A fast NoSQL scanner and injector. For finding sites vulnerable to NoSQL injection, Mongo in particular.
quay.io/trickest/nosqli:6fce3eb
--data
Specify default post data (should not include any injection strings)--https
Always send requests as HTTPS (Defaults to HTTP when using request files)--proxy
Proxy requests through this proxy URL.--config
config file--target
Target url eg. http://site.com/page?arg=1--request
Load in a request from a file, such as a request generated in Burp or ZAP.--user-agent
Specify a user agent