Skip to content
How does HTTP request smuggling work
By Adrian Philipp
Links to this note
Security of software systems
These notes are unpolished collections of thoughts, unfinished ideas, and things I want to remember later. In the spirit of learning in public, I'm sharing them here. Have fun exploring, if you want!