آموزش ابزار S1c0n در کالی لینوکس
Github
#recon #vulnerability
iliya(h.r)
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#recon #vulnerability
iliya(h.r)
——————
0Day.Today
@LearnExploit
@Tech_Army
reNgine 🔥
The only web application recon tool you will ever need!
Github
#Osint #Recon #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
The only web application recon tool you will ever need!
Github
#Osint #Recon #Tools
——————
0Day.Today
@LearnExploit
@Tech_Army
HTTP Parameter Discovery Suite
Arjun can find query parameters for URL endpoints. If you don't get what that means, it's okay, read along.
Web applications use parameters (or queries) to accept user input, take the following example into consideration
http://api.example.com/v1/userinfo?id=751634589This URL seems to load user information for a specific user id, but what if there exists a parameter named
admin
which when set to True
makes the endpoint provide more information about the user?This is what Arjun does, it finds valid HTTP parameters with a huge default dictionary of 25,890 parameter names.
The best part? It takes less than 10 seconds to go through this huge list while making just 50-60 requests to the target. Here's how
GET/POST/POST-JSON/POST-XML
requestsYou can install
arjun
with pip as following:➜ ~
pip3 install arjun
or, by downloading this repository and running➜ ~
python3 setup.py install
BugCod3#Recon #Api #Testing #Fuzzer #Fuzzing
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM