Skip to content

Latest commit

 

History

History
36 lines (19 loc) · 644 Bytes

HOW-TO.md

File metadata and controls

36 lines (19 loc) · 644 Bytes

How to Guide

Example:

screenshot

Start up the tool

./RVuln

You can add this to /usr/bin if you want to access it anywhere

Target URL

Full URL without the parameters

Example: https://portswigger-labs.net/xss/xss.php

Query Parameters

Enter the query parameters

Put $ where you want the payload to go

Example: x=$&y=$&z=$

Path to Wordlist

Full path to wordlist

Example: /home/inc0gnit0/wordlists/super_awesome_payloads.txt

Verbose Output

Verbose on will show every request

Verbose off will only show payloads that are potentially vulnerable