final lint fix

patch-1
Dhiyaneshwaran 2024-01-04 12:16:23 +05:30
parent 53fb5baf27
commit 73b69a8c20
50 changed files with 52 additions and 59 deletions

View File

@ -16,7 +16,7 @@ info:
metadata:
verified: true
tags: android,file,deeplink
file:
- extensions:
- xml

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: android,file
file:
- extensions:
- all
@ -19,5 +19,4 @@ file:
words:
- ";->registerReceiver(Landroid/content/BroadcastReceiver;Landroid/content/IntentFilter;)"
# Enhanced by md on 2023/05/02
# digest: 490a0046304402200a21274be70d274c77c63cf66b98e1d17b14fcbfff10995feefc37a44c7cbc6a022076339e3fbebc6122b4991b64b1c1208697e31560886e2d86f5a0ac665c582758:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402200a21274be70d274c77c63cf66b98e1d17b14fcbfff10995feefc37a44c7cbc6a022076339e3fbebc6122b4991b64b1c1208697e31560886e2d86f5a0ac665c582758:922c64590222798bb761d5b6d8e72950

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: android,file
file:
- extensions:
- xml

View File

@ -8,7 +8,7 @@ info:
verified: "true"
github-query: "/[a-z0-9.-]+\\.appspot\\.com/"
tags: file,android,google
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: android,file,js,webview
file:
- extensions:
- all
@ -19,5 +19,4 @@ file:
words:
- "Landroid/webkit/WebSettings;->setJavaScriptEnabled(Z)V"
# Enhanced by md on 2023/05/03
# digest: 490a0046304402202cb44b3b176f00694b16cac7a61f5db343e65232d7dbb0e4c3f19815322ffa30022041f4229478a122c2b2f3b7878815a3391f9725e527b8eb7c18488d0c958b3324:922c64590222798bb761d5b6d8e72950
# digest: 490a0046304402202cb44b3b176f00694b16cac7a61f5db343e65232d7dbb0e4c3f19815322ffa30022041f4229478a122c2b2f3b7878815a3391f9725e527b8eb7c18488d0c958b3324:922c64590222798bb761d5b6d8e72950

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: android,file,webview
file:
- extensions:
- all

View File

@ -19,5 +19,4 @@ file:
words:
- "Landroid/webkit/WebSettings;->setAllowUniversalAccessFromFileURLs(Z)V"
# Enhanced by md on 2023/05/03
# digest: 4a0a00473045022100a47e2082fc66a04948c89867eea66d41624cf5a26a7e0e6faebecd5e18281a74022025ef3b1093b7cfa7eeb45aea5a30518577674355526f2621c96bde80d175642a:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100a47e2082fc66a04948c89867eea66d41624cf5a26a7e0e6faebecd5e18281a74022025ef3b1093b7cfa7eeb45aea5a30518577674355526f2621c96bde80d175642a:922c64590222798bb761d5b6d8e72950

View File

@ -11,7 +11,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: electron,file
file:
- extensions:
- json

View File

@ -10,7 +10,7 @@ info:
- https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/
- https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps
tags: electron,file,nodejs
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: adobe,file,token
file:
- extensions:
- all

View File

@ -12,7 +12,7 @@ info:
metadata:
verified: true
tags: adobe,oauth,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: alibaba,access,file,keys
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: alibaba,secret,file,keys
file:
- extensions:
- all

View File

@ -14,7 +14,7 @@ info:
metadata:
verified: true
tags: aws,amazon,token,file
file:
- extensions:
- all

View File

@ -20,5 +20,4 @@ file:
regex:
- "amzn\\.mws\\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}"
# Enhanced by md on 2023/05/04
# digest: 4a0a00473045022100a22e9ab4357449ff0b0d0e1d56fd2a2a815900eb260c13cdc8ca5b4904508d76022030e701c98fff70a3c0e8174fe27c30c87c60b0a4acdc97555a71970ab6e5e83a:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100a22e9ab4357449ff0b0d0e1d56fd2a2a815900eb260c13cdc8ca5b4904508d76022030e701c98fff70a3c0e8174fe27c30c87c60b0a4acdc97555a71970ab6e5e83a:922c64590222798bb761d5b6d8e72950

View File

@ -14,7 +14,7 @@ info:
metadata:
verified: true
tags: aws,amazon,token,file,session
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: token,file,aws,amazon
file:
- extensions:
- all
@ -20,5 +20,4 @@ file:
regex:
- "(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"
# Enhanced by md on 2023/05/04
# digest: 4a0a00473045022001180031643147e369ad54d397f6e1ec99e061e1a771b8ec6b9f024bb97300a7022100b5b3b3027d3e8edea6822f05c18070f5cbd64b111c6ac7aa37e3603fcb4b08ea:922c64590222798bb761d5b6d8e72950

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: token,file,aws,amazon
file:
- extensions:
- all
@ -36,5 +36,4 @@ file:
- "us-west-2:[0-9A-Za-z]{8}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9A-Za-z]{12}"
- "sa-east-1:[0-9A-Za-z]{8}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9A-Za-z]{12}"
# Enhanced by md on 2023/05/04
# digest: 4b0a00483046022100b065a7fffa3f1696948239b6546af3ff6d33ddd2ab72ce11e55831f029a152c5022100ce912a53c74a47179c62dbf4a78e93a8f5fdcbbbf497a94e6e4f4ef2e76efd91:922c64590222798bb761d5b6d8e72950

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: asana,client,file,keys
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: asana,client,file,keys,secret
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: atlassian,file,token,api
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: digitalocean,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: digitalocean,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: digitalocean,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: discord,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: discord,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: discord,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: easypost,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: easypost,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: facebook,file,token
file:
- extensions:
- all

View File

@ -10,7 +10,7 @@ info:
cvss-score: 0
cwe-id: CWE-200
tags: token,file,facebook
file:
- extensions:
- all

View File

@ -6,7 +6,7 @@ info:
severity: low
description: Facebook secret key token was detected.
tags: token,file,facebook
file:
- extensions:
- all
@ -16,5 +16,4 @@ file:
regex:
- "(?i)(facebook|fb)(.{0,20})?(?-i)['\"][0-9a-f]{32}['\"]"
# Enhanced by md on 2023/05/04
# digest: 4b0a00483046022100c8f297f448fb4903d7a38171d2ebcbb1ae4cecc818f00c5042a4d50dcb216150022100d6e7270b96ebd866b3b5f9d26deb721ef4626d502aa7be161c75379de7f39de4:922c64590222798bb761d5b6d8e72950

View File

@ -10,7 +10,7 @@ info:
metadata:
verified: true
tags: facebook,token,file
file:
- extensions:
- all

View File

@ -26,7 +26,7 @@ info:
product: memcached
verfied: true
tags: cve,cve2016,rce,js,memcached
javascript:
- code: |
let packet = bytes.NewBuffer();

View File

@ -33,7 +33,7 @@ info:
variables:
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
javascript:
# init field can be used to make any preperations before the actual exploit
# here we are reading all private keys from helpers folder and storing them in a list

View File

@ -10,7 +10,7 @@ info:
max-request: 7
shodan-query: port:1433
tags: js,mssql,default-login,network
javascript:
- pre-condition: |
var m = require("nuclei/mssql");

View File

@ -10,7 +10,7 @@ info:
max-request: 9
shodan-query: port:5432
tags: js,postgresql,default-login,network
javascript:
- pre-condition: |
var m = require("nuclei/postgres");

View File

@ -10,7 +10,7 @@ info:
max-request: 6
shodan-query: product:"redis"
tags: js,redis,default-login,network
javascript:
- pre-condition: |
isPortOpen(Host,Port)

View File

@ -8,7 +8,7 @@ info:
max-request: 223
shodan-query: port:1433
tags: js,ssh,default-login,network,fuzz
javascript:
- pre-condition: |
var m = require("nuclei/ssh");

View File

@ -8,7 +8,7 @@ info:
max-request: 1
shodan-query: port:1433
tags: js,mssql,detect,network
javascript:
- code: |
var m = require("nuclei/mssql");

View File

@ -13,7 +13,7 @@ info:
max-request: 1
shodan-query: product:"Oracle TNS Listener"
tags: js,oracle,tns,network
javascript:
- code: |
var m = require("nuclei/oracle");

View File

@ -12,7 +12,7 @@ info:
max-request: 1
shodan-query: product:"OpenSSH"
tags: ssh,js,enum,network
javascript:
- code: |
var m = require("nuclei/ssh");

View File

@ -14,7 +14,7 @@ info:
max-request: 1
shodan-query: port:445
tags: js,network,smb,enum
javascript:
- code: |
var m = require("nuclei/smb");

View File

@ -13,7 +13,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: js,ssh,misconfig,network
javascript:
- pre-condition: |
isPortOpen(Host,Port)

View File

@ -11,7 +11,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: ssh,js,enum,network
javascript:
- pre-condition: |
isPortOpen(Host,Port);

View File

@ -9,7 +9,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: js,ssh,enum,network
javascript:
- pre-condition: |
isPortOpen(Host,Port);

View File

@ -13,7 +13,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: js,ssh,misconfig,network
javascript:
- pre-condition: |
isPortOpen(Host,Port);

View File

@ -13,7 +13,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: js,ssh,misconfig,network
javascript:
- pre-condition: |
isPortOpen(Host,Port);

View File

@ -17,7 +17,7 @@ info:
variables:
ecdsa_bit: '256' # 256 bytes = 2048 bits
rsa_bit: '2048' # 2048 bits
javascript:
- pre-condition: |
isPortOpen(Host,Port);

View File

@ -13,7 +13,7 @@ info:
max-request: 2
shodan-query: product:"OpenSSH"
tags: js,ssh,misconfig,network
javascript:
- pre-condition: |
isPortOpen(Host,Port);