@@ -53,15 +53,15 @@ def cmdLineParser():
5353 target .add_option ("-l" , dest = "list" , help = "Parse targets from Burp "
5454 "or WebScarab proxy logs" )
5555
56+ target .add_option ("-r" , dest = "requestFile" ,
57+ help = "Load HTTP request from a file" )
58+
5659 target .add_option ("-g" , dest = "googleDork" ,
5760 help = "Process Google dork results as target urls" )
5861
5962 target .add_option ("-c" , dest = "configFile" ,
6063 help = "Load options from a configuration INI file" )
61-
62- target .add_option ("-r" , dest = "requestFile" ,
63- help = "Load HTTP request from a file" )
64-
64+
6565 # Request options
6666 request = OptionGroup (parser , "Request" , "These options can be used "
6767 "to specify how to connect to the target url." )
@@ -75,7 +75,12 @@ def cmdLineParser():
7575 request .add_option ("--cookie" , dest = "cookie" ,
7676 help = "HTTP Cookie header" )
7777
78- request .add_option ("--drop-set-cookie" , dest = "dropSetCookie" , action = "store_true" ,
78+ request .add_option ("--cookie-urlencode" , dest = "cookieUrlencode" ,
79+ action = "store_true" ,
80+ help = "URL-encode generated cookie injections" )
81+
82+ request .add_option ("--drop-set-cookie" , dest = "dropSetCookie" ,
83+ action = "store_true" ,
7984 help = "Ignore Set-Cookie header from response" )
8085
8186 request .add_option ("--user-agent" , dest = "agent" ,
@@ -164,10 +169,6 @@ def cmdLineParser():
164169 help = "Matches to be excluded before "
165170 "comparing page contents" )
166171
167- injection .add_option ("--cookie-urlencode" , dest = "cookieUrlencode" ,
168- action = "store_true" ,
169- help = "URLEncode generated cookie injections" )
170-
171172 # Techniques options
172173 techniques = OptionGroup (parser , "Techniques" , "These options can "
173174 "be used to test for specific SQL injection "
0 commit comments