# Install dependencies
make install
# Start ZAP container
make docker-upRecord a HAR file from your browser (F12 > Network > Export HAR) while browsing www.blahblah.com.
Save as: traffic.har
# Run all diagnostic attacks in one command
python cli.py diagnose traffic.har --target https://www.blahblah.com -o ./resultsThis runs:
- ZAP active scan (SQLi, XSS, etc.)
- HTTP smuggling tests (CL.TE, TE.CL)
- JWT vulnerability tests
- CORS misconfiguration tests
- Cache poisoning tests
- Red team attacks (mass assignment, hidden params, race conditions)
- Passive analysis (headers, PII, entropy)
python cli.py scan traffic.har --owasp --fail-fast --max-high 0python cli.py advanced traffic.har --allpython cli.py idor --session-a user1.har --session-b user2.harpython cli.py graphql traffic.har --introspection --batch-testpython cli.py websocket traffic.har --cswsh --fuzzReports generated in ./results/:
diagnostic_report.json- Full findingsdiagnostic_report.html- Human-readable reportadvanced_attacks.json- Advanced attack resultszap_alerts.json- ZAP findings
make run
# Open http://localhost:8501python cli.py diagnose traffic.har --fail-fast --max-high 0 --format sarifExit code 1 if critical vulnerabilities found.