javascript, token spray, headless, file tagging improvements and consistency

patch-1
Ellis Springe 2023-12-12 16:25:50 -07:00
parent 0f1b89d3f5
commit 8b10d8c44a
111 changed files with 141 additions and 37 deletions

View File

@ -24,7 +24,7 @@ info:
For example: For example:
CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com
Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c
tags: dns,takeover,aws tags: dns,takeover,aws,elasticbeanstalk
dns: dns:
- name: "{{FQDN}}" - name: "{{FQDN}}"

View File

@ -10,7 +10,8 @@ info:
- https://adb-backup.com/ - https://adb-backup.com/
classification: classification:
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file,adb
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file,biometric
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -6,6 +6,7 @@ info:
severity: low severity: low
description: Android debug enabling was detected. description: Android debug enabling was detected.
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -16,6 +16,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: android,file,deeplink tags: android,file,deeplink
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -10,6 +10,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -8,6 +8,7 @@ info:
verified: "true" verified: "true"
github-query: "/[a-z0-9.-]+\\.appspot\\.com/" github-query: "/[a-z0-9.-]+\\.appspot\\.com/"
tags: file,android,google tags: file,android,google
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file,webview
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file,javascript tags: android,file,js,webview
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file,webview
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: android,file tags: android,file,webview
file: file:
- extensions: - extensions:
- all - all

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -14,6 +14,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -9,6 +9,7 @@ info:
reference: reference:
- https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/service_timestamps.htm - https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/service_timestamps.htm
tags: cisco,config-audit,cisco-switch,file,router tags: cisco,config-audit,cisco-switch,file,router
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file tags: cisco,config-audit,cisco-switch,file
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: cisco,config-audit,cisco-switch,file tags: cisco,config-audit,cisco-switch,file
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -12,6 +12,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: fortigate,config,audit,file,firewall tags: fortigate,config,audit,file,firewall
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -12,6 +12,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -7,6 +7,7 @@ info:
description: Weak Ciphers can be broken by an attacker in a local network and can perform attacks like Blowfish. description: Weak Ciphers can be broken by an attacker in a local network and can perform attacks like Blowfish.
reference: https://docs.fortinet.com/document/fortigate/6.2.0/hardening-your-fortigate/582009/system-administrator-best-practices reference: https://docs.fortinet.com/document/fortigate/6.2.0/hardening-your-fortigate/582009/system-administrator-best-practices
tags: audit,config,file,firewall,fortigate tags: audit,config,file,firewall,fortigate
file: file:
- extensions: - extensions:
- conf - conf

View File

@ -15,6 +15,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: firewall,config,audit,pfsense,file tags: firewall,config,audit,pfsense,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -1,7 +1,7 @@
id: configure-session-timeout id: configure-session-timeout
info: info:
name: PfSence Configure Sessions Timeout Not Set - Detect name: PfSense Configure Sessions Timeout Not Set - Detect
author: pussycat0x author: pussycat0x
severity: info severity: info
description: | description: |
@ -15,6 +15,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: firewall,config,audit,pfsense,file tags: firewall,config,audit,pfsense,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -1,11 +1,11 @@
id: enable-https-protocol id: enable-https-protocol
info: info:
name: Pfsence Web Admin Management Portal HTTPS Not Set - Detect name: Pfsense Web Admin Management Portal HTTPS Not Set - Detect
author: pussycat0x author: pussycat0x
severity: info severity: info
description: | description: |
PfSence Web Admin Management Portal is recommended to be accessible using only HTTPS protocol. HTTP transmits all data, including passwords, in clear text over the network and provides no assurance of the identity of the hosts involved, making it possible for an attacker to obtain sensitive information, modify data, and/or execute unauthorized operations. PfSense Web Admin Management Portal is recommended to be accessible using only HTTPS protocol. HTTP transmits all data, including passwords, in clear text over the network and provides no assurance of the identity of the hosts involved, making it possible for an attacker to obtain sensitive information, modify data, and/or execute unauthorized operations.
reference: | reference: |
https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
classification: classification:
@ -15,6 +15,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: firewall,config,audit,pfsense,file tags: firewall,config,audit,pfsense,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -1,11 +1,11 @@
id: known-default-account id: known-default-account
info: info:
name: PfSence Known Default Account - Detect name: PfSense Known Default Account - Detect
author: pussycat0x author: pussycat0x
severity: info severity: info
description: | description: |
PfSence configured known default accounts are recommended to be deleted. In order to attempt access to known devices' platforms, an attacker can use the available database of the known default accounts for each platform or operating system. Known default accounts are often, but not limited to, 'admin'. PfSense configured known default accounts are recommended to be deleted. In order to attempt access to known devices' platforms, an attacker can use the available database of the known default accounts for each platform or operating system. Known default accounts are often, but not limited to, 'admin'.
reference: | reference: |
- https://docs.netgate.com/pfsense/en/latest/usermanager/defaults.html - https://docs.netgate.com/pfsense/en/latest/usermanager/defaults.html
classification: classification:
@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: audit,config,file,firewall,pfsense tags: audit,config,file,firewall,pfsense
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -1,11 +1,11 @@
id: password-protected-consolemenu id: password-protected-consolemenu
info: info:
name: PfSence Consolemenu Password Protection Not Implememnted - Detect name: PfSense Consolemenu Password Protection Not Implememnted - Detect
author: pussycat0x author: pussycat0x
severity: info severity: info
description: | description: |
PfSence password protection via the Console Menu is recommended to be configured. An unattended computer with an open Console Menu session can allow an unauthorized user access to the firewall management. PfSense password protection via the Console Menu is recommended to be configured. An unattended computer with an open Console Menu session can allow an unauthorized user access to the firewall management.
reference: | reference: |
https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
classification: classification:
@ -15,6 +15,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: firewall,config,audit,pfsense,file tags: firewall,config,audit,pfsense,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -1,11 +1,11 @@
id: set-hostname id: set-hostname
info: info:
name: PfSence Hostname Not Set - Detect name: PfSense Hostname Not Set - Detect
author: pussycat0x author: pussycat0x
severity: info severity: info
description: | description: |
PfSence Hostname should be set so that other devices on the network can correctly identify it. The hostname is a unique identifier for the device. PfSense Hostname should be set so that other devices on the network can correctly identify it. The hostname is a unique identifier for the device.
reference: | reference: |
https://docs.netgate.com/pfsense/en/latest/config/general.html https://docs.netgate.com/pfsense/en/latest/config/general.html
classification: classification:
@ -13,6 +13,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: firewall,config,audit,pfsense,file tags: firewall,config,audit,pfsense,file
file: file:
- extensions: - extensions:
- xml - xml

