tag:github.com,2008:https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/releases Release notes from Web-Cache-Vulnerability-Scanner 2025-08-24T14:05:13Z tag:github.com,2008:Repository/348742617/2.0.0 2025-08-24T14:13:35Z 2.0.0 - Architectural, Detection and Reliability Improvements <p><em>This release represents a major milestone with significant architectural improvements, enhanced detection capabilities, and better overall performance and reliability.</em></p> <h2>🚀 Major Performance Improvements</h2> <h3>HTTP Client Rewrite</h3> <ul> <li><strong>Complete rewrite</strong>: Replaced <code>net/http</code> with <code>fasthttp</code> for significantly improved performance and the possibility to create RFC-violating requests which may lead to web cache poisoning.</li> <li><strong>Improved URL handling</strong>: Better parsing and processing of URLs throughout the application</li> </ul> <h2>🔍 Enhanced Detection Capabilities</h2> <h3>New Cache Indicators</h3> <ul> <li>Added support for multiple cache indicator headers: <ul> <li><code>eo-cache-status</code> indicator</li> <li>Netlify cache status indicator</li> <li><code>x-kinsta-cache</code> and <code>x-ac</code> indicators</li> </ul> </li> <li>Enhanced detection of cache behavior through multiple indicators being returned simultaneously</li> </ul> <h3>Improved Parameter Analysis</h3> <ul> <li><strong>Parameter encoding technique</strong>: New method for detecting cache poisoning vulnerabilities</li> <li><strong>Enhanced parameter detection</strong>: Better identification of impactful or unkeyed parameters</li> <li><strong>Status code analysis</strong>: Different status codes now used as indicators for impactful parameters</li> <li><strong>UTM parameter expansion</strong>: Added <code>gad_campaignid</code> to UTM parameters list</li> </ul> <h2>🛡️ New Attack Techniques</h2> <h3>Denial of Service (DoS) Enhancements</h3> <ul> <li><strong>New DoS techniques</strong>: Multiple new methods for testing cache-based DoS vulnerabilities</li> <li><strong>NextJS-specific techniques</strong>: Targeted DoS methods for NextJS applications</li> <li><strong>Enhanced DoS headers</strong>: Added more DoS headers with metacharacters</li> <li><strong>Simplified HHO DoS</strong>: Streamlined Host Header Override DoS testing</li> </ul> <h3>Advanced Poisoning Methods</h3> <ul> <li><strong>Host header poisoning</strong>: Support for setting multiple host headers</li> <li><strong>Parameter poisoning improvements</strong>: Enhanced existing parameter poisoning detection</li> <li><strong>X-Original-URL redirect test</strong>: New redirect-based testing method</li> <li><strong>Non-RFC-compliant headers</strong>: Support for testing with headers that don't follow RFC standards</li> </ul> <h2>📊 Reporting and Analysis Improvements</h2> <h3>Enhanced Reporting</h3> <ul> <li><strong>Improved report structure</strong>: Better organization and verbosity in reports</li> <li><strong>Reflection context</strong>: Show reflections with proper context in reports</li> <li><strong>Comprehensive reflection reporting</strong>: Report all reflections with counts for body and header names</li> <li><strong>Better file naming</strong>: Improved file naming scheme for generated reports</li> </ul> <h3>Cache Analysis Enhancements</h3> <ul> <li><strong>Aligned cache analysis</strong>: Consistent analyzation methods for both deception and poisoning</li> <li><strong>Improved cache validation</strong>: Better detection of cache behavior</li> <li><strong>CSS poisoning optimization</strong>: Only check 200 responses for CSS poisoning (false positive mitigation)</li> </ul> <h2>🕷️ Crawler Improvements</h2> <h3>Reliability and Performance</h3> <ul> <li><strong>Enhanced crawler stability</strong>: Fixed multiple null pointer exceptions and index out of range errors</li> <li><strong>Improved link processing</strong>: Better handling of crawled links, especially those beginning with <code>//</code></li> <li><strong>CSS URL handling</strong>: Fixed processing of CSS URLs containing cache busters</li> <li><strong>Data URL filtering</strong>: Prevent crawling of <code>data:</code> URLs</li> <li><strong>Relative URL fixes</strong>: Better handling of relative URL paths</li> </ul> <h3>Crawling Optimizations</h3> <ul> <li><strong>Cache buster handling</strong>: Fixed issues with cache busters being incorrectly appended</li> <li><strong>Response filtering</strong>: Only process relevant responses for deception testing</li> </ul> <h2>🔧 Configuration and Usability</h2> <h3>New Configuration Options</h3> <ul> <li><strong>Reason type selection</strong>: New flag to choose specific reason types for testing</li> <li><strong>Multiple host headers</strong>: Support for configuring multiple host headers</li> <li><strong>Logging control</strong>: Default to not generate logs (can be overridden)</li> <li><strong>Limiter for deception</strong>: Added rate limiting for deception