URL Inventory

List of all URL mentioned in the code..

ValueCountFile:Line
'https://github.com/digininja/DVWA/'
1
  • /login.php
'http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/'
1
  • /vulnerabilities/sqli_blind/index.php
'https://secure.php.net/manual/en/function.phpinfo.php'
1
  • /vulnerabilities/upload/help/help.php
'https://secure.php.net/manual/en/function.system.php'
1
  • /vulnerabilities/upload/help/help.php
'https://github.com/PHPIDS/PHPIDS'
1
  • /security.php
'http://www.symantec.com/connect/articles/password-crackers-ensuring-security-your-password'
1
  • /vulnerabilities/brute/index.php
'http://www.sillychicken.co.nz/Security/how-to-brute-force-http-forms-in-windows.html'
1
  • /vulnerabilities/brute/index.php
'https://en.wikipedia.org/wiki/Password_cracking'
1
  • /vulnerabilities/brute/help/help.php
'https://secure.php.net/manual/en/wrappers.php'
1
  • /vulnerabilities/fi/help/help.php
'https://www.securiteam.com/securityreviews/5DP0N1P76E.html'
1
  • /vulnerabilities/sqli/index.php
'https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/'
1
  • /vulnerabilities/sqli/index.php
'https://owasp.org/www-community/attacks/SQL_Injection'
1
  • /vulnerabilities/sqli/index.php
'https://bobby-tables.com/'
1
  • /vulnerabilities/sqli/index.php
'https://www.owasp.org/index.php/SQL_Injection'
1
  • /vulnerabilities/sqli/help/help.php
'http://www.securiteam.com/securityreviews/5DP0N1P76E.html'
1
  • /vulnerabilities/sqli_blind/index.php
'http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet'
1
  • /vulnerabilities/sqli_blind/index.php
'https://blogs.securiteam.com/index.php/archives/1268'
1
  • /vulnerabilities/upload/index.php
'http://bobby-tables.com/'
1
  • /vulnerabilities/sqli_blind/index.php
'https://owasp.org/www-community/attacks/DOM_Based_XSS'
1
  • /vulnerabilities/xss_d/index.php
'https://www.acunetix.com/blog/articles/dom-xss-explained/'
1
  • /vulnerabilities/xss_d/index.php
'http://www.cgisecurity.com/csrf-faq.html'
1
  • /vulnerabilities/csrf/index.php
'https://en.wikipedia.org/wiki/Cross-site_request_forgery '
1
  • /vulnerabilities/csrf/index.php
'https://owasp.org/www-community/attacks/xss'
1
  • /vulnerabilities/xss_s/index.php
'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/06-Session_Management_Testing/01-Testing_for_Session_Management_Schema'
1
  • /vulnerabilities/weak_id/help/help.php
'https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html'
1
  • /vulnerabilities/weak_id/help/help.php
'http://www.w3.org/TR/html4/loose.dtd'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/HTMLModuleManager.php
'http://www.w3.org/TR/html4/strict.dtd'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/HTMLModuleManager.php
'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/HTMLModuleManager.php
'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/HTMLModuleManager.php
'http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/HTMLModuleManager.php
'http://www.w3.org/1999/xhtml'
1
  • /external/phpids/0.6/lib/IDS/vendors/htmlpurifier/HTMLPurifier/ConfigSchema/Builder/Xml.php
'https://www.acunetix.com/websitesecurity/upload-forms-threat/'
1
  • /vulnerabilities/upload/index.php
'https://owasp.org/www-community/attacks/Brute_force_attack'
1
  • /vulnerabilities/brute/index.php
'https://www.google.com/recaptcha/api/siteverify'
1
  • /external/recaptcha/recaptchalib.php
'https://dewhurstsecurity.com/'
1
  • /about.php
'https://secure.php.net/manual/en/function.trim.php'
1
  • /vulnerabilities/exec/help/help.php
'https://www.vmware.com/'
1
  • /index.php
'https://www.virtualbox.org/'
1
  • /index.php
'http://github.com/PHPIDS/PHPIDS'
1
  • /about.php
'https://digi.ninja/'
1
  • /about.php
'http://tedi.heriyanto.net/'
1
  • /about.php
'http://www.paulosyibelo.com/'
1
  • /about.php
'http://www.linux-ninja.com/'
1
  • /about.php
'https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project'
1
  • /index.php
'https://www.creativenucleus.com/'
1
  • /about.php
'https://blog.g0tmi1k.com/'
1
  • /about.php
'http://brooksgarrett.com/'
1
  • /about.php
'https://github.com/digininja/DVWA/wiki'
1
  • /about.php
'https://github.com/digininja/DVWA/issues'
1
