➜ webscan ./webscan -h
Webscanner
Usage:
./webscan [flags]
Flags:
INPUT:
-i, -input string url input(example: -i 'http://www.baidu.com', -i '192.168.243.11:81')
-f, -input-file string urls file(example: -f 'xxx.txt')
CONFIG:
-threads int number of threads (default 1)
-timeout int timeout in seconds (default 10)
-p, -proxy string proxy(example: -p 'http://127.0.0.1:8080')
-header string add custom headers(example: -header 'User-Agent: xxx, ')
-finger-file string use your finger file(example: -finger-file 'fingers.json')
OUTPUT:
-o, -output string output file to write found results (default "webscan.txt")
-nc, -no-color disable colors in output
DEBUG:
-silent show only results in output
-debug show debug output
{
"name": "Shiro",
"pocTags": [
"shiro"
],
"tags": [],
"desc": "RCE",
"fingers": [
{
"type": "or",
"rules": [
{
"method": "keyword",
"location": "header",
"keyword": "=deleteMe"
}
]
}
],
"hasPoc": true
}