diff --git a/exposures/logs/zm-system-log-detect.yaml b/exposures/logs/zm-system-log-detect.yaml
new file mode 100644
index 0000000000..72e583915e
--- /dev/null
+++ b/exposures/logs/zm-system-log-detect.yaml
@@ -0,0 +1,23 @@
+id: zm-system-log-detect
+info:
+ name: zm-system-log-detect
+ author: pussycat0x
+ severity: low
+ reference: https://www.exploit-db.com/ghdb/6926
+ tags: logs,zm,exposure
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/?view=log"
+ - "{{BaseURL}}zm/?view=log"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "
ZM - System Log"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/iot/brother-printer-detect.yaml b/iot/brother-printer-detect.yaml
new file mode 100644
index 0000000000..b0a3efc054
--- /dev/null
+++ b/iot/brother-printer-detect.yaml
@@ -0,0 +1,23 @@
+id: brother-printer-detect
+
+info:
+ name: Brother Printer
+ author: pussycat0x
+ severity: low
+ reference: https://www.exploit-db.com/ghdb/6889
+ tags: iot,printer,tech
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/general/status.html"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Brother Industries"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/iot/hp-device-info-detect.yaml b/iot/hp-device-info-detect.yaml
new file mode 100644
index 0000000000..f308cd0a9c
--- /dev/null
+++ b/iot/hp-device-info-detect.yaml
@@ -0,0 +1,22 @@
+id: hp-device-info-detect
+info:
+ name: HP LaserJet
+ author: pussycat0x
+ severity: low
+ reference: https://www.exploit-db.com/ghdb/6905
+ tags: iot,hp
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/hp/device/DeviceInformation/View"
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Device Information"
+ - "hp"
+ condition: and
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/iot/unauthorized-brother-access-detect.yaml b/iot/unauthorized-brother-access-detect.yaml
new file mode 100644
index 0000000000..17abe4ddfc
--- /dev/null
+++ b/iot/unauthorized-brother-access-detect.yaml
@@ -0,0 +1,25 @@
+id: brother-unauthorized-access-detect
+
+info:
+ name: Brother Printer
+ author: pussycat0x
+ severity: medium
+ reference: https://www.exploit-db.com/ghdb/6889
+ tags: iot,printer
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/net/net/net.html"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Brother Industries"
+ - "Network Status"
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/misconfiguration/unauthorized-hp-printer.yaml b/misconfiguration/unauthorized-hp-printer.yaml
new file mode 100644
index 0000000000..9f69be01e2
--- /dev/null
+++ b/misconfiguration/unauthorized-hp-printer.yaml
@@ -0,0 +1,24 @@
+id: unauthorized-hp-printer
+
+info:
+ name: Unauthorized HP Printer
+ author: pussycat0x
+ severity: high
+ tags: hp,iot,unauth
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/SSI/Auth/ip_snmp.htm"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "HP"
+ - "SNMP
"
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/misconfiguration/wamp-server-configuration.yaml b/misconfiguration/wamp-server-configuration.yaml
new file mode 100644
index 0000000000..43b8b708f1
--- /dev/null
+++ b/misconfiguration/wamp-server-configuration.yaml
@@ -0,0 +1,24 @@
+id: wamp-server-configuration
+
+info:
+ name: default-wamp-server-page
+ author: pussycat0x
+ severity: medium
+ description: Wamp default page will expose sensitive configuration and vhosts.
+ reference: https://www.exploit-db.com/ghdb/6891.
+ tags: wamp
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ matchers-condition: and
+ matchers:
+ - type: dsl
+ dsl:
+ - 'contains(tolower(body), "wampserver")'
+
+ - type: status
+ status:
+ - 200
diff --git a/network/ftp-default-creds.yaml b/network/ftp-default-creds.yaml
new file mode 100644
index 0000000000..18bef48e05
--- /dev/null
+++ b/network/ftp-default-creds.yaml
@@ -0,0 +1,33 @@
+id: ftp-default-credentials
+
+info:
+ name: FTP Service with default credentials
+ author: pussycat0x
+ severity: critical
+ tags: network,ftp,default-login
+
+network:
+ - payloads:
+ username:
+ - admin
+ - root
+ - anonymous
+ password:
+ - anonymous
+ - password
+ - toor
+ - nas
+ - guest
+ - default
+ - pass1
+ - stingray
+
+ attack: clusterbomb
+ inputs:
+ - data: "USER {{username}}\r\nPASS {{password}}\r\n"
+ host:
+ - "{{Hostname}}:21"
+ matchers:
+ - type: word
+ words:
+ - "230"
\ No newline at end of file
diff --git a/technologies/crush-ftp-detect.yaml b/technologies/crush-ftp-detect.yaml
new file mode 100644
index 0000000000..ec9d334733
--- /dev/null
+++ b/technologies/crush-ftp-detect.yaml
@@ -0,0 +1,21 @@
+id: crush-ftp-detect
+
+info:
+ name: Crush FTP
+ author: pussycat0x
+ severity: info
+ tags: tech,ftp
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/WebInterface/login.html"
+
+ redirects: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "CrushFTP WebInterface"
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/technologies/web-ftp-detect.yaml b/technologies/web-ftp-detect.yaml
new file mode 100644
index 0000000000..1b3b439a07
--- /dev/null
+++ b/technologies/web-ftp-detect.yaml
@@ -0,0 +1,23 @@
+id: web-ftp-detect
+
+info:
+ name: Web FTP Detection
+ author: pussycat0x
+ severity: info
+ reference: https://www.exploit-db.com/ghdb/7013
+ tags: webftp,tech,ftp
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/cgi-bin/upload/web-ftp.cgi"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Web-FTP"
+ - "square login"
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml b/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml
new file mode 100644
index 0000000000..d5ea2cb71b
--- /dev/null
+++ b/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml
@@ -0,0 +1,25 @@
+id: wordpress-plugins-lifterlms
+
+info:
+ name: WordPress Plugin lifterlms Listing
+ author: pussycat0x
+ severity: low
+ description: Searches for sensitive directories present in the wordpress-plugins plugin.
+ reference: https://www.exploit-db.com/ghdb/6420
+ tags: wordpress,listing
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/lifterlms/"
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Index of"
+ - "/wp-content/plugins/lifterlms/"
+ condition: and
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/vulnerabilities/wordpress/wp-super-forms.yaml b/vulnerabilities/wordpress/wp-super-forms.yaml
new file mode 100644
index 0000000000..7b1c01e7ad
--- /dev/null
+++ b/vulnerabilities/wordpress/wp-super-forms.yaml
@@ -0,0 +1,22 @@
+id: wordpress-super-forms
+info:
+ name: WordPress super-forms
+ author: pussycat0x
+ severity: low
+ description: Searches for sensitive directories present in the wordpress-plugins plugin.
+ reference: https://www.exploit-db.com/ghdb/6776
+ tags: wordpress,listing
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/super-forms/"
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "Index of /wp-content/plugins/super-forms/"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file