diff --git a/README.md b/README.md index 51c99e4..4e8e415 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ -[![Release](https://img.shields.io/github/release/Hackmanit/Web-Cache-Vulnerability-Scanner.svg?color=brightgreen)](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/releases) +[![Release](https://img.shields.io/github/release/Hackmanit/Web-Cache-Vulnerability-Scanner.svg?color=brightgreen)](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/releases/latest) [![GitHub go.mod Go version](https://img.shields.io/github/go-mod/go-version/Hackmanit/Web-Cache-Vulnerability-Scanner)](https://golang.org/) [![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://www.apache.org/licenses/LICENSE-2.0) @@ -58,6 +58,34 @@ go1.17 go install -v github.com/Hackmanit/Web-Cache-Vulnerability-Scanner@latest ``` +## Option 3: Docker +### 1. Clone repository or download the [latest source code release](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/releases/latest) +### 2. Build image (the wordlists folder will also be copied) +``` +$ docker build . +Sending build context to Docker daemon 29.54MB +Step 1/10 : FROM golang:latest AS builder + ---> 05c8f6d2538a +Step 2/10 : WORKDIR /go/src/app + ---> Using cache + ---> f591f24be8cf +Step 3/10 : COPY . . + ---> 38b358dd3472 +Step 4/10 : RUN go get -d -v ./... + ---> Running in 41f53de436c5 +.... +Removing intermediate container 9e2e84d14ff3 + ---> 1668edcf6ee3 +Successfully built 1668edcf6ee3 +``` + +### 3. Run wcvs +``` +$ docker run -it 1668edcf6ee3 /wcvs --help +https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner +version 1.0.0 +``` + # Usage WCVS is highly customizable using its flags. Many of the flags can either contain a value directly or the path to a file.