Skip to content

Conversation

pUrGe12
Copy link
Contributor

@pUrGe12 pUrGe12 commented Mar 10, 2025

Cleaning the profiles list, as mentioned in #1038. The following changes were made

  • removed vulnerability from all of them because it was a subset of vuln and vuln is easier to type
  • remove brute-force as its the same as brute and brute is better.
  • check for cve_2021_something and add that to cve2021 and cve only.
  • removed the puneethreddyrc profile
  • info and information-gathering, keeping it consistent and non-redundant.
  • wp and wordpress, keeping it consistent and non-redudant.
  • remove infortmation
  • Make relevant changes to the doc.

Your PR description goes here.

Type of change

  • New core framework functionality
  • Bugfix (non-breaking change which fixes an issue)
  • Code refactoring without any functionality changes
  • New or existing module/payload change
  • Localization improvement
  • Dependency upgrade
  • Documentation improvement

Checklist

  • I've followed the contributing guidelines
  • I've run make pre-commit, it didn't generate any changes
  • I've run make test, all tests passed locally

Copy link
Contributor

coderabbitai bot commented Sep 4, 2025

Summary by CodeRabbit

  • New Features

    • Added a new profile alias: asset_discovery.
  • Documentation

    • Updated CLI help and examples to use profile aliases (info, vuln); removed references to brute_force and information_gathering.
    • Refreshed English and Persian sections with alias-based usage (e.g., info, info,vuln).
  • Refactor

    • Standardized profiles across modules:
      • Replaced information_gathering (and misspelling) with info.
      • Removed brute_force from brute modules.
      • Removed vulnerability tag from many vulnerability modules.
      • Consolidated WordPress profiles by removing wp where applicable.

Walkthrough

Removed and standardized profile tags across docs and module YAMLs: replaced information_gathering with info, removed brute_force from brute modules, removed wp and vulnerability tags from various WordPress/ vuln modules, and updated docs/examples to use new aliases and asset_discovery.

Changes

Cohort / File(s) Summary of changes
Documentation updates
docs/Usage.md
Updated CLI help and examples: removed brute_force; replaced information_gathering with info; examples now use info / info,vuln; mentioned asset_discovery alias; minor alignment edits.
Brute modules — remove brute_force profile
nettacker/modules/brute/*
.../brute/ftp.yaml, .../brute/ftps.yaml, .../brute/pop3.yaml, .../brute/pop3s.yaml, .../brute/smtp.yaml, .../brute/smtps.yaml, .../brute/ssh.yaml, .../brute/telnet.yaml
Deleted brute_force from info.profiles in each file; remaining profiles unchanged; payloads unchanged.
Scan modules — alias cleanup
nettacker/modules/scan/*
.../scan/icmp.yaml, .../scan/port.yaml, .../scan/subdomain.yaml
Removed information_gathering and misspelled infortmation from info.profiles; info retained; no payload changes.
WordPress scan profiles — remove wp
nettacker/modules/scan/*
.../scan/wordpress_version.yaml, .../scan/wp_plugin.yaml, .../scan/wp_theme.yaml, .../scan/wp_timethumbs.yaml
Removed wp from info.profiles; wordpress and other profiles retained.
Vuln modules — remove vulnerability profile (bulk)
nettacker/modules/vuln/*
Examples: .../accela_cve_2021_34370.yaml, .../adobe_coldfusion_cve_2023_26360.yaml, .../apache_*.yaml, .../citrix_*.yaml, .../cloudron_*.yaml, .../confluence_*.yaml, .../grafana_cve_2021_43798.yaml, .../log4j_cve_2021_44228.yaml, .../msexchange_*.yaml, .../omigod_cve_2021_38647.yaml, .../paloalto_*.yaml, .../sonicwall_*.yaml, .../teamcity_*.yaml, .../xdebug_rce.yaml, .../zoho_cve_2021_40539.yaml, etc. (many files)
Removed vulnerability from info.profiles across numerous vuln modules; no payload/logic changes.
Vuln modules — additional tag removals / alias changes
nettacker/modules/vuln/*
.../cyberoam_netgenie_cve_2021_38702.yaml, .../puneethreddyhc_sqli_*.yaml, .../graphql.yaml, .../wp_plugin_*.yaml, .../wp_xmlrpc_*.yaml
Removed additional tags such as cve_2021_38702, puneethreddyhc, and wp where present; replaced information_gathering with info in graphql.yaml; removed vulnerability where present.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes


📜 Recent review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

💡 Knowledge Base configuration:

  • MCP integration is disabled by default for public repositories
  • Jira integration is disabled by default for public repositories
  • Linear integration is disabled by default for public repositories

You can enable these sources in your CodeRabbit configuration.

📥 Commits

Reviewing files that changed from the base of the PR and between 0d09819 and ecbad27.

📒 Files selected for processing (2)
  • docs/Usage.md (4 hunks)
  • nettacker/modules/vuln/graphql.yaml (0 hunks)
💤 Files with no reviewable changes (1)
  • nettacker/modules/vuln/graphql.yaml
🚧 Files skipped from review as they are similar to previous changes (1)
  • docs/Usage.md
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
  • GitHub Check: Test Docker image
✨ Finishing Touches
🧪 Generate unit tests
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

CodeRabbit Commands (Invoked using PR/Issue comments)

Type @coderabbitai help to get the list of available commands.

Other keywords and placeholders

  • Add @coderabbitai ignore or @coderabbit ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Status, Documentation and Community

  • Visit our Status Page to check the current availability of CodeRabbit.
  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

💡 Knowledge Base configuration:

  • MCP integration is disabled by default for public repositories
  • Jira integration is disabled by default for public repositories
  • Linear integration is disabled by default for public repositories

You can enable these sources in your CodeRabbit configuration.

📥 Commits

Reviewing files that changed from the base of the PR and between cd0d168 and 0d09819.

📒 Files selected for processing (82)
  • docs/Usage.md (4 hunks)
  • nettacker/modules/brute/ftp.yaml (0 hunks)
  • nettacker/modules/brute/ftps.yaml (0 hunks)
  • nettacker/modules/brute/pop3.yaml (0 hunks)
  • nettacker/modules/brute/pop3s.yaml (0 hunks)
  • nettacker/modules/brute/smtp.yaml (0 hunks)
  • nettacker/modules/brute/smtps.yaml (0 hunks)
  • nettacker/modules/brute/ssh.yaml (0 hunks)
  • nettacker/modules/brute/telnet.yaml (0 hunks)
  • nettacker/modules/scan/icmp.yaml (0 hunks)
  • nettacker/modules/scan/port.yaml (0 hunks)
  • nettacker/modules/scan/subdomain.yaml (0 hunks)
  • nettacker/modules/scan/wordpress_version.yaml (0 hunks)
  • nettacker/modules/scan/wp_plugin.yaml (0 hunks)
  • nettacker/modules/scan/wp_theme.yaml (0 hunks)
  • nettacker/modules/scan/wp_timethumbs.yaml (0 hunks)
  • nettacker/modules/vuln/accela_cve_2021_34370.yaml (0 hunks)
  • nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml (0 hunks)
  • nettacker/modules/vuln/apache_cve_2021_41773.yaml (0 hunks)
  • nettacker/modules/vuln/apache_cve_2021_42013.yaml (0 hunks)
  • nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml (0 hunks)
  • nettacker/modules/vuln/apache_struts.yaml (0 hunks)
  • nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml (0 hunks)
  • nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml (0 hunks)
  • nettacker/modules/vuln/citrix_cve_2019_19781.yaml (0 hunks)
  • nettacker/modules/vuln/citrix_cve_2023_24488.yaml (0 hunks)
  • nettacker/modules/vuln/citrix_cve_2023_4966.yaml (0 hunks)
  • nettacker/modules/vuln/clickjacking.yaml (0 hunks)
  • nettacker/modules/vuln/cloudron_cve_2021_40868.yaml (0 hunks)
  • nettacker/modules/vuln/confluence_cve_2023_22515.yaml (0 hunks)
  • nettacker/modules/vuln/confluence_cve_2023_22527.yaml (0 hunks)
  • nettacker/modules/vuln/content_security_policy.yaml (0 hunks)
  • nettacker/modules/vuln/content_type_options.yaml (0 hunks)
  • nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml (0 hunks)
  • nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml (0 hunks)
  • nettacker/modules/vuln/f5_cve_2020_5902.yaml (0 hunks)
  • nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml (0 hunks)
  • nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml (0 hunks)
  • nettacker/modules/vuln/grafana_cve_2021_43798.yaml (0 hunks)
  • nettacker/modules/vuln/graphql.yaml (1 hunks)
  • nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml (0 hunks)
  • nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml (0 hunks)
