Home > Recon > Wordlists for Dir/File Bruteforcing

Wordlists for Dir/File Bruteforcing

i have been updating a couple of wordlists under my pathBrute Github project that could be useful to a  penetration tester during the recon phrase to discover ‘interesting paths’ on target websites.

Do check out my Github page if you are interested to find out more. There are about more than 30,000 entries in the wordlists as of 21st July 2018.

The wordlists are extracted from Exploit Database, Packetstorm and Metasploit framework.

  1. Metasploit  https://github.com/milo2012/pathbrute/blob/master/defaultPaths.txt
  2. Exploit database  https://github.com/milo2012/pathbrute/blob/master/exploitdb_all.txt
  3. Packetstorm https://github.com/milo2012/pathbrute/blob/master/packetstormPaths.txt

Below is a screenshot of one of the wordlists.
Screen Shot 2018-07-21 at 8.17.39 PM.png

Categories: Recon
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: