replaced fuzz tag to brute-force
parent
521a044901
commit
652903d374
|
@ -9,7 +9,7 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
verified: true
|
||||||
max-request: 1
|
max-request: 1
|
||||||
tags: cloud,cloud-enum,azure,fuzz,enum
|
tags: cloud,cloud-enum,azure,brute-force,enum
|
||||||
|
|
||||||
self-contained: true
|
self-contained: true
|
||||||
|
|
||||||
|
|
|
@ -20,7 +20,7 @@ type:
|
||||||
exclude-tags:
|
exclude-tags:
|
||||||
- tech
|
- tech
|
||||||
- dos
|
- dos
|
||||||
- fuzz
|
- brute-force
|
||||||
- creds-stuffing
|
- creds-stuffing
|
||||||
- token-spray
|
- token-spray
|
||||||
- osint
|
- osint
|
|
@ -15,5 +15,5 @@ type:
|
||||||
|
|
||||||
exclude-tags:
|
exclude-tags:
|
||||||
- dos
|
- dos
|
||||||
- fuzz
|
- brute-force
|
||||||
- osint
|
- osint
|
|
@ -20,7 +20,7 @@ type:
|
||||||
exclude-tags:
|
exclude-tags:
|
||||||
- tech
|
- tech
|
||||||
- dos
|
- dos
|
||||||
- fuzz
|
- brute-force
|
||||||
- creds-stuffing
|
- creds-stuffing
|
||||||
- token-spray
|
- token-spray
|
||||||
- osint
|
- osint
|
||||||
|
|
|
@ -28,7 +28,7 @@ info:
|
||||||
max-request: 65
|
max-request: 65
|
||||||
vendor: embedthis
|
vendor: embedthis
|
||||||
product: goahead
|
product: goahead
|
||||||
tags: cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis
|
tags: cve,cve2017,rce,goahead,brute-force,kev,vulhub,embedthis
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -27,7 +27,7 @@ info:
|
||||||
max-request: 100
|
max-request: 100
|
||||||
vendor: zabbix
|
vendor: zabbix
|
||||||
product: zabbix
|
product: zabbix
|
||||||
tags: cve2019,cve,fuzz,auth-bypass,login,edb,zabbix
|
tags: cve2019,cve,brute-force,auth-bypass,login,edb,zabbix
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -28,7 +28,7 @@ info:
|
||||||
vendor: automattic
|
vendor: automattic
|
||||||
product: sensei_lms
|
product: sensei_lms
|
||||||
framework: wordpress
|
framework: wordpress
|
||||||
tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic
|
tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,brute-force,hackerone,wordpress,wp-plugin,automattic
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -28,7 +28,7 @@ info:
|
||||||
vendor: citrix
|
vendor: citrix
|
||||||
product: sharefile_storage_zones_controller
|
product: sharefile_storage_zones_controller
|
||||||
shodan-query: title:"ShareFile Storage Server"
|
shodan-query: title:"ShareFile Storage Server"
|
||||||
tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix
|
tags: cve2023,cve,sharefile,rce,intrusive,fileupload,brute-force,kev,citrix
|
||||||
variables:
|
variables:
|
||||||
fileName: '{{rand_base(8)}}'
|
fileName: '{{rand_base(8)}}'
|
||||||
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ info:
|
||||||
verified: true
|
verified: true
|
||||||
max-request: 200
|
max-request: 200
|
||||||
shodan-query: title:"Oracle PeopleSoft Sign-in"
|
shodan-query: title:"Oracle PeopleSoft Sign-in"
|
||||||
tags: default-login,peoplesoft,oracle,fuzz
|
tags: default-login,peoplesoft,oracle,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: POST
|
- method: POST
|
||||||
|
|
|
@ -17,7 +17,7 @@ info:
|
||||||
# Is generally handy if you find SQL creds
|
# Is generally handy if you find SQL creds
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 741
|
max-request: 741
|
||||||
tags: panel,fuzz,adminer,login,sqli
|
tags: panel,brute-force,adminer,login,sqli
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: PHP Source File is disclosed to external users.
