optional arguments:
-h,
-u URL,
scope is folder)
Set scan scope
-m MODULES_LIST,
List of modules to load
-l LEVEL,
Set attack level
-p PROXY_URL,
Set the HTTP(S) proxy to use. Supported: http(s) and
socks proxies
-a CREDENTIALS,
Set HTTP authentication credentials
Set the authentication type to use
-c COOKIE_FILE,
Set a JSON cookie file to use
during a previous session
attacks were previously performed
current session
target (crawled URLs, vulns, etc)
-s URL,
-x URL,
Adds an url to exclude from the scan
-r PARAMETER,
Remove this parameter from urls
-d DEPTH,
Set how deep the scanner should explore the website
Set how many (in-scope) links the scanner should
extract for each page
Set how many pages the scanner should explore per
directory
Set how many minutes you want the scan to last (floats
accepted)
will be erased before attack.
-S FORCE,
Easy way to reduce the number of scanned and attacked
URLs. Possible values: paranoid, sneaky, polite,
normal, aggressive, insane
-t SECONDS,
Set timeout for requests
-H HEADER,
Set a custom header to use for every requests
-A AGENT,
Set a custom user-agent to use for every requests
-v LEVEL,
Set verbosity level (0: quiet, 1: normal, 2: verbose)
-f FORMAT,
Set output format. Supported: json, html (default),
txt, openvas, vulneranet, xml
-o OUPUT_PATH,
Output file or folder
fails