool that allows to write simple rules in YAML that define what value to inject[/descr]
required: [link]https://github.com/ameenmaali/qsfuzz[/link]
required: [tags]String_fuzz,Query_fuzz[/tags]
required: [image]https://images-ext-2.discordapp.net/external/UQZs0gNthef_3tboGhu8HaNseNk_RR-3B4CCNqGUhCQ/https/opengraph.githubassets.com/9dd25ecb4ab66a80a322478cc30334eaef0acc961c7efedfdf59666efd43be19/ameenmaali/qsfuzz[/image]
optional: [long_descr]qsfuzz (Query String Fuzz) is a tool that allows you to write simple rules in YAML that define what value you want to inject, and what is the outcome you expect if that injection is successful. Pass in a list of URLs, with query strings, and qsfuzz will replace the query string values with your injections to determine if it's vulnerable.[/long_descr]
The text was updated successfully, but these errors were encountered: