Fuzzing / Wordlists
Last updated
Was this helpful?
Last updated
Was this helpful?
Param Bruteforce - - Arjun
Rustbuster -
Check Status Codes -
Robots disallowed -
Content Discovery - (Also downloaded the same)
Dirbuster - When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently:
dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u -
PathBrute -
Status codes - hakul/hakcrawl - gofetch , statusparser
What are your normal testing steps when you see a 401? -
- web content discovery
New dirs to bruteforce -
Jhaddix -
When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently:
dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u
Tool - wordlistgen
Exploiting:
Tools - Fast web fuzzer written in Go -
Thread Related --
Any tool to dedupe a list of urls according their parameters? I mean keep only 1 url if it appears several times with same params no matter their values -
wordlist by random robbie -
Subdomain bruteforce list -
FULLL LIST _
Interesting file extensions to look for: -
Check out subs_all txt here -
Huge_DIR_wordlist:-