Name:fdsploit
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:quay.io/trickest/fdsploit:4522f53
Output Type:
License:Unknown

Parameters

url
string
required
--urlSpecify URL
depth
string
--depthSpecify max depth for payload [default 5]
param
string
--paramsSpecify POST parameters to use (applied only with POST requests) Form: param1:value1,param2:value2,...
keyword
string
--keywordSearch for a certain keyword(s) on the response [default: None]
payload
string
--payloadSpecify a payload-file to look for
b64-encode
boolean
--b64Use base64 encoding [default False]
url-encode
string
-eUrl-encode the payload [default: False]
user-agent
string
--useragentUse a random user-agent [default user-agent: FDsploit_1.2_agent]
target-urls
file
required
--fileSpecify a file containing urls
request-type
string
--verbSpecify request type ('GET' or 'POST') [default GET]
cmd-to-execute
string
--cmdTest for command execution through PHP functions [default command: None]
--cookieSpecify a session-cookie to use [default None]
termination-character
string
--tcharUse a termination character ('%00' or '?') [default None]