Merge pull request #9378 from projectdiscovery/fuzz-tags

reverted bruteforce tags to fuzz
patch-1
Dhiyaneshwaran 2024-03-19 22:08:19 +05:30 committed by GitHub
commit 48e8151038
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
40 changed files with 41 additions and 41 deletions

View File

@ -16,7 +16,6 @@ tags:
- "fuzz" - "fuzz"
- "dos" - "dos"
- "local" - "local"
- "brute-force"
- "bruteforce" - "bruteforce"
# The following templates have been excluded because they have weak matchers and may generate FP results. # The following templates have been excluded because they have weak matchers and may generate FP results.

View File

@ -9,7 +9,7 @@ info:
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
tags: cloud,cloud-enum,azure,bruteforce,enum tags: cloud,cloud-enum,azure,fuzz,enum
self-contained: true self-contained: true

View File

@ -20,7 +20,7 @@ type:
exclude-tags: exclude-tags:
- tech - tech
- dos - dos
- brute-force - fuzz
- creds-stuffing - creds-stuffing
- token-spray - token-spray
- osint - osint

View File

@ -15,5 +15,5 @@ type:
exclude-tags: exclude-tags:
- dos - dos
- brute-force - fuzz
- osint - osint

View File

@ -20,7 +20,7 @@ type:
exclude-tags: exclude-tags:
- tech - tech
- dos - dos
- brute-force - fuzz
- creds-stuffing - creds-stuffing
- token-spray - token-spray
- osint - osint

View File

@ -28,7 +28,7 @@ info:
max-request: 65 max-request: 65
vendor: embedthis vendor: embedthis
product: goahead product: goahead
tags: cve,cve2017,rce,goahead,bruteforce,kev,vulhub,embedthis tags: cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis
http: http:
- raw: - raw:

View File

@ -27,7 +27,7 @@ info:
max-request: 100 max-request: 100
vendor: zabbix vendor: zabbix
product: zabbix product: zabbix
tags: cve2019,cve,bruteforce,auth-bypass,login,edb,zabbix tags: cve2019,cve,fuzz,auth-bypass,login,edb,zabbix
http: http:
- raw: - raw:

View File

@ -28,7 +28,7 @@ info:
vendor: automattic vendor: automattic
product: sensei_lms product: sensei_lms
framework: wordpress framework: wordpress
tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,bruteforce,hackerone,wordpress,wp-plugin,automattic tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic
http: http:
- method: GET - method: GET

View File

@ -29,7 +29,7 @@ info:
vendor: anti-malware_security_and_brute-force_firewall_project vendor: anti-malware_security_and_brute-force_firewall_project
product: anti-malware_security_and_brute-force_firewall product: anti-malware_security_and_brute-force_firewall
framework: wordpress framework: wordpress
tags: cve,cve2022,wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,anti-malware_security_and_brute-force_firewall_project tags: cve,cve2022,wordpress,wp-plugin,xss,gotmls,authenticated,wpscan
http: http:
- raw: - raw:

View File

@ -28,7 +28,7 @@ info:
vendor: citrix vendor: citrix
product: sharefile_storage_zones_controller product: sharefile_storage_zones_controller
shodan-query: title:"ShareFile Storage Server" shodan-query: title:"ShareFile Storage Server"
tags: cve2023,cve,sharefile,rce,intrusive,fileupload,bruteforce,kev,citrix tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix
variables: variables:
fileName: '{{rand_base(8)}}' fileName: '{{rand_base(8)}}'

View File

@ -16,7 +16,7 @@ info:
verified: true verified: true
max-request: 200 max-request: 200
shodan-query: title:"Oracle PeopleSoft Sign-in" shodan-query: title:"Oracle PeopleSoft Sign-in"
tags: default-login,peoplesoft,oracle,bruteforce tags: default-login,peoplesoft,oracle,fuzz
http: http:
- method: POST - method: POST