View File

@ -9,6 +9,7 @@ info:
- https://www.tecmint.com/10-most-dangerous-commands-you-should-never-execute-on-linux/ - https://www.tecmint.com/10-most-dangerous-commands-you-should-never-execute-on-linux/
- https://phoenixnap.com/kb/dangerous-linux-terminal-commands - https://phoenixnap.com/kb/dangerous-linux-terminal-commands
tags: bash,file,shell,sh tags: bash,file,shell,sh
file: file:
- extensions: - extensions:
- sh - sh

View File

@ -11,6 +11,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: electron,file tags: electron,file
file: file:
- extensions: - extensions:
- json - json

View File

@ -10,6 +10,7 @@ info:
- https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ - https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/
- https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps - https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps
tags: electron,file,nodejs tags: electron,file,nodejs
file: file:
- extensions: - extensions:
- all - all

View File

@ -8,7 +8,8 @@ info:
This process involves extracting tokens, endpoints, URIs, and variable names from the JS file and analyzing them for any potential weaknesses that could be exploited. By extracting and analyzing these elements, potential security threats can be identified, allowing for proactive measures to be taken to mitigate any risks associated with the application. This process can be used as part of a comprehensive bug-hunting strategy to ensure the security of an application. This process involves extracting tokens, endpoints, URIs, and variable names from the JS file and analyzing them for any potential weaknesses that could be exploited. By extracting and analyzing these elements, potential security threats can be identified, allowing for proactive measures to be taken to mitigate any risks associated with the application. This process can be used as part of a comprehensive bug-hunting strategy to ensure the security of an application.
metadata: metadata:
verified: true verified: true
tags: file,js-analyse,js,javascript tags: file,js-analyse,js
file: file:
- extensions: - extensions:
- js - js

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: adobe,file,token tags: adobe,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -12,6 +12,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: adobe,oauth,file,token tags: adobe,oauth,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -11,6 +11,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: age-encryption,file,token tags: age-encryption,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -11,6 +11,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: age-encryption,file,token tags: age-encryption,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: alibaba,access,file,keys tags: alibaba,access,file,keys
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: alibaba,secret,file,keys tags: alibaba,secret,file,keys
file: file:
- extensions: - extensions:
- all - all

View File

@ -14,6 +14,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: aws,amazon,token,file tags: aws,amazon,token,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: token,file,amazon,auth tags: token,file,amazon,auth,mws
file: file:
- extensions: - extensions:
- all - all

View File

@ -14,6 +14,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: aws,amazon,token,file,session tags: aws,amazon,token,file,session
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: file,token,amazon,aws tags: file,token,amazon,aws,sns
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: token,file tags: token,file,aws,amazon
file: file:
- extensions: - extensions:
- all - all