|
description: PHP Source File is disclosed to external users.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1512
|
max-request: 1512
|
||||||
tags: exposure,backup,php,disclosure,fuzz
|
tags: exposure,backup,php,disclosure,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
- https://portswigger.net/web-security/web-cache-poisoning
|
- https://portswigger.net/web-security/web-cache-poisoning
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 5834
|
max-request: 5834
|
||||||
tags: fuzzing,fuzz,cache
|
tags: fuzzing,brute-force,cache
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -11,7 +11,7 @@ info:
|
||||||
cwe-id: CWE-77
|
cwe-id: CWE-77
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 7650
|
max-request: 7650
|
||||||
tags: fuzzing,fuzz,rce
|
tags: fuzzing,brute-force,rce
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -15,7 +15,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 4
|
max-request: 4
|
||||||
tags: fuzzing,fuzz,edb
|
tags: brute,edb
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -11,7 +11,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 22
|
max-request: 22
|
||||||
tags: fuzzing,linux,lfi,fuzz
|
tags: fuzzing,linux,lfi,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -13,7 +13,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 341
|
max-request: 341
|
||||||
tags: fuzzing,fuzz,mdb,asp
|
tags: brute,mdb,asp
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 639
|
max-request: 639
|
||||||
tags: fuzzing,fuzz,prestashop
|
tags: fuzzing,brute-force,prestashop
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
- https://twitter.com/ImoJOnDz/status/1649089777629827072
|
- https://twitter.com/ImoJOnDz/status/1649089777629827072
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 9
|
max-request: 9
|
||||||
tags: fuzzing,ssrf,proxy,oast,fuzz
|
tags: ssrf,proxy,oast,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- payloads:
|
- payloads:
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
- https://github.com/dievus/geeMailUserFinder
|
- https://github.com/dievus/geeMailUserFinder
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 1
|
||||||
tags: fuzzing,fuzz,gmail
|
tags: brute-force,gmail
|
||||||
|
|
||||||
self-contained: true
|
self-contained: true
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 58
|
max-request: 58
|
||||||
tags: fuzzing,waf,tech,fuzz
|
tags: fuzzing,waf,tech,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 98135
|
max-request: 98135
|
||||||
tags: fuzzing,fuzz,wordpress
|
tags: fuzzing,brute-force,wordpress
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 24434
|
max-request: 24434
|
||||||
tags: fuzzing,fuzz,wordpress
|
tags: brute,wordpress,wp
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -14,7 +14,7 @@ info:
|
||||||
cwe-id: CWE-1391
|
cwe-id: CWE-1391
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 276
|
max-request: 276
|
||||||
tags: fuzzing,wordpress,default-login,fuzz
|
tags: wordpress,default-login,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
|
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 3
|
max-request: 3
|
||||||
tags: fuzzing,fuzz
|
tags: fuzzing,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -16,7 +16,7 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
verified: true
|
||||||
max-request: 85
|
max-request: 85
|
||||||
tags: misc,defacement,spam,hacktivism,fuzz
|
tags: misc,defacement,spam,hacktivism,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
- https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666
|
- https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 47
|
max-request: 47
|
||||||
tags: miscellaneous,misc,fuzz,windows
|
tags: miscellaneous,misc,brute-force,windows
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 1
|
||||||
shodan-query: http.component:"Adobe Experience Manager"
|
shodan-query: http.component:"Adobe Experience Manager"
|
||||||
tags: aem,bruteforce,misconfig
|
tags: aem,brute-force,misconfig
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 100
|
max-request: 100
|
||||||
shodan-query: http.title:"GitLab"
|
shodan-query: http.title:"GitLab"
|
||||||
tags: gitlab,enum,misconfig,fuzz
|
tags: gitlab,enum,misconfig,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -16,7 +16,7 @@ info:
|
||||||
cwe-id: CWE-441
|
cwe-id: CWE-441
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 25
|
max-request: 25
|
||||||
tags: exposure,config,proxy,misconfig,fuzz
|
tags: exposure,config,proxy,misconfig,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -16,7 +16,7 @@ info:
|
||||||
cwe-id: CWE-441
|
cwe-id: CWE-441
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 6
|
max-request: 6
|
||||||
tags: exposure,config,proxy,misconfig,fuzz
|
tags: exposure,config,proxy,misconfig,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -16,7 +16,7 @@ info:
|
||||||
cwe-id: CWE-441
|
cwe-id: CWE-441
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 8
|
max-request: 8
|
||||||
tags: exposure,config,proxy,misconfig,fuzz
|
tags: exposure,config,proxy,misconfig,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -13,7 +13,7 @@ info:
|
||||||
verified: true
|
verified: true
|
||||||
max-request: 50
|
max-request: 50
|
||||||
shodan-query: Graylog
|
shodan-query: Graylog
|
||||||
tags: tech,graylog,api,swagger,fuzz
|
tags: tech,graylog,api,swagger,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -14,7 +14,7 @@ info:
|
||||||
shodan-query: title:"通达OA"
|
shodan-query: title:"通达OA"
|
||||||
fofa-query: title="通达OA"
|
fofa-query: title="通达OA"
|
||||||
zoomeye-query: app:"通达OA"
|
zoomeye-query: app:"通达OA"
|
||||||
tags: tongda,auth-bypass,fuzz
|
tags: tongda,auth-bypass,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
- https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/
|
- https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 276
|
max-request: 276
|
||||||
tags: wordpress,php,xmlrpc,fuzz
|
tags: wordpress,php,xmlrpc,brute-force
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -29,7 +29,7 @@ info:
|
||||||
verified: true
|
verified: true
|
||||||
vendor: vmware
|
vendor: vmware
|
||||||
product: aria_operations_for_networks
|
product: aria_operations_for_networks
|
||||||
tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize
|
tags: js,packetstorm,cve,cve2019,vmware,aria,rce,brute-force,vrealize
|
||||||
variables:
|
variables:
|
||||||
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
|
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 223
|
max-request: 223
|
||||||
shodan-query: port:1433
|
shodan-query: port:1433
|
||||||
tags: js,ssh,default-login,network,fuzz
|
tags: js,ssh,default-login,network,brute-force
|
||||||
|
|
||||||
javascript:
|
javascript:
|
||||||
- pre-condition: |
|
- pre-condition: |
|
||||||
|
|
|
@ -12,7 +12,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 1
|
||||||
tags: network,mysql,bruteforce,db,misconfig
|
tags: network,mysql,brute-force,db,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -11,7 +11,7 @@ info:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 1
|
||||||
tags: network,tidb,bruteforce,db,misconfig
|
tags: network,tidb,brute-force,db,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
Loading…
Reference in New Issue