offensive-parameter-pollution
SnailSploit/Claude-Red
This skill provides a comprehensive operational checklist for identifying and exploiting HTTP Parameter Pollution (HPP) vulnerabilities. It details how various web technologies (ASP.NET, PHP, Python, etc.) handle duplicate parameters differently (e.g., first-wins, last-wins, concatenation). Use this skill during penetration testing to discover flaws in parameter parsing, which can lead to bypassing WAFs, performing logic manipulation, or achieving unauthorized access.