wapiti
Web vulnerability scanner written in Python3
Details
Category: Scanners
Publisher: trickest-mhmdiaa
Created Date: 9/7/2022
Container: quay.io/trickest/wapiti:3.1.3
Source URL: https://github.com/wapiti-scanner/wapiti
Parameters
Command:
--url
- The base URL used to define the scan scopeCommand:
--data
- Urlencoded data to send with the base URL if it is a POST requestCommand:
--skip
- Skip attacking given parameter(s)Command:
--color
- Colorize outputCommand:
--depth
- Set how deep the scanner should explore the websiteCommand:
--level
- Set attack levelCommand:
--proxy
- Set the HTTP(S) proxy to use. Supported: http(s) and socks proxiesCommand:
--scope
- Set scan scope (page, folder, domain, url, or punk)Command:
--start
- Adds a url to start scan withCommand:
--tasks
- Number of concurrent tasks to use for the exploration (crawling) of the target.Command:
--cookie
- Set a JSON cookie file to use.Command:
--format
- Set output format. Supported: csv, html, json, txt, xml. Default is html.Command:
--header
- Set a custom header to use for every requestsCommand:
--module
- List of modules to loadCommand:
--remove
- Remove this parameter from urlsCommand:
--exclude
- Adds a url to exclude from the scanCommand:
--timeout
- Set timeout for requests in secondsCommand:
--verbose
- Set verbosity level (0: quiet, 1: normal, 2: verbose)Command:
--endpoint
- URL serving as endpoint for both attacker and targetCommand:
--auth-cred
- Set HTTP authentication credentialsCommand:
--auth-type
- Set the authentication type to use (basic, digest, ntlm, or post)Command:
--scan-force
- Easy way to reduce the number of scanned and attacked URLs. Possible values: paranoid, sneaky, polite, normal, aggressive, insaneCommand:
--user-agent
- Set a custom user-agent to use for every requestsCommand:
--verify-ssl
- Set SSL check (0 or 1, default is 0)Command:
--dns-endpoint
- Domain serving as DNS endpoint for Log4Shell attackCommand:
--no-bugreport
- Don't send automatic bug report when an attack module failsCommand:
--max-scan-time
- Set how many seconds you want the scan to last (floats accepted)Command:
--max-parameters
- URLs and forms having more than MAX input parameters will be erased before attack.Command:
--drop-set-cookie
- Ignore Set-Cookie header from HTTP responsesCommand:
--max-attack-time
- Set how many seconds you want each attack module to last (floats accepted)Command:
--external-endpoint
- URL serving as endpoint for targetCommand:
--internal-endpoint
- URL serving as endpoint for attackerCommand:
--max-files-per-dir
- Set how many pages the scanner should explore per directoryCommand:
--max-links-per-page
- Set how many (in-scope) links the scanner should extract for each page