Web Content Discovery
Manual Discovery
# Settings files
/robots.txt
/security.txt
/.well-known/security.txt
/.well-known/apple-app-site-association
/.well-known/assetlinks.json
/sitemap.xml
/sitemaps.xml
# JavaScript files
/main.js
/script.js
/js/jquery.min.js
/js/main.js
/js/script.js
# CGI scripts
/cgi-bin/example.cgi
# Wave dashes
/~files/
/~hidden/
# PHP files
/index.php
/config.php
/403.php
/404.php
# Python files
/main.py
/module.py
/module/__init__.py
/modules/__init__.py
__init__.py
config.ini
project.wsgi
# Archives
/example.zip
/backup.zip
/backups.zip
# Backup files
/example.bak
/example.jpg.bak
/images/example.jpg.bak
# Directories
/admin/
/blog/
# Sensitive information
/.env
# GitHub
/README.md
/.git
/.github
/.gitignore
# Apache Tomcat
/manager
# ASP.NET
/trace.axd
/example.asp
/example.aspx
/example.aspx/trace.axd
/web.config
# If you know the users manage the website, try the usernames
/admin
/administrator
/john
/michael
# API endpoints
/api/login
/api/signin
/api/user
/api/user/1
/api/users
/api/v1/
/api/v2/
# If we have the secret keyword found when investigating, we can attempt to access following contents.
/<keyword>
/<keyword>.html
/<keyword>.txt
/<keyword>.php
/<keyword>.py
/?<keyword>=test
# We might be able to access directories by using keywords we found.
/<site_title>
/<site_theme>
/<site_author>
/<image_theme>
/?<post_param>=testWordlists
CeWL
SecLists
Automation
Ffuf
Dirsearch
Gobuster
Dirb
FeroxBuster
Hakrawler
Wfuzz
Framework Detection from Favicon
Parsing .DS_Store
Last updated