@@ -99,16 +99,16 @@ def cmdLineParser(argv=None):
9999 help = "Force usage of given HTTP method (e.g. PUT)" )
100100
101101 request .add_option ("--data" , dest = "data" ,
102- help = "Data string to be sent through POST" )
102+ help = "Data string to be sent through POST (e.g. \" id=1 \" ) " )
103103
104104 request .add_option ("--param-del" , dest = "paramDel" ,
105- help = "Character used for splitting parameter values" )
105+ help = "Character used for splitting parameter values (e.g. &) " )
106106
107107 request .add_option ("--cookie" , dest = "cookie" ,
108- help = "HTTP Cookie header value" )
108+ help = "HTTP Cookie header value (e.g. \" PHPSESSID=a8d127e.. \" ) " )
109109
110110 request .add_option ("--cookie-del" , dest = "cookieDel" ,
111- help = "Character used for splitting cookie values" )
111+ help = "Character used for splitting cookie values (e.g. ;) " )
112112
113113 request .add_option ("--load-cookies" , dest = "loadCookies" ,
114114 help = "File containing cookies in Netscape/wget format" )
@@ -144,7 +144,7 @@ def cmdLineParser(argv=None):
144144 help = "HTTP authentication PEM cert/private key file" )
145145
146146 request .add_option ("--ignore-code" , dest = "ignoreCode" , type = "int" ,
147- help = "Ignore HTTP error code (e.g. 401)" )
147+ help = "Ignore (problematic) HTTP error code (e.g. 401)" )
148148
149149 request .add_option ("--ignore-proxy" , dest = "ignoreProxy" , action = "store_true" ,
150150 help = "Ignore system default proxy settings" )
@@ -617,7 +617,7 @@ def cmdLineParser(argv=None):
617617 help = "Run host OS command(s) when SQL injection is found" )
618618
619619 miscellaneous .add_option ("--answers" , dest = "answers" ,
620- help = "Set question answers (e.g. \" quit=N,follow=N\" )" )
620+ help = "Set predefined answers (e.g. \" quit=N,follow=N\" )" )
621621
622622 miscellaneous .add_option ("--beep" , dest = "beep" , action = "store_true" ,
623623 help = "Beep on question and/or when SQL injection is found" )
0 commit comments