We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Attacks are submitted in a tarball.
attack.tar.gz |_ cmd_args |_ stdin |_ env |_ files/ |_ Other files and directories required for the attack