Skip to content

FuzzDB

Dictionary of attack patterns for fault injection

Description

FuzzDB is a comprehensive dictionary of attack patterns, predictable resource locations, regex patterns for server response identification, and documentation resources. It's the go-to payload database for manual and automated web application testing.

Installation

BASH
git clone https://github.com/fuzzdb-project/fuzzdb.git

# Or use directly in tools
# ffuf, Burp Intruder, wfuzz, etc. can reference FuzzDB files

Directory Structure

TEXT
fuzzdb/
├── attack/                    # Attack payloads
│   ├── sql-injection/        # SQLi payloads
│   ├── xss/                  # XSS payloads
│   ├── os-cmd-execution/     # Command injection
│   ├── lfi/                  # Local file inclusion
│   ├── rfi/                  # Remote file inclusion
│   ├── xxe/                  # XXE payloads
│   └── path-traversal/       # Directory traversal
├── discovery/                 # Resource discovery
│   ├── predictable-filepaths/ # Common file/dir paths
│   ├── dns/                  # DNS wordlists
│   └── web-content/          # Web content paths
├── regex/                     # Detection patterns
│   ├── errors/               # Error message patterns
│   └── credit-cards/         # CC number patterns
└── wordlists-user-passwd/     # Username/password lists

Common Usage

BASH
# Use with ffuf for content discovery
ffuf -u https://target.com/FUZZ -w fuzzdb/discovery/predictable-filepaths/filename-dirname-bruteforce/raft-medium-directories.txt

# Use with Burp Intruder for SQLi testing
# Load: fuzzdb/attack/sql-injection/detect/xplatform.txt

# XSS payload testing
ffuf -u "https://target.com/search?q=FUZZ" -w fuzzdb/attack/xss/xss-uri.txt -fr "FUZZ"

# LFI testing
ffuf -u "https://target.com/page?file=FUZZ" -w fuzzdb/attack/lfi/common-lfi-params.txt

# Error-based detection
# Use regex patterns from fuzzdb/regex/errors/ to detect SQL errors, stack traces

Bug Bounty Tips

BASH
# Most useful wordlists for bug bounty:
# 1. fuzzdb/attack/sql-injection/detect/*.txt → quick SQLi detection
# 2. fuzzdb/attack/xss/*.txt → comprehensive XSS payloads
# 3. fuzzdb/discovery/predictable-filepaths/ → hidden file discovery
# 4. fuzzdb/attack/lfi/ → LFI/path traversal payloads
# 5. fuzzdb/attack/os-cmd-execution/ → command injection payloads