GitHub
ESC

Pipeline

smugglex reads URLs from stdin, making it easy to integrate into security testing pipelines.

With subfinder + httpx

subfinder -d target.com | httpx | smugglex

From a file

cat urls.txt | smugglex -f json -o results.json

With custom recon

echo "https://target.com" | smugglex -c cl-te,te-cl --fingerprint

JSON Processing

Pipe JSON output to jq for filtering:

smugglex -f json https://target.com | jq '.checks[] | select(.vulnerable)'

Through a Proxy

Route all traffic through an intercepting proxy like Burp Suite:

cat urls.txt | smugglex -x http://127.0.0.1:8080

CI/CD Integration

Use quiet mode and JSON output for automated security checks:

smugglex -q -f json -o report.json https://staging.example.com
# Process report.json in your pipeline

Fast Scan for Large Target Lists

Limit payloads per check type and increase concurrency for faster scans:

cat urls.txt | smugglex -j 5 --max-payloads 20 -q