File Access Bruteforce Attempts for 2021-05-05

Share on:

Last Updated: 21:05 GMT+8

  • .git//index
  • .git/HEAD
  • adm/
  • adm/css/errors.css
  • admin
  • admin.php
  • admin/api.php?version
  • admin/cms/login/
  • admin/login.php
  • admin/textolite.css
  • admin/view/javascript/common.js
  • administrator
  • app-ads.txt
  • backup/
  • bc/
  • blog/
  • blog/wp-login.php
  • cms/
  • cms/lang/ru_utf8/css/sbIndex.css
  • css/admin/layout.css
  • css/album.css
  • edc_admin/Login/Style.css
  • engine/classes/js/dle_js.js
  • etm/indy.css
  • faq/
  • icms
  • indy/indy.css
  • js/lang/ru_RU/translate.js
  • login
  • manager
  • modules
  • modules/mod_stats.xml
  • mscms/
  • netcat/
  • new/
  • old/
  • old/wp-admin/
  • phishingdomains-2021-02-23/
  • port27038/
  • resource/js/corelang.js
  • ru/admin/login.html
  • scripts/admin/popup.js
  • sellers.json
  • skins/simpla_blue/style.css
  • static/cartreminder.js
  • static/common.css
  • status
  • status/format/json
  • status?full&json
  • stub_status
  • temp/
  • this-is-cms-s3
  • us
  • vendor/phpunit/phpunit/phpunit.xsd
  • wordpress/
  • wordpress/wp-login.php
  • wp-includes/js/jquery/jquery.js
  • wp-login.php
  • wp/
  • wp/wp-login.php