Codebase list python-faraday / 1123f24
Remove useless fplugin.1 Sophie Brun 3 years ago
1 changed file(s) with 0 addition(s) and 76 deletion(s). Raw diff Collapse all Expand all
+0
-76
debian/manpages/fplugin.1 less more
0 .TH FPLUGIN "1" "June 2019" "User Commands"
1 .SH NAME
2 fplugin \- for faraday
3 .SH SYNOPSIS
4 fplugin [\-h] [\-i] [\-w WORKSPACE] [\-u URL] \fB\-\-username\fR USERNAME
5 \fB\-\-password\fR PASSWORD
6 [command]
7 .SH DESCRIPTION
8 Using our plugin you can do different actions in the command line
9 and interact with Faraday. Faraday comes with some presets for bulk
10 actions such as object removal, get object information, etc.
11 Any parameter not recognized by fplugin, or everything after \fB\-\-\fR will be passed on
12 to the called script.
13 .SH OPTIONS
14 .TP
15 \fB\-h\fR, \fB\-\-help\fR
16 show this help message and exit
17 .TP
18 \fB\-i\fR, \fB\-\-interactive\fR
19 Run in interactive mode (default: False)
20 .TP
21 \fB\-w\fR WORKSPACE, \fB\-\-workspace\fR WORKSPACE
22 Workspace to use (default: untitled)
23 .TP
24 \fB\-u\fR URL, \fB\-\-url\fR URL
25 Faraday Server URL. Example: http://localhost:5985
26 (default: http://localhost:5985)
27 .HP
28 \fB\-\-username\fR USERNAME
29 .HP
30 \fB\-\-password\fR PASSWORD
31 .SH AVAILABLE SCRIPTS
32 .TP
33 \- autoclose_vulns: Closes vulns from the current workspace if a certain time has passed
34 .TP
35 \- change_vuln_status: Changes Vulns Status (to closed)
36 .TP
37 \- create_cred: Creates new credentials
38 .TP
39 \- create_host: Creates a new host in current workspace
40 .TP
41 \- create_service: Creates a new service in a specified interface
42 .TP
43 \- create_vuln: Creates a new vulnerability
44 .TP
45 \- create_vulnweb: Creates a new website vulnerability in a specified service
46 .TP
47 \- del_all_hosts: Deletes all stored hosts
48 .TP
49 \- del_all_services_closed: Deletes all services with a non open port
50 .TP
51 \- del_all_vulns_with: Delete all vulnerabilities matched with regex
52 .TP
53 \- fbruteforce_services: Script to perform a brute force attack on different services in a workspace
54 .TP
55 \- filter_services: Filter services by port or service name
56 .TP
57 \- get_all_ips: Get all scanned interfaces
58 .TP
59 \- get_severitiy_by_cwe: Get Vulns filtered by Severity and change Severity based in CWE
60 .TP
61 \- import_csv: Import Faraday objects from CSV file
62 .TP
63 \- import_pcap: Import every host found in a PCAP file for further scanning
64 .TP
65 \- list_creds: Get all stored credentials
66 .TP
67 \- list_hosts: List hosts
68 .TP
69 \- list_ips: List all scanned IPs
70 .TP
71 \- list_os: Lists all scanned OSs
72 .TP
73 \- screenshot_server: Takes a Screenshot of the ip:ports of a given protocol
74 .SH "SEE ALSO"
75 /usr/share/doc/python-faraday/README.Debian