Skip to content

Commit

Permalink
Merge pull request #15 from Major2000/main
Browse files Browse the repository at this point in the history
Update README.md
  • Loading branch information
Major2000 authored Dec 23, 2022
2 parents f2555e2 + 80215de commit c3b5494
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,17 @@ This is a simple Go program that can be used to test for XML External Entity (XX

## Usage

To use `XAT`, you need to specify the URL of the vulnerable server as a command line argument using the `-u` flag. The `-t` flag specifies the timeout for the HTTP request. The `-p` flag speifies the location of XML payload you want to inject.
To use `XAT`, you need to specify the URL of the vulnerable server as a command line argument using the `-u` flag.

Other flags usage:

| Flag | Function |
|:----:| -------- |
| `-t` | specifies the timeout for the HTTP request. |
| `-p` | speifies the location of XML payload you want to inject. |
| `-verbose` | print additional debugging information when running the tool. |

Example:

```
$ go run xat.go -u http://vulnerable-server.com/xxe-endpoint -t 60 -p /path/to/payloadFile.txt
Expand Down

0 comments on commit c3b5494

Please # to comment.