From 46143caa09da90e09df9722922a0552297ce2c66 Mon Sep 17 00:00:00 2001 From: WAY29 <1162410187@qq.com> Date: Fri, 20 May 2022 16:54:42 +0800 Subject: [PATCH] =?UTF-8?q?=F0=9F=A7=AA=20test(xray/v2=5Fpayload=5Ftest):?= =?UTF-8?q?=20add=20payloads=20test?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- pocs/test/xray/v2_payload_test.yml | 39 ++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 pocs/test/xray/v2_payload_test.yml diff --git a/pocs/test/xray/v2_payload_test.yml b/pocs/test/xray/v2_payload_test.yml new file mode 100644 index 0000000..48de4af --- /dev/null +++ b/pocs/test/xray/v2_payload_test.yml @@ -0,0 +1,39 @@ +name: poc-yaml-example-com +transport: http +set: + PATH: r"index" +payloads: + continue: true + payloads: + s1: + PATH2: PATH + r".html" + s2: + PATH2: r"" +rules: + r1: + request: + cache: false + method: GET + path: /{{PATH2}} + headers: {} + body: "" + follow_redirects: false + expression: | + response.status==200 && response.body.bcontains(b'Example Domain') + output: + raw: request.raw +expression: r1() +detail: + author: name(link) + links: + - http://example.com + fingerprint: + infos: [] + host_info: + hostname: "" + vulnerability: + id: "" + match: "" + description: "" + version: "" + tags: test, test2