File Access Bruteforce Attempts for 2021-09-09

Share on:

Last Updated: 21:09 UTC

  • .git/config
  • .well-known/apple-app-site-association
  • 098.php
  • HNAP1/
  • Marvins.php
  • RxR.php
  • V3.php
  • V5.php
  • XxX.php
  • admin/.env
  • admin/api.php?version
  • admin/index.php
  • admin/index.php?route=common/login
  • administrator/templates/bluestork/error.php
  • administrator/templates/bluestork/index.php
  • administrator/templates/hathor/error.php
  • administrator/templates/hathor/index.php
  • administrator/templates/isis/error.php
  • administrator/templates/isis/index.php
  • alfindex.php
  • api/.env
  • app-ads.txt
  • apple-touch-icon.png
  • assets/img/logo-high-resolution.png
  • blog/.env
  • boom.php?x
  • components/com_b2jcontact/izoc.php
  • config.php
  • csv
  • cve-2007-1192/
  • docs/
  • error.php
  • feed
  • feeds
  • files/
  • gallery/
  • haders.php
  • images/
  • images/vuln.php
  • img/
  • index.php?3x=3x
  • indoxploit.php
  • laravel/.env
  • legion.php
  • libraries/joomla/css.php
  • libraries/joomla/jmail.php?u
  • libraries/joomla/jmails.php?u
  • modules/modules/modules.php
  • moduless.php
  • new_license.php
  • olux.php
  • pdf/
  • phishingdomains-2021-09-08/
  • phishingdomains-2021-09-09/
  • public/.env
  • rss
  • rxr.php?rxr
  • sellers.json
  • shell.php
  • shop/.env
  • sites/.env
  • status
  • status/format/json
  • status?full&json
  • stub_status
  • style.php
  • system/.env
  • templates/atomic/error.php
  • templates/atomic/index.php
  • templates/beez/index.php
  • templates/beez3/error.php
  • templates/beez3/index.php
  • templates/beez5/error.php
  • templates/beez5/index.php
  • templates/beez_20/error.php
  • templates/beez_20/index.php
  • templates/ja_purity/index.php
  • templates/protostar/error.php
  • templates/protostar/index.php
  • templates/rhuk_milkyway/index.php
  • templates/system/error.php
  • templates/system/index.php
  • test/.env
  • tmp/vuln.php
  • up.php
  • upel.php
  • upload.php
  • upload/
  • uploads/
  • us
  • vendor/.env
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • wp-admin/network/wp-footer.php
  • wp-admin/shapes.php
  • wp-content/db_cache.php
  • wp-content/mu-plugins/db-safe-mode.php
  • wp-content/plugins/backup_index.php
  • wp-content/plugins/fancy-product-designer/inc/custom-image-handler.php
  • wp-content/plugins/html404/index.html
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-content/plugins/ppus/up.php
  • wp-content/plugins/t_file_wp/t_file_wp.php?test=hello
  • wp-content/plugins/theme-configurator/mini.php
  • wp-content/plugins/ubh/index.php
  • wp-content/plugins/upspy/index.php
  • wp-content/plugins/vwcleanerplugin/bump.php?cache
  • wp-content/plugins/widget-logic/mini.php
  • wp-content/plugins/wpdiscuz/themes/default/style-rtl.css
  • wp-content/plugins/xichang/x.php?xi
  • wp-content/uploads/
  • wp-content/uploads/2021/09/
  • wp-content/vuln.php
  • wp-content/wp-1ogin_bak.php
  • wp-content/wp-old-index.php?action=login&pass=-1&submit=
  • wp-includes/css/css.php
  • wp-includes/css/modules.php
  • wp-includes/fonts/css.php
  • wp-includes/lfx.php
  • wp-includes/small.php
  • wp-info.php
  • wp-login.php
  • wso.php
  • xmlrpc.php