🐼
Hacking APIs
search
Ctrlk
  • How web application works?
  • The Anatomy of Web API
  • API Insecurities
  • Setting up an API hacking system
  • API Targets
  • Discovering APIschevron-right
  • Endpoint analysis
  • Vulnerabilitieschevron-right
  • Attacking API authchevron-right
  • Fuzzingchevron-right
  • Exploiting API Authchevron-right
  • Exploting Mass Assignmentchevron-right
  • API Injectionchevron-right
  • AWS
  • Writeupschevron-right
  • Miscchevron-right
  • Toolschevron-right
    • ffufchevron-right
      • Payloads
      • Before Fuzzing
      • Recursion
      • File Extensions
      • Using filters
      • Fuzzing parameters
      • Finding vhosts and subdomains
      • Proxifying ffuf traffic
    • wfuzz
    • jwt_tool
    • Hashcat
    • Common User Passwords Profiler
  • Resources
  • Wordpress APIchevron-right
  • Prevention
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Toolschevron-right
  2. ffuf

Payloads

https://github.com/danielmiessler/SecLists#installarrow-up-right https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/big.txtarrow-up-right https://gist.github.com/0xrisec/a82521dabf52e1cc4d446ba5435aae19arrow-up-right

Previousffufchevron-leftNextBefore Fuzzingchevron-right

Last updated 1 year ago