@@ -49,7 +49,7 @@ Request:
4949 --host HOST HTTP Host header value
5050 --referer REFERER HTTP Referer header value
5151 --user-agent AGENT HTTP User-Agent header value (default random)
52- --proxy PROXY Use a proxy to connect to the target URL
52+ --proxy PROXY Use a proxy to connect to the target URL (protocol://host:port)
5353 --proxy-cred PROXY_CRED
5454 Proxy authentication credentials (name:password)
5555 --timeout TIMEOUT Seconds to wait before timeout connection (default 10)
@@ -118,6 +118,8 @@ Modules:
118118Optimization:
119119 Optimization options
120120
121+ -o OUTPUT_PATH, --output OUTPUT_PATH
122+ Output file to write (JSON Lines format)
121123 --plugins PLUGINS Load plugins to execute
122124 --pocs-path POCS_PATH
123125 User defined poc scripts path
@@ -208,7 +210,7 @@ $ pocsuite --dork 'port:6379' --vul-keyword 'redis' --max-page 2
208210 Search libssh server with ` libssh ` keyword.
209211
210212 ```
211- pocsuite -r pocs/libssh_auth_bypass.py --dork-shodan libssh --thread 10
213+ pocsuite -r pocs/libssh_auth_bypass.py --dork-shodan libssh --threads 10
212214 ```
213215
214216** --dork-fofa DORK**
@@ -219,7 +221,7 @@ $ pocsuite --dork 'port:6379' --vul-keyword 'redis' --max-page 2
219221
220222
221223 ```
222- $ pocsuite -r pocs/check_http_status.py --dork-fofa 'body="thinkphp"' --search-type web --thread 10
224+ $ pocsuite -r pocs/check_http_status.py --dork-fofa 'body="thinkphp"' --search-type web --threads 10
223225 ```
224226
225227** --dork-quake DORK**
@@ -230,7 +232,7 @@ $ pocsuite --dork 'port:6379' --vul-keyword 'redis' --max-page 2
230232
231233
232234 ```
233- $ pocsuite -r pocs/check_http_status.py --dork-quake 'app:"ThinkPHP"' --thread 10
235+ $ pocsuite -r pocs/check_http_status.py --dork-quake 'app:"ThinkPHP"' --threads 10
234236 ```
235237
236238** --dork-b64**
@@ -271,7 +273,7 @@ cli mode
271273 # run poc with shell mode
272274 pocsuite -u http://example.com -r example.py -v 2 --shell
273275
274- # search for the target of redis service from ZoomEye and perform batch detection of vulnerabilities. The thread is set to 20
276+ # search for the target of redis service from ZoomEye and perform batch detection of vulnerabilities. The threads is set to 20
275277 pocsuite -r redis.py --dork service:redis --threads 20
276278
277279 # load all poc in the poc directory and save the result as html
0 commit comments