This repository has been archived by the owner on Jan 17, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 234
Functionality
Thomas Perkins edited this page Nov 25, 2016
·
5 revisions
Mandatory flags, that have to be run for the program to do anything:
-d/--default (Scrapes Google for possible vulnerable sites)
-f/--file FILENAME (Runs through the specified file list and tries to find vulnerabilities in the sites)
-s/--spider URL (Opens the URL pulls all the URL redirects from that site, make sure it's a good URL)
Enumeration flags, these will help enumerate the program, or run the program in a certain way
-x/--run-x NUM (Runs the program the specified amount of times in a dry/batch run)
--dry-run (Runs the program but doesn't search the sites for vulnerabilities, prompts for input)
--batch (Used in conjunction with dry run, doesn't prompt for input)
Anomity and hiding yourself flags, these flags are for making yourself anonymous:
-p/--proxy IP:PORT (Configure the program to run behind a proxy, must use the ":")
--rand-agent (Use a random user agent header instead of the default)
Processing flags, these flags will process the already found sites and run them.
--sqlmap (Will launch sqlmap and use the SQL_VULN.LOG file as the bulk file, will prompt you for your commands)
Random and misc flags, these flags really have nothing to do with the programs functionality but will help with stuff, kinda..
-l/--legal (Will display the legal information, full legal along with the terms of service)
-b/--banner (Will hide whitewidows banner, meaning it won't display the version either)
--beep (Will create a beep everytime the program finds a SQL vulnerable site)