From b30a9dfd2fedeb168d87099c4b2d95406fb19893 Mon Sep 17 00:00:00 2001 From: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com> Date: Tue, 6 Jun 2023 19:36:05 +0700 Subject: [PATCH] Update README.md --- http/credential-stuffing/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/credential-stuffing/README.md b/http/credential-stuffing/README.md index 3f907ff796..79be6e9d37 100644 --- a/http/credential-stuffing/README.md +++ b/http/credential-stuffing/README.md @@ -36,7 +36,7 @@ In this case, you also need to provide the hostname/IP of the deployed instance By default, Nuclei uses Pitchfork mode in which it takes the first line from `email.txt` as the username input and the first line from `pass.txt` as the password parameter input. Ensure that both `email.txt` and `pass.txt` have an equal number of entries, with email/password combinations aligned on the same line in both files. -Starting with Nuclei 2.8, you can override the default behavior using the `-at` or `--attack-type` CLI option. Specifying the attack-type option as `clusterbomb` enables convenient verification of weak credentials for a list of given email addresses across various services. +Starting with Nuclei 2.8, you can override the default behavior using the `-at` or `-attack-type` CLI option. Specifying the attack-type option as `clusterbomb` enables convenient verification of weak credentials for a list of given email addresses across various services. For example, assuming `email.txt` contains: