You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/_get_started/basic.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ noir -b <BASE_PATH>
24
24
25
25
## Outputs
26
26
27
-
The output will display endpoints (such as paths, methods, parameters, headers, etc.), and you can specify the output format using flags like `-f`.
27
+
The output will display endpoints (such as paths, methods, parameters, headers, etc.), and you can specify the output format using flags `-f` or `--format`. If you're curious about the supported formats, please refer to [this](/get_started/output/) document.
Copy file name to clipboardexpand all lines: docs/index.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ OWASP Noir is an open-source project, specializing in identifying attack surface
20
20
21
21
Noir is an open-source project dedicated to identifying attack surfaces, enhancing whitebox security testing, and optimizing security pipelines. It excels at discovering API endpoints, web endpoints, and other potential entry points within source code for comprehensive security analysis.
22
22
23
-

23
+

24
24
25
25
This tool was developed using [Crystal](https://crystal-lang.org). Initially started as hahwul's personal project[^1] in August 2023, it became an OWASP project[^2] in June 2024, co-led by [hahwul](https://github.com/hahwul) and [ksg](https://github.com/ksg97031).
0 commit comments