flagSet.SetDescription("Owncloud_bruteforcer - tool to bruteforce user")
// single flag example
// flagSet.StringVarP(&options.Target, "t", "target", "", "target host or IP to scan")
flagSet.CreateGroup("input","Input",
flagSet.StringVarP(&options.URL,"u","url","","target's url to login page. Example \"https://example.com/index.php/login, http://example.com/login \""),
// flagSet.StringVarP(&options.RateLimit, "rt", "rate", "", "rate limit packets per second"),
// flagSet.StringVarP(&options.Header, "u", "url", "", "target's url to login page. Example \"https://example.com/index.php/login, http://example.com/login \""),
flagSet.StringVarP(&options.User,"l","login","admin","username to bruteforce"),
flagSet.StringVarP(&options.Proxy,"x","proxy","","HTTP proxy for packet inspection (Burp/Caidu/ZAP) (for example http://127.0.0.1:8080). But be aware, if you enable inspection then attack will fail because of delays. Also expect bigger CPU/RAM usage, use for testing"),
flagSet.IntVarP(&options.Threads,"t","threads",10,"threads to bruteforce (expect ~7 packets/s per thread, but rate limited by web-server or reverese-proxy to 40 pps)"),//TODO add estimate counter to packets/s