{"id":13797056,"url":"https://github.com/soffensive/windowsblindread","last_synced_at":"2025-05-13T02:30:53.121Z","repository":{"id":163941317,"uuid":"137860470","full_name":"soffensive/windowsblindread","owner":"soffensive","description":"A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system","archived":false,"fork":false,"pushed_at":"2023-05-11T10:59:50.000Z","size":212,"stargazers_count":199,"open_issues_count":0,"forks_count":36,"subscribers_count":5,"default_branch":"master","last_synced_at":"2024-11-18T11:36:58.746Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/soffensive.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2018-06-19T08:10:24.000Z","updated_at":"2024-10-30T12:51:44.000Z","dependencies_parsed_at":null,"dependency_job_id":"f1180ff7-689a-4101-9e10-7f42d524ecbe","html_url":"https://github.com/soffensive/windowsblindread","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/soffensive%2Fwindowsblindread","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/soffensive%2Fwindowsblindread/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/soffensive%2Fwindowsblindread/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/soffensive%2Fwindowsblindread/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/soffensive","download_url":"https://codeload.github.com/soffensive/windowsblindread/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253859473,"owners_count":21975116,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-03T23:01:21.034Z","updated_at":"2025-05-13T02:30:52.858Z","avatar_url":"https://github.com/soffensive.png","language":null,"readme":"# windowsblindread\nA list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system.\n\n\nCheck out the corresponding blog post at https://soffensive.github.io/posts/web-app-sec/2018-06-19-exploiting-blind-file-reads-path-traversal-vulnerabilities-on-microsoft-windows-operating-systems/\n","funding_links":[],"categories":["\u003ca id=\"8c5a692b5d26527ef346687e047c5c21\"\u003e\u003c/a\u003e收集","Operating Systems"],"sub_categories":["Windows"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsoffensive%2Fwindowsblindread","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsoffensive%2Fwindowsblindread","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsoffensive%2Fwindowsblindread/lists"}