Jie stands out as a comprehensive security assessment and exploitation tool meticulously crafted for web applications. Its robust suite of features encompasses vulnerability scanning, information gathering, and exploitation, elevating it to an indispensable toolkit for both security professionals and penetration testers. 挖洞辅助工具(漏洞扫描、信息收集)
Use with caution. You are responsible for your actions.
Developers assume no liability and are not responsible for any misuse or damage.
Error: required flag(s) "target" not set
Usage:
Jie webscan [flags]
Flags:
-h, --help help for webscan
--listen string use proxy resource collector, value is proxy addr, (example: 127.0.0.1:1111)
-p, --plugin strings Vulnerable Plugin, (example: --plugin xss,csrf,sql,bbscan ...) (default [XSS,SQL,CMD,XXE,SSRF,BRUTE,JSONP,CRLF,BBSCAN])
--poc strings specify the nuclei poc to run, separated by ','(example: test.yml,./test/*)
--show specifies whether the show the browser in headless mode
jie sudo ./Jie-Darwin-x64 webscan --listen 127.0.0.1:6000
██ ██║██║██╔══╝ ╚█████╔╝██║███████╗ ╚════╝ ╚═╝╚══════╝
Use with caution. You are responsible for your actions. Developers assume no liability and are not responsible for any misuse or damage.
Error: required flag(s) "target" not set Usage: Jie webscan [flags]
Flags: -h, --help help for webscan --listen string use proxy resource collector, value is proxy addr, (example: 127.0.0.1:1111) -p, --plugin strings Vulnerable Plugin, (example: --plugin xss,csrf,sql,bbscan ...) (default [XSS,SQL,CMD,XXE,SSRF,BRUTE,JSONP,CRLF,BBSCAN]) --poc strings specify the nuclei poc to run, separated by ','(example: test.yml,./test/*) --show specifies whether the show the browser in headless mode
Global Flags: --debug debug --proxy string proxy, (example: --proxy http://127.0.0.1:8080) -t, --target string target
required flag(s) "target" not set