PATH:
opt
/
bitninja-waf3
/
coreruleset
/
rules
# This file lists what we think the most widely used # security scanners identifyable via their user agents. # # The list is curated by hand. Attempts to machine-generate # a larger list leads to a lot of false positives and edge # cases where certain scanners / bots are welcome in certain # situations. We consider this a baseline of unwanted scanners. # http://www.arachni-scanner.com/ arachni betabot bewica-security-scan # Backup File Artifacts Checker # https://github.com/mazen160/bfac BFAC # Commix # https://github.com/commixproject/commix commix # Detectify website vulnerability scanner # https://detectify.com/ Detectify # hidden page scanner # (deprecated) https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project dirbuster fimap # vuln scanner # https://github.com/ffuf/ffuf fuzz faster # Scanner that looks for existing or hidden web objects # https://github.com/OJ/gobuster gobuster # sql injection havij hexometer jbrofuzz jorgee libwhisker # port scanner # https://github.com/robertdavidgraham/masscan masscan morfeus # Nessus # http://www.tenable.com/products/nessus-vulnerability-scanner nessus netlab360 netsparker # vuln scanner # https://cirt.net/Nikto2 nikto nmap # https://github.com/projectdiscovery/nuclei nuclei # http://www.openvas.org/ openvas sitelockspider # SQL Injections # http://sqlmap.org/ sqlmap # https://www.cyber.nj.gov/threat-profiles/trojan-variants/sysscan sysscan # https://github.com/google/tsunami-security-scanner TsunamiSecurityScanner w3af.org # http://www.robotstxt.org/db/webbandit.html webbandit # (deprecated) http://www.scrt.ch/en/attack/downloads/webshag webshag # https://github.com/xmendez/wfuzz wfuzz whatweb wprecon # wordpress vuln scanner # https://wpscan.org/ wpscan # ZGrab scanner (Mozilla/5.0 zgrab/0.x) # https://zmap.io zgrab zmeu
[-] REQUEST-932-APPLICATION-ATTACK-RCE.conf
[edit]
[-] REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
[edit]
[-] ssrf.data
[edit]
[-] REQUEST-931-APPLICATION-ATTACK-RFI.conf
[edit]
[+]
..
[-] REQUEST-941-APPLICATION-ATTACK-XSS.conf
[edit]
[-] REQUEST-920-PROTOCOL-ENFORCEMENT.conf
[edit]
[-] REQUEST-949-BLOCKING-EVALUATION.conf
[edit]
[-] RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example
[edit]
[-] REQUEST-922-MULTIPART-ATTACK.conf
[edit]
[-] web-shells-php.data
[edit]
[-] REQUEST-933-APPLICATION-ATTACK-PHP.conf
[edit]
[-] RESPONSE-953-DATA-LEAKAGES-PHP.conf
[edit]
[-] RESPONSE-950-DATA-LEAKAGES.conf
[edit]
[-] REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
[edit]
[-] sql-errors.data
[edit]
[-] restricted-files.data
[edit]
[-] restricted-upload.data
[edit]
[-] REQUEST-921-PROTOCOL-ATTACK.conf
[edit]
[-] REQUEST-913-SCANNER-DETECTION.conf
[edit]
[-] php-config-directives.data
[edit]
[-] RESPONSE-951-DATA-LEAKAGES-SQL.conf
[edit]
[-] php-variables.data
[edit]
[-] RESPONSE-954-DATA-LEAKAGES-IIS.conf
[edit]
[-] unix-shell.data
[edit]
[-] REQUEST-901-INITIALIZATION.conf
[edit]
[-] php-function-names-933151.data
[edit]
[-] iis-errors.data
[edit]
[-] REQUEST-911-METHOD-ENFORCEMENT.conf
[edit]
[-] RESPONSE-952-DATA-LEAKAGES-JAVA.conf
[edit]
[-] scanners-user-agents.data
[edit]
[-] RESPONSE-980-CORRELATION.conf
[edit]
[-] php-function-names-933150.data
[edit]
[-] REQUEST-944-APPLICATION-ATTACK-JAVA.conf
[edit]
[-] java-errors.data
[edit]
[-] windows-powershell-commands.data
[edit]
[-] REQUEST-942-APPLICATION-ATTACK-SQLI.conf
[edit]
[-] java-classes.data
[edit]
[-] php-errors-pl2.data
[edit]
[-] php-errors.data
[edit]
[-] REQUEST-905-COMMON-EXCEPTIONS.conf
[edit]
[-] RESPONSE-959-BLOCKING-EVALUATION.conf
[edit]
[-] REQUEST-930-APPLICATION-ATTACK-LFI.conf
[edit]
[-] RESPONSE-955-WEB-SHELLS.conf
[edit]
[-] java-code-leakages.data
[edit]
[-] REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
[edit]
[-] lfi-os-files.data
[edit]