testing</li> </ul> <h3>User Experience Improvements</h3> <ul> <li><strong>Better error handling</strong>: Print banner even when fatal errors occur during flag parsing</li> <li><strong>Improved reason formatting</strong>: Better formatting of reasons starting with reason type</li> <li><strong>Enhanced print output</strong>: Improved formatting for response splitting false positives and reflections</li> </ul> <h2>🐛 Bug Fixes and Stability</h2> <h3>Critical Fixes</h3> <ul> <li><strong>Response splitting false positives</strong>: Improved detection to reduce false positives</li> <li><strong>Parameter value overwrites</strong>: Fixed potential false positives when parameter values are overwritten</li> <li><strong>HTTP detection</strong>: Fixed false positives when headers contain <code>http(s)</code></li> <li><strong>Index bounds</strong>: Multiple fixes for index out of range errors</li> <li><strong>Null pointer exceptions</strong>: Resolved various null pointer issues in crawler</li> </ul> <h3>Minor Improvements</h3> <ul> <li><strong>Dependency updates</strong>: Upgraded project dependencies</li> <li><strong>Code cleanup</strong>: Various minor improvements and optimizations</li> <li><strong>Typo corrections</strong>: Fixed multiple typos throughout the codebase</li> </ul> <h2>📈 Performance Optimizations</h2> <ul> <li><strong>Deception efficiency</strong>: Improved cache deception reliability and efficiency</li> <li><strong>Response processing</strong>: Optimized response handling and analysis</li> <li><strong>Memory usage</strong>: Better memory management through fasthttp adoption</li> <li><strong>Processing speed</strong>: Significant performance improvements across all testing methods</li> </ul> m10x tag:github.com,2008:Repository/348742617/1.4.3 2025-06-16T05:25:51Z 1.4.3 - Header Poisoning Bug Fix <p>A large update with many improvements and new techniques is coming soon. In the meantime, this release contains a bug fix.</p> <h1>Changelog</h1> <ul> <li><strong>Bug Fix regarding Header Poisoning</strong> by <a class="user-mention notranslate" data-hovercard-type="user" data-hovercard-url="/users/riramar/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" href="https://github.com/riramar">@riramar</a><br> <em>PR</em>: <a class="issue-link js-issue-link" data-error-text="Failed to load title" data-id="3122993938" data-permission-text="Title is private" data-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/issues/24" data-hovercard-type="pull_request" data-hovercard-url="/Hackmanit/Web-Cache-Vulnerability-Scanner/pull/24/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/pull/24">#24</a></li> </ul> m10x tag:github.com,2008:Repository/348742617/1.4.2 2025-05-14T11:23:34Z 1.4.2 – Bug Fixes and Enhancements in Header/Parameter Testing <h2>Changelog</h2> <ul> <li> <p><strong>Improved parameter/header poisoning detection</strong><br> Query parameters from URLs and values provided via flags are now properly tested.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/f0e11e4f58570c1f6fceb3056a268899e48d05e5/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/f0e11e4f58570c1f6fceb3056a268899e48d05e5"><tt>f0e11e4</tt></a></p> </li> <li> <p><strong>Fixed false positives from common poison values</strong><br> Values like <code>http</code> or <code>https</code> no longer trigger incorrect results.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/2067c82b29956db94c02b5d0db87f9bcf18b5e05/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/2067c82b29956db94c02b5d0db87f9bcf18b5e05"><tt>2067c82</tt></a></p> </li> <li> <p><strong>Fixed scanning of headers specified via flags</strong><br> Header-based scans now respect user-specified input correctly.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/bc341a74b6afe9bfb8f7305d530de20d95a36f3f/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/bc341a74b6afe9bfb8f7305d530de20d95a36f3f"><tt>bc341a7</tt></a></p> </li> <li> <p><strong>Crawler now ignores non-HTTP links</strong><br> <code>href</code> attributes beginning with <code>tel:</code> or <code>ftp:</code> are excluded from crawling.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/31df77da38dc8d87ce0a4cc0d77e2c959be26d4e/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/31df77da38dc8d87ce0a4cc0d77e2c959be26d4e"><tt>31df77d</tt></a></p> </li> <li> <p><strong>Improved output formatting before flag parsing</strong><br> Output is now cleaner and more informative before flags are parsed.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/0def2ad049987bb20b9648c79579d02a74c2ce47/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/0def2ad049987bb20b9648c79579d02a74c2ce47"><tt>0def2ad</tt></a></p> </li> <li> <p><strong>Updated project dependencies</strong><br> Brings in latest versions for external packages.