Ignacio J. Perez Portal
Ignacio J. Perez Portal
@Silly26 I've provided a solution in my previous comment. Please try running `git clone -b i770 https://github.com/ItsIgnacioPortal/SecLists/`
What would be the purpose of this wordlist? Why would you want to fuzz that IIS folder? I can only imagine it being useful for spidering
> There can be CGIs Do you mean "CGI" as in Common Gateway Interface?
What could this wordlist be used for? If its for detecting a SharePoint instance, it’s too long Also how did you make this wordlist?
> It's for enumerating what files/functionality are being used to discover the attack surface of a SharePoint instance. Interesting.. Could you give me an example? I'm not very familiar with...
I see. Alright, now all that's left to do is fix those duplicate slashes. Also, please rename the wordlist to `sharepoint-ennumeration.txt`. Always use long, descriptive names, if possible.
How did you get these parameters? are they URL parameters?
Great! Could you also add https://gist.github.com/nullenc0de/e9d1f2a8a0a38c9bfcb5bdb9fc7191ea, since they were both announced in the same tweet. Just make sure to remove the trailing `/` some entries have Also, could you rename...
I have no idea of where @danielmiessler got that list from. The files were uploaded on commit [f50231d90afeff9738d34d3041381ec44b6b202e](https://github.com/danielmiessler/SecLists/commit/f50231d90afeff9738d34d3041381ec44b6b202e#comments), but that commit does not have information about the source. I fear...
> I find it can make scripting a little more inconvenient when reading these files as there is one more item to think about. How so? Any half decent library/tool...