  • /about.php
'https://github.com/digininja/DVWA'
1
  • /about.php
'http://www.dvwa.co.uk/'
1
  • /about.php
'https://github.com/webpwnized/mutillidae'
1
  • /index.php
'https://www.apachefriends.org/en/xampp.html'
1
  • /index.php
'https://ponyfoo.com/articles/es6-proxies-in-depth'
1
  • /vulnerabilities/javascript/index.php
'http://www.ss64.com/nt/'
1
  • /vulnerabilities/exec/index.php
'https://www.youtube.com/watch?v=8UqHCrGdxOM'
1
  • /vulnerabilities/javascript/help/help.php
'http://www.ss64.com/bash/'
1
  • /vulnerabilities/exec/index.php
'https://www.youtube.com/playlist?list=PLC9K7uaDMdAUNktlDTxsmj6rJBf4Q9TR5'
1
  • /vulnerabilities/javascript/help/help.php
'http://www.scribd.com/doc/2530476/Php-Endangers-Remote-Code-Execution'
1
  • /vulnerabilities/exec/index.php
'https://www.google.com/recaptcha/'
1
  • /vulnerabilities/captcha/index.php
'https://www.google.com/recaptcha/admin/create'
1
  • /vulnerabilities/captcha/index.php
'https://www.w3schools.com/js/'
2
  • /vulnerabilities/javascript/index.php
  • /vulnerabilities/javascript/help/help.php
'http://www.scriptalert1.com/'
2
  • /vulnerabilities/xss_r/index.php
  • /vulnerabilities/xss_s/index.php
'https://owasp.org/www-community/attacks/Command_Injection'
2
  • /vulnerabilities/exec/index.php
  • /vulnerabilities/exec/help/help.php
'https://content-security-policy.com/'
2
  • /vulnerabilities/csp/index.php
  • /vulnerabilities/csp/help/help.php
'https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP'
2
  • /vulnerabilities/csp/index.php
  • /vulnerabilities/csp/help/help.php
'https://blog.mozilla.org/security/2014/10/04/csp-for-the-web-we-have/'
2
  • /vulnerabilities/csp/index.php
  • /vulnerabilities/csp/help/help.php
'https://secure.php.net/manual/en/function.htmlspecialchars.php'
2
  • /vulnerabilities/xss_r/help/help.php
  • /vulnerabilities/xss_s/help/help.php
'https://owasp.org/www-community/xss-filter-evasion-cheatsheet'
2
  • /vulnerabilities/xss_r/index.php
  • /vulnerabilities/xss_s/index.php
'http://www.cgisecurity.com/xss-faq.html'
2
  • /vulnerabilities/xss_r/index.php
  • /vulnerabilities/xss_s/index.php
'https://en.wikipedia.org/wiki/Cross-site_scripting'
2
  • /vulnerabilities/xss_r/index.php
  • /vulnerabilities/xss_s/index.php
'https://secure.php.net/manual/en/function.mysql-real-escape-string.php'
2
  • /vulnerabilities/sqli/help/help.php
  • /vulnerabilities/sqli_blind/help/help.php
'https://owasp.org/www-community/attacks/csrf'
2
  • /vulnerabilities/csrf/index.php
  • /vulnerabilities/csrf/help/help.php
'https://owasp.org/www-community/attacks/xss/'
2
  • /vulnerabilities/xss_d/index.php
  • /vulnerabilities/xss_r/index.php
'https://owasp.org/www-community/attacks/Blind_SQL_Injection'
2
  • /vulnerabilities/sqli_blind/index.php
  • /vulnerabilities/sqli_blind/help/help.php
'https://en.wikipedia.org/wiki/SQL_injection'
2
  • /vulnerabilities/sqli/index.php
  • /vulnerabilities/sqli_blind/index.php
'https://www.youtube.com/watch?v=cs7EQdWO5o0&index=17&list=WL'
2
  • /vulnerabilities/javascript/index.php
  • /vulnerabilities/javascript/help/help.php
'https://www.owasp.org/index.php/Unrestricted_File_Upload'
2
  • /vulnerabilities/upload/index.php
  • /vulnerabilities/upload/help/help.php
'https://en.wikipedia.org/wiki/CAPTCHA'
4
  • /vulnerabilities/captcha/index.php
  • /vulnerabilities/captcha/help/help.php
  • /vulnerabilities/captcha/help/help.php
  • /vulnerabilities/brute/help/help.php
'https://en.wikipedia.org/wiki/Remote_File_Inclusion'
5
  • /vulnerabilities/fi/file3.php
  • /vulnerabilities/fi/file2.php
  • /vulnerabilities/fi/include.php
  • /vulnerabilities/fi/file1.php
  • /vulnerabilities/fi/help/help.php
'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion'
5
  • /vulnerabilities/fi/file3.php
  • /vulnerabilities/fi/file2.php
  • /vulnerabilities/fi/include.php
  • /vulnerabilities/fi/file1.php
  • /vulnerabilities/fi/help/help.php
'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.2-Testing_for_Remote_File_Inclusion'
5
  • /vulnerabilities/fi/file3.php
  • /vulnerabilities/fi/file2.php
  • /vulnerabilities/fi/include.php
  • /vulnerabilities/fi/file1.php
  • /vulnerabilities/fi/help/help.php