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/538043a43ccd68c8c8eed7c067920ce321acc0ca/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/538043a43ccd68c8c8eed7c067920ce321acc0ca"><tt>538043a</tt></a></p> </li> <li> <p><strong>Replaced custom method with <code>slices.Contains</code></strong><br> Simplified logic by using the standard library for value checks.<br> <em>Commit:</em> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/63558e556048edff58482bd3c4eaf284edc7d23a/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/63558e556048edff58482bd3c4eaf284edc7d23a"><tt>63558e5</tt></a></p> </li> </ul> m10x tag:github.com,2008:Repository/348742617/1.4.0 2025-04-17T16:02:32Z Version 1.4.0 - Improved and new techniques, hardcoded wordlists & much more <h2>Improved and new techniques</h2> <ul> <li>improved parameter scanning</li> <li>improved parameter cloaking</li> <li>improved fat get</li> <li>added parameter pollution as new technique</li> </ul> <h2>Hardcoded wordlists</h2> <ul> <li>The wordlists used for parameters and headers are now hardcoded into wcvs. This means that from now on you only need to specify wordlists if you want to use other than the default ones</li> </ul> <h2>Improved Cachebuster Detection</h2> <ul> <li>The random cachebuster values now have a cb prefix, while the random poison values now have a p prefix</li> <li>This makes it easier to tell if a value is a cachebuster or poison value. Especially when the cachebuster parameter is also vulnerable to e.g. parameter pollution.</li> </ul> <h2>Better poison and cachebuster values</h2> <ul> <li>The random cachebuster values have now a prepended cb, while the random poison values have now a prepended p</li> <li>Thus, it's easier to differentiate if a value is a cachebuster or poison value. Especially if the cachebuster parameter is also vulnerable to e.g. parameter pollution.</li> </ul> <h2>Improved Output</h2> <ul> <li>Better formatting</li> <li>Showing the correct cachebuster name</li> </ul> <h2>New Flags</h2> <ul> <li>skipwordlistcachbuster: skip using wordlists when trying to find a cachebuster</li> <li>nolog: do not create a log file</li> </ul> <h2>Misc</h2> <ul> <li>upgraded dependencies</li> <li>updated chrome useragent</li> </ul> m10x tag:github.com,2008:Repository/348742617/1.3.3 2024-12-25T09:46:04Z Version 1.3.3 - Forcing checks now sets a default cachebuster <ul> <li>changed default cb name to cbwcvs <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3ba438c753d808faf42e543a2fea5ecb27bb2d39/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3ba438c753d808faf42e543a2fea5ecb27bb2d39"><tt>3ba438c</tt></a></li> <li>forcing checks now forces parameter cbwcvs as cb <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/0b8faf98619e24b3bb434b70a7c6d11072746712/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/0b8faf98619e24b3bb434b70a7c6d11072746712"><tt>0b8faf9</tt></a></li> </ul> m10x tag:github.com,2008:Repository/348742617/1.3.2 2024-12-25T09:12:19Z Version 1.3.2 - Minor Web Cache Deception and Response Splitting Improvements <h2>Misc</h2> <ul> <li>Only add successful web cache deception requests to the report <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/bc7698d8519afc1ce695090f861b5d234c91352e/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/bc7698d8519afc1ce695090f861b5d234c91352e"><tt>bc7698d</tt></a></li> <li>improve/fix the check whether the cache returns always a miss <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3aa98233cb994b70d4c41cca1d4d2214dfdc4159/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3aa98233cb994b70d4c41cca1d4d2214dfdc4159"><tt>3aa9823</tt></a></li> <li>improved responsesplitting feedback <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/1843b90d1b199eeea068b81d5d2033e695cc0507/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/1843b90d1b199eeea068b81d5d2033e695cc0507"><tt>1843b90</tt></a></li> </ul> m10x tag:github.com,2008:Repository/348742617/1.3.1 2024-12-22T13:46:56Z Version 1.3.1 - Fixed Deadlocks and Web Cache Deception Bug <h2>Bug Fixes</h2> <ul> <li>Fixed Dead Locks <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/14c0aa54c4b05563b9a5c4a97a09d3ea740b805b/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/14c0aa54c4b05563b9a5c4a97a09d3ea740b805b"><tt>14c0aa5</tt></a></li> <li>Fixed "Invalid URL escape" error when performing web cache deception chekcs <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/44d66d420975cff5f41b8f3da83b3ac590110112/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/44d66d420975cff5f41b8f3da83b3ac590110112"><tt>44d66d4</tt></a></li> </ul> <h2>Misc</h2> <ul> <li>Ignore 400 and 404 Status Code when performing web cache deception checks <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/585f5bff32ae909a37733d7ea55f9130f133fd09/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/585f5bff32ae909a37733d7ea55f9130f133fd09"><tt>585f5bf</tt></a></li> <li>Updated deps <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/87bc2d564406d4d15a990baab7530aac5db01147/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/87bc2d564406d4d15a990baab7530aac5db01147"><tt>87bc2d5</tt></a></li> </ul> m10x tag:github.com,2008:Repository/348742617/1.3.0 2024-11-06T13:15:00Z Version 1.3.0 - Improved Cache Deception, Kali Linux & more <h2>Kali Linux</h2> <p>WCVS was finally added to Kali Linux' repository. <a href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner?tab=readme-ov-file#option-2-kali-linux--blackarch-repository">Here are the install instructions.