From 6a9dd25341ffeabe63e527169e32a8a2187a6c2b Mon Sep 17 00:00:00 2001 From: "Ignacio J. Perez Portal" <5990@protonmail.com> Date: Fri, 17 Mar 2023 04:13:03 -0300 Subject: [PATCH] chore: Renamed "WEB-INF-dict.txt" to "vulnerability-scan_j2ee-websites_WEB-INF.txt" --- Discovery/Web-Content/README.md | 2 +- ...NF-dict.txt => vulnerability-scan_j2ee-websites_WEB-INF.txt} | 0 2 files changed, 1 insertion(+), 1 deletion(-) rename Discovery/Web-Content/{WEB-INF-dict.txt => vulnerability-scan_j2ee-websites_WEB-INF.txt} (100%) diff --git a/Discovery/Web-Content/README.md b/Discovery/Web-Content/README.md index 7183d7c5..34b3620a 100644 --- a/Discovery/Web-Content/README.md +++ b/Discovery/Web-Content/README.md @@ -45,7 +45,7 @@ Perfect wordlist to discover directories and files on target site with tools lik - Then sorted by probability and removed strings with one occurrence. - resulted file you can download is below. Happy Hunting! -## WEB-INF-dict.txt +## vulnerability-scan_j2ee-websites_WEB-INF.txt Use for: discovering sensitive j2ee files exploiting a lfi References: diff --git a/Discovery/Web-Content/WEB-INF-dict.txt b/Discovery/Web-Content/vulnerability-scan_j2ee-websites_WEB-INF.txt similarity index 100% rename from Discovery/Web-Content/WEB-INF-dict.txt rename to Discovery/Web-Content/vulnerability-scan_j2ee-websites_WEB-INF.txt