Skip to content

Instantly share code, notes, and snippets.

View emadshanab's full-sized avatar
🏠
Working from home

Emad Shanab emadshanab

🏠
Working from home
View GitHub Profile
@emadshanab
emadshanab / zendesk_endpoints.txt
Created December 12, 2023 02:15 — forked from win3zz/zendesk_endpoints.txt
List of Zendesk API Endpoints for Fuzzing [Penetration Testing]
POST /api/v2/accounts
GET /api/v2/activities?since=cstest
GET /api/v2/audit_logs?filter[source_type]=cstest&filter[source_id]=1&filter[actor_id]=1&filter[ip_address]=cstest&filter[created_at]=cstest&filter[action]=cstest&sort_by=cstest&sort_order=cstest&sort=cstest
GET /api/v2/automations
POST /api/v2/automations
GET /api/v2/bookmarks
POST /api/v2/bookmarks
GET /api/v2/brands
POST /api/v2/brands
GET /api/v2/custom_objects
@emadshanab
emadshanab / sqli2.yaml
Created December 12, 2023 02:14 — forked from 0x240x23elu/sqli2.yaml
Basic SQL Injection Detections nuclei Template
id: SQLInjection_ERROR
info:
name: SQLINJECTION Detection
author: 0x240x23elu & OFJAAAH
severity: High
requests:
- method: GET
@emadshanab
emadshanab / rce.yaml
Created December 12, 2023 02:14 — forked from 0x240x23elu/rce.yaml
LFI-RCE
id: LFI-RCE
info:
name: LFI Detection
author: 0x240x23elu & payloadallthings
severity: High
requests:
- method: GET
@emadshanab
emadshanab / SAPwordlists.txt
Created December 12, 2023 02:14 — forked from 0x240x23elu/SAPwordlists.txt
SAP Wordlist - SAP fuzz
/admin/admin.js
/admin/appinfo.jsp
/admin/cache_stats.jsp
/admin/catalogcache.jsp
/admin/ccms/customizing.jsp
/admin/ccms/result.jsp
/admin/ccms/sendFailure.jsp
/ecall/jsp/customer/login/login.jsp
/ecall/jsp/customer/upload/upload.jsp
/user/admin/index.jsp
@emadshanab
emadshanab / CVE-2020-0646
Created December 12, 2023 02:13 — forked from 0x240x23elu/CVE-2020-0646
CVE-2020-0646
info:
name: CVE-2020-0646
author: 0x240x23elu
severity: High
requests:
- raw:
- |
POST /EN/_vti_bin/WebPartPages.asmx HTTP/1.1
Host: {{Hostname}}
@emadshanab
emadshanab / CVE-2020-17519
Created December 12, 2023 02:13 — forked from 0x240x23elu/CVE-2020-17519
CVE-2020-17519
id: CVE-2020-17519
info:
name: Apache Flink Arbitrary file reading with JobManager
author: 0x240x23elu & 0rich1 of Ant Security FG Lab
severity: High
requests:
- method: GET
path:
@emadshanab
emadshanab / wordpress-LFI.yaml
Created December 12, 2023 02:13 — forked from 0x240x23elu/wordpress-LFI.yaml
wordpress-LFI
id: wordpress-LFI
info:
name: wordpress-LFI
author: 0x240x23elu
severity: High
requests:
- method: GET
path:
@emadshanab
emadshanab / CVE_RCE2-1.yaml
Created December 12, 2023 02:13 — forked from 0x240x23elu/CVE_RCE2-1.yaml
CVE_RCE2-1
id: CVE_RCE2-1
info:
name: CVE_RCE2
author: 0x240x23elu
severity: high
requests:
- payloads:
dirt: /mnt/d/tools/alltest/myopen/payload/PayloadsAllTheThings/DirectoryTraversal/Intruder/traversals-8-deep-exotic-encoding.txt
@emadshanab
emadshanab / CVE-2020-3580.yaml
Created December 12, 2023 02:12 — forked from 0x240x23elu/CVE-2020-3580.yaml
CVE-2020-3580
id: CVE-2020-3580
info:
name: xss in cisco ASA
author: 0x240x23elu
severity: high
description: xss in cisco ASA
tags: cve,cve2020,cisco
requests:
@emadshanab
emadshanab / spring-cloud.yaml
Created December 12, 2023 02:12 — forked from 0x240x23elu/spring-cloud.yaml
spring-cloud
id: spring-cloud
info:
name: spring-cloud Exposure
author: 0x240x23elu
severity: info
tags: panel,spring-cloud
requests:
- method: GET