gossti detect
Detect SSTI vulnerabilities
Synopsis
Detect SSTI vulnerabilities in a given URL
gossti detect -u <url> [flags]
Examples
gossti detect -u http://example.com/?param1=SSTI¶m2=value2
Options
-C, --cookies strings Cookies to use (e.g. -C 'cookie1=value1; cookie2=value2')
--form strings Form fields to use (e.g. --form 'field1=value1,field2=value2')
--form-item stringToString Form field to use (e.g. --form 'field1=value1' --form 'field2=value2') (default [])
--form-type string Form type to use (e.g. urlencoded, multipart) (default "urlencoded")
-h, --help help for detect
-X, --method string The HTTP method to use (default "GET")
--timeout duration Timeout for HTTP requests (e.g. 10s)
-u, --url string The target IP or domain to scan
--user-agent string Custom user-agent to use (default "gossti 1.0.0")
Options inherited from parent commands
-v, --verbose count Level of verbosity: -v for INFO, -vv for DEBUG, -vvv for TRACE.
See Also
- gossti - A CLI for gossti