Provided by: pocsuite3_1.9.6-1_all bug

NAME

       pocsuite3 - open-sourced remote vulnerability testing framework.

Legal Disclaimer

       Usage  of  pocsuite3  for  attacking  targets  without  prior  mutual  consent is illegal.
       pocsuite3 is for security testing purposes only.

SYNOPSIS

       pocsuite -h[elp]
       pocsuite [options]

DESCRIPTION

       pocsuite3 is an open-sourced remote vulnerability testing and proof-of-concept development
       framework  developed  by  the Knownsec 404 Team. It comes with a powerful proof-of-concept
       engine, many nice features for the ultimate penetration testers and security researchers.

OPTIONS

   optional arguments:
       -h, --help
              show this help message and exit

       --version
              Show program's version number and exit

       --update
              Update Pocsuite3

       -n, --new
              Create a PoC template

       -v {0,1,2,3,4,5,6}
              Verbosity level: 0-6 (default 1)

   Target:
              At least one of these options has to be provided to define the target(s)

       -u URL [URL ...], --url URL [URL ...]
              Target URL/CIDR (e.g. "http://www.site.com/vuln.php?id=1")

       -f URL_FILE, --file URL_FILE
              Scan multiple targets given in a textual file (one per line)

       -p PORTS, --ports PORTS
              add additional port to each target (e.g. 8080,8443)

       -r POC [POC ...]
              Load POC file from local or remote from seebug website

       -k POC_KEYWORD
              Filter PoC by keyword, e.g. ecshop

       -c CONFIGFILE
              Load options from a configuration INI file

   Mode:
              Pocsuite running mode options

       --verify
              Run poc with verify mode

       --attack
              Run poc with attack mode

       --shell
              Run poc with shell mode

   Request:
              Network request options

       --cookie COOKIE
              HTTP Cookie header value

       --host HOST
              HTTP Host header value

       --referer REFERER
              HTTP Referer header value

       --user-agent AGENT
              HTTP User-Agent header value (default random)

       --proxy PROXY
              Use a proxy to connect to the target URL (protocol://host:port)

       --proxy-cred PROXY_CRED
              Proxy authentication credentials (name:password)

       --timeout TIMEOUT
              Seconds to wait before timeout connection (default 10)

       --retry RETRY
              Time out retrials times (default 0)

       --delay DELAY
              Delay between two request of one thread

       --headers HEADERS
              Extra headers (e.g. "key1: value1\nkey2: value2")

   Account:
              Account options

       --ceye-token CEYE_TOKEN
              CEye token

       --oob-server OOB_SERVER
              Interactsh server to use (default "interact.sh")

       --oob-token OOB_TOKEN
              Authentication token to connect protected interactsh server

       --seebug-token SEEBUG_TOKEN
              Seebug token

       --zoomeye-token ZOOMEYE_TOKEN
              ZoomEye token

       --shodan-token SHODAN_TOKEN
              Shodan token

       --fofa-user FOFA_USER
              fofa user

       --fofa-token FOFA_TOKEN
              fofa token

       --quake-token QUAKE_TOKEN
              quake token

       --hunter-token HUNTER_TOKEN
              hunter token

       --censys-uid CENSYS_UID
              Censys uid

       --censys-secret CENSYS_SECRET
              Censys secret

   Modules:
              Modules options

       --dork DORK
              Zoomeye dork used for search

       --dork-zoomeye DORK_ZOOMEYE
              Zoomeye dork used for search

       --dork-shodan DORK_SHODAN
              Shodan dork used for search

       --dork-fofa DORK_FOFA
              Fofa dork used for search

       --dork-quake DORK_QUAKE
              Quake dork used for search

       --dork-hunter DORK_HUNTER
              Hunter dork used for search

       --dork-censys DORK_CENSYS
              Censys dork used for search

       --max-page MAX_PAGE
              Max page used in search API

       --search-type SEARCH_TYPE
              search type used in search API, web or host

       --vul-keyword VUL_KEYWORD
              Seebug keyword used for search

       --ssv-id SSVID
              Seebug SSVID number for target PoC

       --lhost CONNECT_BACK_HOST
              Connect back host for target PoC in shell mode

       --lport CONNECT_BACK_PORT
              Connect back port for target PoC in shell mode

       --tls  Enable TLS listener in shell mode

       --comparison
              Compare popular web search engines

       --dork-b64
              Whether dork is in base64 format

   Optimization:
              Optimization options

       -o OUTPUT_PATH, --output OUTPUT_PATH
              Output file to write (JSON Lines format)

       --plugins PLUGINS
              Load plugins to execute

       --pocs-path POCS_PATH
              User defined poc scripts path

       --threads THREADS
              Max number of concurrent network requests (default 150)

       --batch BATCH
              Automatically choose defalut choice without asking

       --requires
              Check install_requires

       --quiet
              Activate quiet mode, working without logger

       --ppt  Hiden sensitive information when published to the network

       --pcap use scapy capture flow

       --rule export rules, default export request and response

       --rule-req
              only export request rule

       --rule-filename RULE_FILENAME
              Specify the name of the export rule file

   Poc options:
              definition options for PoC

       --options
              Show all definition options

EXAMPLES

       Run poc with verify mode, poc will be only used for vulnerability scanning.

       % pocsuite -r poc_example.py -u http://example.com/ --verify

       Run poc with attack mode, and it may allow hackers/researchers break into labs.

       % pocsuite -r poc_example.py -u http://example.com/ --attack

       Run poc with shell mode, if executed successfully, pocsuite  will  drop  into  interactive
       shell.

       % pocsuite -r poc_example.py -u http://example.com/ --shell

       Using multiple threads, the default number of threads is 150.

       % pocsuite -r poc_example.py -u http://example.com/ --verify --threads 20

       Scan multiple targets given in a textual file.

       % pocsuite -r poc_example.py -f url.txt --verify

SEE ALSO

       The full documentation for pocsuite3 is maintained at:
       https://github.com/knownsec/pocsuite3/blob/master/docs/USAGE.md

VERSION

       This manual page documents pocsuite3 version 1.9.6

AUTHOR

       (c) 2014-2022 by Knownsec 404 Team
       <404-team@knownsec.com>

       This  program  is  free software; you may redistribute and/or modify it under the terms of
       the GNU General Public License as published by the Free  Software  Foundation;  Version  2
       with the clarifications and exceptions described below. This guarantees your right to use,
       modify, and redistribute this software under certain conditions.  If  you  wish  to  embed
       pocsuite3  technology  into  proprietary  software,  we sell alternative licenses (contact
       404-team@knownsec.com).

       Manual page started by Tian Qiao <abcnsxyz@gmail.com>