node
in Trickest platform and how it serves as a main building block for executing offensive cybersecurity workflows.
nikto
tool with -h
parameter that specifies the target URL.
In Trickest, you can configure the tool execution and parameters in the node
configuration. What is more important, you don’t need to worry about the command parameter values, they will have a human-readable format easy to understand.
Trickest Tool with a parameter
inputs
Inputs can be
Trickest Tool with string input