View File

@ -9,7 +9,8 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: token,file tags: token,file,aws,amazon
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: asana,client,file,keys tags: asana,client,file,keys
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: asana,client,file,keys,secret tags: asana,client,file,keys,secret
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: atlassian,file,token,api tags: atlassian,file,token,api
file: file:
- extensions: - extensions:
- all - all

View File

@ -11,6 +11,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: azure,file,token tags: azure,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: bitbucket,file,token tags: bitbucket,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: bitbucket,file,token tags: bitbucket,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: bittrex,file,token tags: bittrex,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: bittrex,file,token tags: bittrex,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: confluent,file,token tags: confluent,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: confluent,file,token tags: confluent,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: digitalocean,file,token tags: digitalocean,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: digitalocean,file,token tags: digitalocean,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: digitalocean,file,token tags: digitalocean,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: discord,file,token tags: discord,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: discord,file,token tags: discord,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: discord,file,token tags: discord,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: dropbox,file,token tags: dropbox,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: dropbox,file,token tags: dropbox,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: dropbox,file,token tags: dropbox,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: easypost,file,token tags: easypost,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: easypost,file,token tags: easypost,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: facebook,file,token tags: facebook,file,token
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
cvss-score: 0 cvss-score: 0
cwe-id: CWE-200 cwe-id: CWE-200
tags: token,file,facebook tags: token,file,facebook
file: file:
- extensions: - extensions:
- all - all

View File

@ -6,6 +6,7 @@ info:
severity: low severity: low
description: Facebook secret key token was detected. description: Facebook secret key token was detected.
tags: token,file,facebook tags: token,file,facebook
file: file:
- extensions: - extensions:
- all - all

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: facebook,token,file tags: facebook,token,file
file: file:
- extensions: - extensions:
- all - all

View File

@ -29,7 +29,7 @@ info:
product: swagger_ui product: swagger_ui
shodan-query: http.component:"Swagger" shodan-query: http.component:"Swagger"
fofa-query: icon_hash="-1180440057" fofa-query: icon_hash="-1180440057"
tags: cve,cve2018,headless,swagger-ui,xss tags: cve,cve2018,headless,swagger,xss
headless: headless:
- steps: - steps:

View File

@ -5,6 +5,7 @@ info:
author: pdteam author: pdteam
severity: high severity: high
tags: headless,dvwa tags: headless,dvwa
headless: headless:
- steps: - steps:
- args: - args:

View File

@ -5,6 +5,7 @@ info:
author: dwisiswant0 author: dwisiswant0
severity: info severity: info
tags: headless,extractor tags: headless,extractor
headless: headless:
- steps: - steps:
- args: - args:

View File

@ -11,6 +11,7 @@ info:
cvss-score: 6.1 cvss-score: 6.1
cwe-id: CWE-601 cwe-id: CWE-601
tags: redirect,generic,headless tags: redirect,generic,headless
headless: headless:
- steps: - steps:
- args: - args:

View File

@ -7,6 +7,7 @@ info:
metadata: metadata:
max-request: 4 max-request: 4
tags: headless tags: headless
headless: headless:
- steps: - steps:
- args: - args:

View File

@ -6,9 +6,11 @@ info:
severity: info severity: info
description: Takes a screenshot of the specified URLS. description: Takes a screenshot of the specified URLS.
tags: headless,screenshot tags: headless,screenshot
variables: variables:
filename: '{{replace(BaseURL,"/","_")}}' filename: '{{replace(BaseURL,"/","_")}}'
dir: "screenshots" dir: "screenshots"
headless: headless:
- steps: - steps:
- action: setheader - action: setheader

View File

@ -8,6 +8,7 @@ info:
metadata: metadata:
max-request: 1 max-request: 1
tags: headless,tech,js tags: headless,tech,js
headless: headless:
- steps: - steps:
- action: navigate - action: navigate

View File

@ -10,6 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
tags: tech,sap,hybris,angular,spartacus,headless tags: tech,sap,hybris,angular,spartacus,headless
headless: headless:
- steps: - steps:
- action: navigate - action: navigate

View File

@ -8,7 +8,7 @@ info:
- https://docs.fortinet.com/document/fortitoken-cloud/latest/rest-api/456035/overview - https://docs.fortinet.com/document/fortitoken-cloud/latest/rest-api/456035/overview
metadata: metadata:
max-request: 1 max-request: 1
tags: token-spray,fortinet tags: token-spray,fortinet,fortitoken
self-contained: true self-contained: true