View File

@ -19,7 +19,7 @@ info:
vendor: adminer vendor: adminer
product: adminer product: adminer
max-request: 741 max-request: 741
tags: panel,bruteforce,adminer,login,sqli tags: panel,fuzz,adminer,login,sqli
http: http:
- raw: - raw:

View File

@ -7,7 +7,7 @@ info:
description: PHP Source File is disclosed to external users. description: PHP Source File is disclosed to external users.
metadata: metadata:
max-request: 1512 max-request: 1512
tags: exposure,backup,php,disclosure,bruteforce tags: exposure,backup,php,disclosure,fuzz
http: http:
- method: GET - method: GET

View File

@ -9,7 +9,7 @@ info:
- https://portswigger.net/web-security/web-cache-poisoning - https://portswigger.net/web-security/web-cache-poisoning
metadata: metadata:
max-request: 5834 max-request: 5834
tags: fuzzing,bruteforce,cache tags: fuzz,cache
http: http:
- raw: - raw:

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-77 cwe-id: CWE-77
metadata: metadata:
max-request: 7650 max-request: 7650
tags: fuzzing,bruteforce,rce tags: fuzz,rce
http: http:
- raw: - raw:

View File

@ -15,7 +15,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 4 max-request: 4
tags: bruteforce,edb tags: iis,edb
http: http:
- raw: - raw:

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 22 max-request: 22
tags: fuzzing,linux,lfi,bruteforce tags: linux,lfi,fuzzing
http: http:
- method: GET - method: GET

View File

@ -13,7 +13,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 341 max-request: 341
tags: bruteforce,mdb,asp tags: fuzz,mdb,asp
http: http:
- raw: - raw:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
max-request: 639 max-request: 639
tags: fuzzing,bruteforce,prestashop tags: fuzz,prestashop
http: http:
- raw: - raw:

View File

@ -10,7 +10,7 @@ info:
- https://twitter.com/ImoJOnDz/status/1649089777629827072 - https://twitter.com/ImoJOnDz/status/1649089777629827072
metadata: metadata:
max-request: 9 max-request: 9
tags: ssrf,proxy,oast,bruteforce tags: ssrf,proxy,oast,fuzz
http: http:
- payloads: - payloads:

View File

@ -8,7 +8,7 @@ info:
- https://github.com/dievus/geeMailUserFinder - https://github.com/dievus/geeMailUserFinder
metadata: metadata:
max-request: 1 max-request: 1
tags: bruteforce,gmail tags: fuzzing,gmail
self-contained: true self-contained: true

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 58 max-request: 58
tags: fuzzing,waf,tech,bruteforce tags: waf,tech,fuzz
http: http:
- raw: - raw:

View File

@ -5,8 +5,8 @@ info:
author: 0xcrypto author: 0xcrypto
severity: info severity: info
metadata: metadata:
max-request: 100563 max-request: 98135
tags: fuzzing,bruteforce,wordpress tags: fuzz,wordpress
http: http:
- raw: - raw:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
max-request: 24434 max-request: 24434
tags: bruteforce,wordpress,wp tags: fuzz,wordpress
http: http:
- raw: - raw:

View File

@ -14,7 +14,7 @@ info:
cwe-id: CWE-1391 cwe-id: CWE-1391
metadata: metadata:
max-request: 276 max-request: 276
tags: wordpress,default-login,bruteforce tags: wordpress,default-login,fuzz
http: http:
- raw: - raw:

View File

@ -7,7 +7,7 @@ info:
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header. description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
metadata: metadata:
max-request: 3 max-request: 3
tags: fuzzing,bruteforce tags: fuzzing
http: http:
- raw: - raw:

View File

@ -16,7 +16,7 @@ info:
metadata: metadata:
verified: true verified: true
max-request: 85 max-request: 85
tags: misc,defacement,spam,hacktivism,bruteforce tags: misc,defacement,spam,hacktivism,fuzz
http: http:
- method: GET - method: GET

