Options
Target
| Option |
Description |
<URLs> |
Target URLs (positional, supports multiple) |
| stdin |
Pipe URLs from other tools |
Request
| Option |
Default |
Description |
-m, --method |
POST |
HTTP method |
-t, --timeout |
10 |
Socket timeout in seconds |
-H, --header |
|
Custom header (repeatable) |
--vhost |
|
Virtual host for Host header |
--cookies |
|
Fetch and include cookies |
-d, --delay |
0 |
Delay between requests in milliseconds |
-j, --concurrency |
1 |
Number of URLs to scan concurrently |
-x, --proxy |
|
HTTP proxy URL (e.g., http://127.0.0.1:8080) |
Detection
| Option |
Default |
Description |
-c, --checks |
all |
Checks to run (comma-separated) |
-1, --exit-first |
|
Stop after first vulnerability |
--fingerprint |
|
Enable proxy fingerprinting |
--fuzz |
|
Enable mutation-based fuzzing |
--fuzz-seed |
42 |
Mutation seed for reproducibility |
--max-payloads |
|
Maximum payloads to test per check type |
--baseline-count |
3 |
Number of baseline requests for timing measurement |
Available checks: cl-te, te-cl, te-te, h2c, h2, cl-edge
Output
| Option |
Default |
Description |
-o, --output |
|
Save results to file |
-f, --format |
plain |
Output format: plain or json |
-V, --verbose |
|
Enable detailed logging |
-q, --quiet |
|
Quiet mode (only show vulnerabilities) |
--export-payloads |
|
Export vulnerable payloads to directory |
--no-color |
|
Disable colored output |
Exploitation
| Option |
Default |
Description |
-e, --exploit |
|
Exploit types (comma-separated) |
--exploit-ports |
22,80,443,8080,3306 |
Ports to test |
--exploit-wordlist |
|
Wordlist for path-fuzz |
Available exploits: localhost-access, path-fuzz
Examples
# Full scan with fingerprinting and fuzzing
smugglex --fingerprint --fuzz https://target.com
# Custom headers and timeout
smugglex -H "Authorization: Bearer token" -t 15 https://target.com
# Route through a proxy (e.g., Burp Suite)
smugglex -x http://127.0.0.1:8080 https://target.com
# Quick scan with limited payloads
smugglex --max-payloads 10 https://target.com
# Quiet mode — only show vulnerabilities
smugglex -q https://target.com
# Adjust baseline measurements for noisy networks
smugglex --baseline-count 5 https://target.com
# Exploit with custom ports
smugglex -e localhost-access --exploit-ports 80,8080,9090 https://target.com