tool_id specifies which scanner to run. Valid values:| Tool | tool_id |
|---|---|
| Subdomain Finder | 20 |
| WHOIS | 30 |
| Port Scanner | 70 |
| URL Fuzzer | 90 |
| Virtual Hosts Finder | 160 |
| Website Scanner | 170 |
| ICMP Ping | 240 |
| SharePoint Scanner | 260 |
| WordPress Scanner | 270 |
| Drupal Scanner | 280 |
| Joomla Scanner | 290 |
| Website Recon | 310 |
| Subdomain Takeover | 320 |
| Network Scanner | 350 |
| SQLi Exploiter | 380 |
| Domain Finder | 390 |
| Password Auditor | 400 |
| SSL/TLS Scanner | 450 |
| Sniper | 490 |
| WAF Detector | 500 |
| API Scanner | 510 |
| Cloud Scanner | 520 |
| People Hunter | 530 |
| Kubernetes Scanner | 540 |
Use the "API key" from the profile page as the token
only one of target_id and target_name should be used
only one of target_id and target_name should be used
Workspace where the scan is started. It has to match the workspace ID of the target
VPN profile to use for the scan. If null, there will be no VPN profile used. If not specified, the profile attached to the workspace will be used.
Maximum number of minutes that the scan should run. Not supported by: Sniper, tools with short scan duration (like Website Recon or ICMP Ping).
1 <= x <= 1440Send the report in a specific format to this URL when the scan finishes
If true, the original URL is passed to the scanner, even if it redirects. If false, the redirected URL will be scanned instead.
Possible values:
none - the target is passed directly to the scannercheck_accessibility - the target is checked for accessibility and an error is thrown on any redirectsame_host - only redirects within the same host are allowedsame_domain - redirects to subdomains are allowedallow_all - any redirects are allowednone, check_accessibility, same_host, same_domain, allow_all Created