View File

@ -8,7 +8,7 @@ info:
- https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666 - https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666
metadata: metadata:
max-request: 47 max-request: 47
tags: miscellaneous,misc,bruteforce,windows tags: miscellaneous,misc,fuzz,windows
http: http:
- raw: - raw:

View File

@ -8,7 +8,7 @@ info:
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: http.component:"Adobe Experience Manager" shodan-query: http.component:"Adobe Experience Manager"
tags: aem,bruteforce,misconfig tags: aem,misconfig
http: http:
- method: GET - method: GET

View File

@ -9,7 +9,7 @@ info:
metadata: metadata:
max-request: 100 max-request: 100
shodan-query: http.title:"GitLab" shodan-query: http.title:"GitLab"
tags: gitlab,enum,misconfig,bruteforce tags: gitlab,enum,misconfig,fuzz
http: http:
- raw: - raw:

View File

@ -16,7 +16,7 @@ info:
cwe-id: CWE-441 cwe-id: CWE-441
metadata: metadata:
max-request: 25 max-request: 25
tags: exposure,config,proxy,misconfig,bruteforce tags: exposure,config,proxy,misconfig,fuzz
http: http:
- raw: - raw:

View File

@ -16,7 +16,7 @@ info:
cwe-id: CWE-441 cwe-id: CWE-441
metadata: metadata:
max-request: 6 max-request: 6
tags: exposure,config,proxy,misconfig,bruteforce tags: exposure,config,proxy,misconfig,fuzz
http: http:
- raw: - raw:

View File

@ -16,7 +16,7 @@ info:
cwe-id: CWE-441 cwe-id: CWE-441
metadata: metadata:
max-request: 8 max-request: 8
tags: exposure,config,proxy,misconfig,bruteforce tags: exposure,config,proxy,misconfig,fuzz
http: http:
- raw: - raw:

View File

@ -13,7 +13,7 @@ info:
verified: true verified: true
max-request: 50 max-request: 50
shodan-query: Graylog shodan-query: Graylog
tags: tech,graylog,api,swagger,bruteforce tags: tech,graylog,api,swagger,fuzz
http: http:
- method: GET - method: GET

View File

@ -14,7 +14,7 @@ info:
shodan-query: title:"通达OA" shodan-query: title:"通达OA"
fofa-query: title="通达OA" fofa-query: title="通达OA"
zoomeye-query: app:"通达OA" zoomeye-query: app:"通达OA"
tags: tongda,auth-bypass,bruteforce tags: tongda,auth-bypass,fuzz
http: http:
- raw: - raw:

View File

@ -10,7 +10,7 @@ info:
- https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/ - https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/
metadata: metadata:
max-request: 276 max-request: 276
tags: wordpress,php,xmlrpc,bruteforce tags: wordpress,php,xmlrpc,fuzz
http: http:
- raw: - raw:

View File

@ -29,7 +29,8 @@ info:
verified: true verified: true
vendor: vmware vendor: vmware
product: aria_operations_for_networks product: aria_operations_for_networks
tags: js,packetstorm,cve,cve2019,vmware,aria,rce,bruteforce,vrealize tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize
variables: variables:
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory

View File

@ -7,7 +7,7 @@ info:
metadata: metadata:
max-request: 223 max-request: 223
shodan-query: port:1433 shodan-query: port:1433
tags: js,ssh,default-login,network,bruteforce tags: js,ssh,default-login,network,fuzz
javascript: javascript:
- pre-condition: | - pre-condition: |

View File

@ -12,7 +12,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 1 max-request: 1
tags: network,mysql,bruteforce,db,misconfig tags: network,mysql,db,misconfig
tcp: tcp:
- host: - host:

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 1 max-request: 1
tags: network,tidb,bruteforce,db,misconfig tags: network,tidb,db,misconfig
tcp: tcp:
- host: - host: