Name:fdsploit
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/fdsploit:4522f53Output Type:
License:Unknown
Source:View Source
Parameters
--urlSpecify URL--depthSpecify max depth for payload [default 5]--paramsSpecify POST parameters to use (applied only with POST requests) Form: param1:value1,param2:value2,...--keywordSearch for a certain keyword(s) on the response [default: None]--payloadSpecify a payload-file to look for--b64Use base64 encoding [default False]-eUrl-encode the payload [default: False]--useragentUse a random user-agent [default user-agent: FDsploit_1.2_agent]--fileSpecify a file containing urls--verbSpecify request type ('GET' or 'POST') [default GET]--cmdTest for command execution through PHP functions [default command: None]--cookieSpecify a session-cookie to use [default None]--tcharUse a termination character ('%00' or '?') [default None]