--- name: SecLists Fuzzing (Curated) description: Essential fuzzing payloads: SQL injection, command injection, special characters. Curated essentials for vulnerability testing. --- # SecLists Fuzzing (Curated) ## Description Essential fuzzing payloads: SQL injection, command injection, special characters. Curated essentials for vulnerability testing. **Source:** [SecLists/Fuzzing](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing) **Repository:** https://github.com/danielmiessler/SecLists **License:** MIT ## When to Use This Skill Use this skill when you need: - SQL injection testing - Command injection testing - Input validation testing - LDAP injection - NoSQL injection **⚠️ IMPORTANT:** Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes. ## Key Files in This Skill - `quick-SQLi.txt - Quick SQL injection tests` - `Generic-SQLi.txt - Generic SQL injection` - `sqli.auth.bypass.txt - Authentication bypass` - `MySQL.fuzzdb.txt - MySQL-specific payloads` - `NoSQL.txt - NoSQL injection payloads` - `command-injection-commix.txt - Command injection` ## Usage Example ```python # Access files from this skill import os # Example: Load patterns/payloads skill_path = "references/Fuzzing" # List all available files for root, dirs, files in os.walk(skill_path): for file in files: if file.endswith('.txt'): filepath = os.path.join(root, file) print(f"Found: {filepath}") # Read file content with open(filepath, 'r', errors='ignore') as f: content = f.read().splitlines() print(f" Lines: {len(content)}") ``` ## Security & Ethics ### Authorized Use Cases ✅ - Authorized penetration testing with written permission - Bug bounty programs (within scope) - CTF competitions - Security research in controlled environments - Testing your own systems - Educational demonstrations ### Prohibited Use Cases ❌ - Unauthorized access attempts - Testing without permission - Malicious activities - Privacy violations - Any illegal activities ## Complete SecLists Collection This is a curated subset of SecLists. For the complete collection: - **Full repository:** https://github.com/danielmiessler/SecLists - **Size:** 4.5 GB with 6,000+ files - **All categories:** Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous --- **Generated by Skill Seeker** | SecLists Fuzzing Collection **License:** MIT - Use responsibly with proper authorization