View File

@ -1,7 +1,7 @@
id: api-front id: api-front
info: info:
name: LaunchDarkly REST API name: Frontapp API
author: Luqmaan Hadia [Luqiih](https://github.com/Luqiih) author: Luqmaan Hadia [Luqiih](https://github.com/Luqiih)
severity: info severity: info
reference: reference:

View File

@ -8,7 +8,7 @@ info:
- https://developers.facebook.com/docs/instagram-api/getting-started - https://developers.facebook.com/docs/instagram-api/getting-started
metadata: metadata:
max-request: 1 max-request: 1
tags: token-spray,instagram,graph tags: token-spray,instagram,graph,facebook
self-contained: true self-contained: true

View File

@ -10,7 +10,7 @@ info:
- https://github.com/daffainfo/all-about-apikey/tree/main/google-safe-browsing - https://github.com/daffainfo/all-about-apikey/tree/main/google-safe-browsing
metadata: metadata:
max-request: 1 max-request: 1
tags: token-spray,google,books tags: token-spray,google,safebrowsing
self-contained: true self-contained: true

View File

@ -26,6 +26,7 @@ info:
product: memcached product: memcached
verfied: true verfied: true
tags: cve,cve2016,rce,js,memcached tags: cve,cve2016,rce,js,memcached
javascript: javascript:
- code: | - code: |
let packet = bytes.NewBuffer(); let packet = bytes.NewBuffer();

View File

@ -29,9 +29,11 @@ info:
verified: true verified: true
vendor: vmware vendor: vmware
product: aria_operations_for_networks product: aria_operations_for_networks
tags: packetstorm,cve,cve2019,vmware,aria,rce,fuzz tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize
variables: variables:
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
javascript: javascript:
# init field can be used to make any preperations before the actual exploit # init field can be used to make any preperations before the actual exploit
# here we are reading all private keys from helpers folder and storing them in a list # here we are reading all private keys from helpers folder and storing them in a list

View File

@ -27,7 +27,7 @@ info:
vendor: apache vendor: apache
product: activemq product: activemq
shodan-query: product:"ActiveMQ OpenWire Transport" shodan-query: product:"ActiveMQ OpenWire Transport"
tags: cve,cve2023,network,rce,apache,activemq,deserialization,kev tags: cve,cve2023,network,rce,apache,activemq,deserialization,js,kev
variables: variables:
prefix: "1f00000000000000000001010042" prefix: "1f00000000000000000001010042"

View File

@ -10,6 +10,7 @@ info:
max-request: 7 max-request: 7
shodan-query: port:1433 shodan-query: port:1433
tags: js,mssql,default-login,network tags: js,mssql,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |
var m = require("nuclei/mssql"); var m = require("nuclei/mssql");

View File

@ -9,7 +9,8 @@ info:
metadata: metadata:
max-request: 9 max-request: 9
shodan-query: port:5432 shodan-query: port:5432
tags: js,postgres,default-login,network tags: js,postgresql,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |
var m = require("nuclei/postgres"); var m = require("nuclei/postgres");

View File

@ -10,6 +10,7 @@ info:
max-request: 6 max-request: 6
shodan-query: product:"redis" shodan-query: product:"redis"
tags: js,redis,default-login,network tags: js,redis,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |
isPortOpen(Host,Port) isPortOpen(Host,Port)

View File

@ -8,6 +8,7 @@ info:
max-request: 223 max-request: 223
shodan-query: port:1433 shodan-query: port:1433
tags: js,ssh,default-login,network,fuzz tags: js,ssh,default-login,network,fuzz
javascript: javascript:
- pre-condition: | - pre-condition: |
var m = require("nuclei/ssh"); var m = require("nuclei/ssh");

View File

@ -8,6 +8,7 @@ info:
max-request: 1 max-request: 1
shodan-query: port:1433 shodan-query: port:1433
tags: js,mssql,detect,network tags: js,mssql,detect,network
javascript: javascript:
- code: | - code: |
var m = require("nuclei/mssql"); var m = require("nuclei/mssql");

View File

@ -13,6 +13,7 @@ info:
max-request: 1 max-request: 1
shodan-query: product:"Oracle TNS Listener" shodan-query: product:"Oracle TNS Listener"
tags: js,oracle,tns,network tags: js,oracle,tns,network
javascript: javascript:
- code: | - code: |
var m = require("nuclei/oracle"); var m = require("nuclei/oracle");

View File

@ -12,6 +12,7 @@ info:
max-request: 1 max-request: 1
shodan-query: product:"OpenSSH" shodan-query: product:"OpenSSH"
tags: ssh,js,enum,network tags: ssh,js,enum,network
javascript: javascript:
- code: | - code: |
var m = require("nuclei/ssh"); var m = require("nuclei/ssh");

Some files were not shown because too many files have changed in this diff Show More