fdsploit
FDsploit can be used to discover and exploit Local/Remote File Inclusion and directory traversal vulnerabilities automatically.
Details
Category: Vulnerabilities
Publisher: trickest
Created Date: 9/7/2021
Container: quay.io/trickest/fdsploit:4522f53
Source URL: https://github.com/chrispetrou/FDsploit
Parameters
Command:
--url
- Specify URLCommand:
--depth
- Specify max depth for payload [default 5]Command:
--params
- Specify POST parameters to use (applied only with POST requests) Form: param1:value1,param2:value2,...Command:
--keyword
- Search for a certain keyword(s) on the response [default: None]Command:
--payload
- Specify a payload-file to look forCommand:
--b64
- Use base64 encoding [default False]Command:
-e
- Url-encode the payload [default: False]Command:
--useragent
- Use a random user-agent [default user-agent: FDsploit_1.2_agent]Command:
--file
- Specify a file containing urlsCommand:
--verb
- Specify request type ('GET' or 'POST') [default GET]Command:
--cmd
- Test for command execution through PHP functions [default command: None]Command:
--cookie
- Specify a session-cookie to use [default None]Command:
--tchar
- Use a termination character ('%00' or '?') [default None]