gossti detect
Detect SSTI vulnerabilities
Synopsis
Detect SSTI vulnerabilities in a given URL
gossti detect -u <url> [flags]Examples
gossti detect -u http://example.com/?param1=SSTI¶m2=value2Options
-C, --cookies strings Cookies to use (e.g. -C 'cookie1=value1; cookie2=value2')
--form strings Form fields to use (e.g. --form 'field1=value1,field2=value2')
--form-item stringToString Form field to use (e.g. --form 'field1=value1' --form 'field2=value2') (default [])
--form-type string Form type to use (e.g. urlencoded, multipart) (default "urlencoded")
-h, --help help for detect
-X, --method string The HTTP method to use (default "GET")
--timeout duration Timeout for HTTP requests (e.g. 10s)
-u, --url string The target IP or domain to scan
--user-agent string Custom user-agent to use (default "gossti 1.0.0")Options inherited from parent commands
-v, --verbose count Level of verbosity: -v for INFO, -vv for DEBUG, -vvv for TRACE.See Also
- gossti - A CLI for gossti