mirror of
https://github.com/danielmiessler/SecLists
synced 2025-12-23 17:24:34 +01:00
Related to #929 Update README.md files to provide better guidance on using wordlists. * **Discovery/Web-Content/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/DNS/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/Web-Content/api/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/Web-Content/URLs/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. |
||
|---|---|---|
| .. | ||
| README.md | ||
| urls-Drupal-7.20.txt | ||
| urls-joomla-3.0.3.txt | ||
| urls-SAP.txt | ||
| urls-wordpress-3.3.1.txt | ||
URLs Wordlist
A wordlist of URLs for common systems that one may attack, e.g. WordPress, Drupal, etc.
urls-Drupal-7.20.txt
Overview
This file contains URLs for Drupal 7.20.
Usage
Use for: populating a site tree with whitebox-like knowledge
Source
Source: Collected from various sources
urls-joomla-3.0.3.txt
Overview
This file contains URLs for Joomla 3.0.3.
Usage
Use for: populating a site tree with whitebox-like knowledge
Source
Source: Collected from various sources
urls-SAP.txt
Overview
This file contains URLs for SAP.
Usage
Use for: populating a site tree with whitebox-like knowledge
Source
Source: Collected from various sources
urls-wordpress-3.3.1.txt
Overview
This file contains URLs for WordPress 3.3.1.
Usage
Use for: populating a site tree with whitebox-like knowledge
Source
Source: Collected from various sources
Usage Instructions
- Download the desired URL wordlist file.
- Use an intercepting proxy (e.g., Burp Suite) to pass the URLs through and populate a site tree with whitebox-like knowledge.
- Analyze the site tree to identify potential vulnerabilities and attack vectors.