  • nettacker/modules/vuln/http_cookie.yaml (0 hunks)
  • nettacker/modules/vuln/http_cors.yaml (0 hunks)
  • nettacker/modules/vuln/http_options_enabled.yaml (0 hunks)
  • nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml (0 hunks)
  • nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml (0 hunks)
  • nettacker/modules/vuln/justwirting_cve_2021_41878.yaml (0 hunks)
  • nettacker/modules/vuln/log4j_cve_2021_44228.yaml (0 hunks)
  • nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml (0 hunks)
  • nettacker/modules/vuln/msexchange_cve_2021_26855.yaml (0 hunks)
  • nettacker/modules/vuln/msexchange_cve_2021_34473.yaml (0 hunks)
  • nettacker/modules/vuln/novnc_cve_2021_3654.yaml (0 hunks)
  • nettacker/modules/vuln/omigod_cve_2021_38647.yaml (0 hunks)
  • nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml (0 hunks)
  • nettacker/modules/vuln/payara_cve_2021_41381.yaml (0 hunks)
  • nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml (0 hunks)
  • nettacker/modules/vuln/placeos_cve_2021_41826.yaml (0 hunks)
  • nettacker/modules/vuln/prestashop_cve_2021_37538.yaml (0 hunks)
  • nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml (0 hunks)
  • nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml (0 hunks)
  • nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml (0 hunks)
  • nettacker/modules/vuln/server_version.yaml (0 hunks)
  • nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml (0 hunks)
  • nettacker/modules/vuln/strict_transport_security.yaml (0 hunks)
  • nettacker/modules/vuln/subdomain_takeover.yaml (0 hunks)
  • nettacker/modules/vuln/teamcity_cve_2024_27198.yaml (0 hunks)
  • nettacker/modules/vuln/tieline_cve_2021_35336.yaml (0 hunks)
  • nettacker/modules/vuln/tjws_cve_2021_37573.yaml (0 hunks)
  • nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml (0 hunks)
  • nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml (0 hunks)
  • nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml (0 hunks)
  • nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml (0 hunks)
  • nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml (0 hunks)
  • nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml (0 hunks)
  • nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml (0 hunks)
  • nettacker/modules/vuln/wp_xmlrpc_dos.yaml (0 hunks)
  • nettacker/modules/vuln/wp_xmlrpc_pingback.yaml (0 hunks)
  • nettacker/modules/vuln/x_powered_by.yaml (0 hunks)
  • nettacker/modules/vuln/x_xss_protection.yaml (0 hunks)
  • nettacker/modules/vuln/xdebug_rce.yaml (0 hunks)
  • nettacker/modules/vuln/zoho_cve_2021_40539.yaml (0 hunks)
💤 Files with no reviewable changes (80)
  • nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml
  • nettacker/modules/scan/icmp.yaml
  • nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml
  • nettacker/modules/brute/telnet.yaml
  • nettacker/modules/brute/ftp.yaml
  • nettacker/modules/vuln/tjws_cve_2021_37573.yaml
  • nettacker/modules/vuln/payara_cve_2021_41381.yaml
  • nettacker/modules/vuln/accela_cve_2021_34370.yaml
  • nettacker/modules/vuln/strict_transport_security.yaml
  • nettacker/modules/vuln/zoho_cve_2021_40539.yaml
  • nettacker/modules/vuln/wp_xmlrpc_dos.yaml
  • nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml
  • nettacker/modules/vuln/justwirting_cve_2021_41878.yaml
  • nettacker/modules/vuln/content_type_options.yaml
  • nettacker/modules/brute/smtp.yaml
  • nettacker/modules/vuln/apache_cve_2021_41773.yaml
  • nettacker/modules/vuln/apache_cve_2021_42013.yaml
  • nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml
  • nettacker/modules/vuln/citrix_cve_2023_4966.yaml
  • nettacker/modules/vuln/http_cookie.yaml
  • nettacker/modules/vuln/wp_xmlrpc_pingback.yaml
  • nettacker/modules/brute/pop3s.yaml
  • nettacker/modules/vuln/tieline_cve_2021_35336.yaml
  • nettacker/modules/vuln/citrix_cve_2023_24488.yaml
  • nettacker/modules/vuln/subdomain_takeover.yaml
  • nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml
  • nettacker/modules/vuln/server_version.yaml
  • nettacker/modules/vuln/confluence_cve_2023_22515.yaml
  • nettacker/modules/scan/wordpress_version.yaml
  • nettacker/modules/vuln/prestashop_cve_2021_37538.yaml
  • nettacker/modules/vuln/xdebug_rce.yaml
  • nettacker/modules/brute/ssh.yaml
  • nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml
  • nettacker/modules/vuln/msexchange_cve_2021_26855.yaml
  • nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml
  • nettacker/modules/scan/subdomain.yaml
  • nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml
  • nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml
  • nettacker/modules/brute/pop3.yaml
  • nettacker/modules/vuln/apache_struts.yaml
  • nettacker/modules/vuln/http_options_enabled.yaml
  • nettacker/modules/vuln/citrix_cve_2019_19781.yaml
  • nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml
  • nettacker/modules/vuln/msexchange_cve_2021_34473.yaml
  • nettacker/modules/vuln/content_security_policy.yaml
  • nettacker/modules/vuln/grafana_cve_2021_43798.yaml
  • nettacker/modules/vuln/teamcity_cve_2024_27198.yaml
  • nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml
  • nettacker/modules/scan/wp_theme.yaml
  • nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml
  • nettacker/modules/scan/port.yaml
  • nettacker/modules/scan/wp_plugin.yaml
  • nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml
  • nettacker/modules/vuln/f5_cve_2020_5902.yaml
  • nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml
  • nettacker/modules/vuln/http_cors.yaml
  • nettacker/modules/vuln/x_xss_protection.yaml
  • nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml
  • nettacker/modules/scan/wp_timethumbs.yaml
  • nettacker/modules/brute/smtps.yaml
  • nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml
  • nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml
  • nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml
  • nettacker/modules/vuln/clickjacking.yaml
  • nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml
  • nettacker/modules/brute/ftps.yaml
  • nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml
  • nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml
  • nettacker/modules/vuln/omigod_cve_2021_38647.yaml
  • nettacker/modules/vuln/log4j_cve_2021_44228.yaml
  • nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml
  • nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml
  • nettacker/modules/vuln/confluence_cve_2023_22527.yaml
  • nettacker/modules/vuln/novnc_cve_2021_3654.yaml
  • nettacker/modules/vuln/placeos_cve_2021_41826.yaml
  • nettacker/modules/vuln/cloudron_cve_2021_40868.yaml
  • nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml
  • nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml
  • nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml
  • nettacker/modules/vuln/x_powered_by.yaml
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
  • GitHub Check: Test Docker 27.5.0-1ubuntu.24.04noble image build
  • GitHub Check: Test Docker 26.0.0-1ubuntu.24.04noble image build
  • GitHub Check: Test Docker 26.1.4-1ubuntu.24.04noble image build
  • GitHub Check: Build package
  • GitHub Check: Test Docker image
🔇 Additional comments (3)
docs/Usage.md (3)

84-85: Profiles list: brute_force removed, brute retained — looks good.


232-233: Farsi help profiles updated (brute retained) — looks good.


414-450: Docs output shows graphql_vuln without info — align the module YAML accordingly.

This matches expected taxonomy (vuln-only). Ensure nettacker/modules/vuln/graphql.yaml does not include info.

@securestep9 securestep9 added this pull request to the merge queue Sep 4, 2025
Merged via the queue into OWASP:master with commit 1d37e0e Sep 4, 2025
18 checks passed
@securestep9 securestep9 mentioned this pull request Sep 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants