From 9678672f130f3b157b08862130a71dbe6063b300 Mon Sep 17 00:00:00 2001 From: el-queso Date: Wed, 19 Oct 2022 14:32:00 +0300 Subject: [PATCH] Fixed Issue #7 --- ArgumentHandler.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ArgumentHandler.py b/ArgumentHandler.py index 4e90556..4828423 100644 --- a/ArgumentHandler.py +++ b/ArgumentHandler.py @@ -147,7 +147,7 @@ def ConfigureParser(self): parser.add_argument('--creds', nargs='?', dest="creds", metavar='user:pass', help='The credentials to login', type=str) parser.add_argument('-p', '--enable-proxies', dest="enabled_proxies", action='store_true', help="""Enable proxy redirection. Default proxies are free and you can change them. If you don't want the default proxies you can supply your own and this option will be overridden! Note that the proxies will be picked at random for each request""") parser.add_argument('--autopwn', dest='autopwn', metavar='IP', help="If the webapp is vulnerable to LFI then it will attempt to exploit it and give back a shell. This option requires your IP in order to connect with the revshell", type=str) - parser.add_argument('-m', '--mode', dest='mode', metavar='Payload', help='Select the payload that suits best. Try different ones if the exploit doesn\'t work.', type=int) + parser.add_argument('-m', '--mode', dest='mode', metavar='Payload', help='Select the payload that suits best. Try different ones if the exploit doesn\'t work.', type=str) parser.add_argument('-f', '--force', dest='force', help="Treat endpoint as alive even if it returns 404", action='store_true') parser.add_argument('--update', dest='update', help="Update LFITester", action='store_true') parser.add_argument('--batch-ans', dest='batch', help="Answer all yes/no", type=str)