wapiti
Web vulnerability scanner written in Python3
Name:wapiti
Category:Scanners
Publisher:trickest-mhmdiaa
Created:9/7/2022
Container:
quay.io/trickest/wapiti:3.1.3
Output Type:
License:Unknown
Source:View Source
Parameters
--url
The base URL used to define the scan scope--data
Urlencoded data to send with the base URL if it is a POST request--skip
Skip attacking given parameter(s)--color
Colorize output--depth
Set how deep the scanner should explore the website--level
Set attack level--proxy
Set the HTTP(S) proxy to use. Supported: http(s) and socks proxies--scope
Set scan scope (page, folder, domain, url, or punk)--start
Adds a url to start scan with--tasks
Number of concurrent tasks to use for the exploration (crawling) of the target.--cookie
Set a JSON cookie file to use.--format
Set output format. Supported: csv, html, json, txt, xml. Default is html.--header
Set a custom header to use for every requests--module
List of modules to load--remove
Remove this parameter from urls--exclude
Adds a url to exclude from the scan--timeout
Set timeout for requests in seconds--verbose
Set verbosity level (0: quiet, 1: normal, 2: verbose)--endpoint
URL serving as endpoint for both attacker and target--auth-cred
Set HTTP authentication credentials--auth-type
Set the authentication type to use (basic, digest, ntlm, or post)--scan-force
Easy way to reduce the number of scanned and attacked URLs. Possible values: paranoid, sneaky, polite, normal, aggressive, insane--user-agent
Set a custom user-agent to use for every requests--verify-ssl
Set SSL check (0 or 1, default is 0)--dns-endpoint
Domain serving as DNS endpoint for Log4Shell attack--no-bugreport
Don't send automatic bug report when an attack module fails--max-scan-time
Set how many seconds you want the scan to last (floats accepted)--max-parameters
URLs and forms having more than MAX input parameters will be erased before attack.--drop-set-cookie
Ignore Set-Cookie header from HTTP responses--max-attack-time
Set how many seconds you want each attack module to last (floats accepted)--external-endpoint
URL serving as endpoint for target--internal-endpoint
URL serving as endpoint for attacker--max-files-per-dir
Set how many pages the scanner should explore per directory--max-links-per-page
Set how many (in-scope) links the scanner should extract for each page