zgrab2-http
Fast Go Application Scanner
Name:zgrab2-http
Category:Recon
Publisher:trickest-mhmdiaa
Created:4/12/2023
Container:
quay.io/trickest/zgrab2-http:82b0038
Output Type:
License:Unknown
Source:View Source
Parameters
--sct
Request Signed Certificate Timestamps during TLS Handshake--port
Specify port to grab on (default: 80)--time
Explicit request time to use, instead of clock. YYYYMMDDhhmmss format.--debug
Include debug fields in the output.--flush
Flush after each line of output.
Input target--method
Set HTTP request method type (default: GET)--no-sni
Do not send domain name in TLS Handshake regardless of whether known--senders
Number of send goroutines to use (default: 1000)--timeout
Set connection timeout (0 = no timeout) (default: 10s)--trigger
Invoke only on targets with specified tag--endpoint
Send an HTTP request to an endpoint (default: /)--max-size
Max kilobytes to read in response to an HTTP request (default: 256)--maxbytes
Maximum byte read limit per scan (0 = defaults)--no-ecdhe
Do not allow ECDHE handshakes--root-cas
Set of certificates to use when verifying server certificates--use-https
Perform an HTTPS connection on the initial host--gomaxprocs
Set GOMAXPROCS (default: 0)--heartbleed
Check if server is vulnerable to Heartbleed
Input file--prometheus
Address to use for Prometheus server (e.g. localhost:8080). If empty, Prometheus is disabled--user-agent
Set a custom user agent (default: Mozilla/5.0 zgrab/0.x)--dsa-enabled
Accept server DSA keys--max-version
The maximum SSL/TLS version that is acceptable. 0 means use the highest supported value.--min-version
The minimum SSL/TLS version that is acceptable. 0 means that SSLv3 is the minimum.--next-protos
A list of supported application-level protocols--retry-https
If the initial request fails, reconnect and try with HTTPS.--server-name
Server name used for certificate verification and (optionally) SNI--certificates
Set of certificates to present to the server--cipher-suite
A comma-delimited list of hex cipher suites to advertise.--client-hello
Set an explicit ClientHello (base64 encoded)--client-random
Set an explicit Client Random (base64 encoded)--max-redirects
Max number of redirects to follow (default: 0)--session-ticket
Send support for TLS Session Tickets and output ticket if presented--with-body-size
Enable the body_size attribute, for how many bytes actually read--certificate-map
A file mapping server names to certificates--extended-random
Send TLS Extended Random Extension--keep-client-logs
Include the client-side logs in the TLS handshake--curve-preferences
A list of elliptic curves used in an ECDHE handshake, in order of preference.--heartbeat-enabled
If set, include the heartbeat extension--override-sig-hash
Override the default SignatureAndHashes TLS option with more expansive default--redirects-succeed
Redirects are always a success, even if max-redirects is exceeded--fail-http-to-https
Trigger retry-https logic on known HTTP/400 protocol mismatch responses--read-limit-per-host
Maximum total kilobytes to read for a single host (default 96kb) (default: 96)--connections-per-host
Number of times to connect to each host (results in more output) (default: 1)--custom-headers-names
CSV of custom HTTP headers to send to server--signature-algorithms
Signature and hash algorithms that are acceptable--custom-headers-values
CSV of custom HTTP header values to send to server. Should match order of custom-headers-names--extended-master-secret
Offer RFC 7627 Extended Master Secret extension--custom-headers-delimiter
Delimiter for customer header name/value CSVs--verify-server-certificate
ail if the server certificate does not match the server-name, or does not chain to a trusted root.--follow-localhost-redirects
Follow HTTP redirects to localhost--compute-decoded-body-hash-algorithm
Choose algorithm for BodyHash field (sha256 or sha1)