</a></p> <h2>Web Cache Deception Improvements</h2> <p>WCVS' web cache deception detections were improved by multiple new techniques. Further WCVS will also check for web cache deception if no cache indicator was spotted beforehand.</p> <h2>New Flag: -skiptimebased/--stime</h2> <p>This new flag will tell WCVS to not use measure time as a last resort to guess if a response was cached or not. The time measurements may indicate a cache even if there is none, eventually leading to unnecessary tests being performed.</p> <h2>Miscellaneous</h2> <p>All dependencies were updated.</p> <p><strong>Full Changelog</strong>: <a class="commit-link" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/compare/1.2.1...1.3.0"><tt>1.2.1...1.3.0</tt></a></p> m10x tag:github.com,2008:Repository/348742617/1.2.1 2024-03-20T08:17:24Z Version 1.2.1 - IgnoreStatus flag <h2>New Feature</h2> <p>The --ignorestatus / -is flag was added. It can be used to prevent false positives if, for example, a WAF is changing the status code to 429 Too Many Requests.</p> <p>Usage: ./wcvs -is 418,429 -u <a href="https://example.com" rel="nofollow">https://example.com</a></p> <h2>Changelog</h2> <ul> <li>added ignorestatus flag <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/54fb082eca397d08774d7a45d8ea411927a0ccbd/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/54fb082eca397d08774d7a45d8ea411927a0ccbd"><tt>54fb082</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3c64fa04b6b21cb327bbd35fd8f7087d4ea84ed4/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3c64fa04b6b21cb327bbd35fd8f7087d4ea84ed4"><tt>3c64fa0</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/08dbe83de9d5bf110fc364bf049c9e8b27a306c9/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/08dbe83de9d5bf110fc364bf049c9e8b27a306c9"><tt>08dbe83</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/161ed80667be334f2bc8c75a97beeec68ae9d397/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/161ed80667be334f2bc8c75a97beeec68ae9d397"><tt>161ed80</tt></a></li> <li>updated deps <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/57e96deeceb0a244218ffa1d79d422894b084ba4/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/57e96deeceb0a244218ffa1d79d422894b084ba4"><tt>57e96de</tt></a></li> </ul> m10x tag:github.com,2008:Repository/348742617/1.2.0 2024-02-09T14:00:35Z Version 1.2.0 - Web Cache Deception Detection <h2>Web Cache Deception</h2> <p>The WCVS now detects Web Cache Deception. It uses various techniques for this purpose:</p> <ul> <li>Path Parameter</li> <li>Path Traversal</li> <li>Appended Newline, Null Byte, Semicolon, Pound, Question Mark or Ampersand</li> </ul> <p>In summary, WCVS's procedure is as follows:<br> If the cache returns a HIT, it is tested for web cache poisoning. If the cache always returns a MISS, it is tested for web cache deception.</p> <h2>Changelog</h2> <ul> <li>Added Web Cache Deception Detection <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/d773d4bd74bf61b334196000789def02f6b41ad0/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/d773d4bd74bf61b334196000789def02f6b41ad0"><tt>d773d4b</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/8a52b8be2599887022e783afa988c7f384841a18/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/8a52b8be2599887022e783afa988c7f384841a18"><tt>8a52b8b</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/accdb13bb5d1378566782b8680147c105ff877e0/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/accdb13bb5d1378566782b8680147c105ff877e0"><tt>accdb13</tt></a></li> <li>Added support for more common cache headers (from GoogleCloud, RackCache, Akamai &amp; more) <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/c6789a6f71f76dda662725cfac2825dccef1b799/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/c6789a6f71f76dda662725cfac2825dccef1b799"><tt>c6789a6</tt></a></li> <li>Added Web Cache Deception &amp; Bachelor's Thesis to the Readme <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3c237c0cc04d4dd27a502dab077aa11ef467b32a/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/3c237c0cc04d4dd27a502dab077aa11ef467b32a"><tt>3c237c0</tt></a> <a class="commit-link" data-hovercard-type="commit" data-hovercard-url="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/127125ecc582684500a4eb783d801c64ff276b7c/hovercard" href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/127125ecc582684500a4eb783d801c64ff276b7c"><tt>127125e</tt></a></li> </ul> m10x