wapiti -h
ules] [–update] [-l LEVEL]
[-p PROXY_URL] [–tor] [-a CREDENTIALS]
[–auth-type {basic,digest,kerberos,ntlm,post}]
[-c COOKIE_FILE] [–skip-crawl] [–resume-crawl]
[–flush-attacks] [–flush-session] [–store-session PATH]
[–store-config PATH] [-s URL] [-x URL] [-r PARAMETER]
[–skip PARAMETER] [-d DEPTH] [–max-links-per-page MAX]
[–max-files-per-dir MAX] [–max-scan-time SECONDS]
[–max-attack-time SECONDS] [–max-parameters MAX] [-S FORCE]
[-t SECONDS] [-H HEADER] [-A AGENT] [–verify-ssl {0,1}]
[–color] [-v LEVEL] [-f FORMAT] [-o OUPUT_PATH]
[–external-endpoint EXTERNAL_ENDPOINT_URL]
[–internal-endpoint INTERNAL_ENDPOINT_URL]
[–endpoint ENDPOINT_URL] [–no-bugreport] [–version]
Wapiti-3.0.4: Web application vulnerability scanner
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL The base URL used to define the scan s