GitHub
ESC

Options

Target

Option Description
<URLs> Target URLs (positional, supports multiple)
stdin Pipe URLs from other tools

Request

Option Default Description
-m, --method POST HTTP method
-t, --timeout 10 Socket timeout in seconds
-H, --header Custom header (repeatable)
--vhost Virtual host for Host header
--cookies Fetch and include cookies
-d, --delay 0 Delay between requests in milliseconds
-j, --concurrency 1 Number of URLs to scan concurrently
-x, --proxy HTTP proxy URL (e.g., http://127.0.0.1:8080)

Detection

Option Default Description
-c, --checks all Checks to run (comma-separated)
-1, --exit-first Stop after first vulnerability
--fingerprint Enable proxy fingerprinting
--fuzz Enable mutation-based fuzzing
--fuzz-seed 42 Mutation seed for reproducibility
--max-payloads Maximum payloads to test per check type
--baseline-count 3 Number of baseline requests for timing measurement

Available checks: cl-te, te-cl, te-te, h2c, h2, cl-edge

Output

Option Default Description
-o, --output Save results to file
-f, --format plain Output format: plain or json
-V, --verbose Enable detailed logging
-q, --quiet Quiet mode (only show vulnerabilities)
--export-payloads Export vulnerable payloads to directory
--no-color Disable colored output

Exploitation

Option Default Description
-e, --exploit Exploit types (comma-separated)
--exploit-ports 22,80,443,8080,3306 Ports to test
--exploit-wordlist Wordlist for path-fuzz

Available exploits: localhost-access, path-fuzz

Examples

# Full scan with fingerprinting and fuzzing
smugglex --fingerprint --fuzz https://target.com

# Custom headers and timeout
smugglex -H "Authorization: Bearer token" -t 15 https://target.com

# Route through a proxy (e.g., Burp Suite)
smugglex -x http://127.0.0.1:8080 https://target.com

# Quick scan with limited payloads
smugglex --max-payloads 10 https://target.com

# Quiet mode — only show vulnerabilities
smugglex -q https://target.com

# Adjust baseline measurements for noisy networks
smugglex --baseline-count 5 https://target.com

# Exploit with custom ports
smugglex -e localhost-access --exploit-ports 80,8080,9090 https://target.com