Documentation
gossti detect

gossti detect

Detect SSTI vulnerabilities

Synopsis

Detect SSTI vulnerabilities in a given URL

gossti detect -u <url> [flags]

Examples

gossti detect -u http://example.com/?param1=SSTI&param2=value2

Options

  -C, --cookies strings            Cookies to use (e.g. -C 'cookie1=value1; cookie2=value2')
      --form strings               Form fields to use (e.g. --form 'field1=value1,field2=value2')
      --form-item stringToString   Form field to use (e.g. --form 'field1=value1' --form 'field2=value2') (default [])
      --form-type string           Form type to use (e.g. urlencoded, multipart) (default "urlencoded")
  -h, --help                       help for detect
  -X, --method string              The HTTP method to use (default "GET")
      --timeout duration           Timeout for HTTP requests (e.g. 10s)
  -u, --url string                 The target IP or domain to scan
      --user-agent string          Custom user-agent to use (default "gossti 1.0.0")

Options inherited from parent commands

  -v, --verbose count   Level of verbosity: -v for INFO, -vv for DEBUG, -vvv for TRACE.

See Also