id: multiple-raw-example
info:
  name: Test RAW Template
  author: pdteam
  severity: info
# HTTP Intruder bruteforcing with in template payload support. 
http:
  - raw:
      - |
        POST /?username=§username§¶mb=§password§ HTTP/1.1
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5)
        Host: {{Hostname}}
        another_header: {{base64('§password§')}}
        Accept: */*
        body=test
    payloads:
      username:
        - admin
      password:
        - admin
        - guest
        - password
        - test
        - 12345
        - 123456
    attack: clusterbomb # Available: batteringram,pitchfork,clusterbomb
    matchers:
      - type: word
        words:
          - "Test is test matcher text"