Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙

License

NotificationsYou must be signed in to change notification settings

lutfumertceylan/top25-parameter

Repository files navigation


For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon


What is the OWASP Top 25 Parameters 🧙⚔️

For basic researches, top 25 vulnerable parameters based on frequency of use with reference to various articles. These parameters can be used for automation tools or manual recon. Although the prevalence percentages of these parameters cannot be proven precisely.

Data sources include numerous articles, blogs, and other resources obtained via OSINT and other open-source projects including work similar to that of Jason Haddix and HUNT.

This repo contains common parameters of the following vulnerabilities:

- Cross-Site Scripting (XSS)- Server-Side Request Forgery (SSRF)- Local File Inclusion (LFI)- SQL Injection (SQLi)- Remote Code Execution (RCE) - [for GET and POST methods]- Open Redirect

ToC


Top 25Cross-Site Scripting (XSS) Parameters

Top 25Server-Side Request Forgery (SSRF) Parameters

Top 25Local File Inclusion (LFI) Parameters

Top 25SQL Injection Parameters

Top 25Remote Code Execution (RCE) Parameters [GET based]

Top 25Open Redirect Parameters [GET based]

How can I contact you?

To report issues or make suggestions for the Top-25 Parameters, please useGitHub Issues.

For everything else, we're easy to answer your e-mail :

  1. Send an e-mail tolutfu.mertceylan[at]owasp.org
  2. Send an e-mail toinfo[at]lutfumertceylan.com.tr

You can @ us on Twitter@lutfumertceylan.

About

For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors3

  •  
  •  
  •  

[8]ページ先頭

©2009-2025 Movatter.jp