I'm grateful for the support received by Tutanota
Content Bruteforcing Wordlist
Wordlist for content(directory) bruteforce discovering with Burp Suite extension Turbo Intruder
- burp-wordlist.txt - size: 211236829 - sha256sum: bbf3d3e0e94934b7dbb59d9b587fb0782b76b154584ead774e18e03c849bc01b
wget "https://localdomain.pw/Content-Bruteforcing-Wordlist/burp-wordlist.txt?ver=211236829" -O burp-wordlist.txt
Usage:
See the example: turbo-intruder-example.py
https://github.com/cujanovic/Content-Bruteforcing-Wordlist/blob/master/turbo-intruder-example.py
Use Burp Suite extension Turbo Intruder for scanning with pipeline=True
https://github.com/PortSwigger/turbo-intruder/blob/master/resources/examples/basic.py