What is SSRF vulnerability?
git clone https://github.com/ariya/phantomjs.git cd phantomjs chmod +x construct.py ./construct.py
Enter the url with susceptible parameter and hit return key. The script is designed to carry out two totally different duties. At first it should inject the payload subsequent to the susceptible parameter and course of the request to one other python script written by @maaaaz. The python script requires phantomJS to carry out screenshot operate. It makes use of the checklist of injected payload and screenshots them and locations them in a screenshot listing.