A list of useful payloads and bypass for Web Application Security and Pentest/CTF
security
hacking
web-application
cheatsheet
enumeration
penetration-testing
bounty
vulnerability
methodology
bugbounty
pentest
bypass
payload
payloads
hacktoberfest
privilege-escalation
redteam
-
Updated
Jan 1, 2022 - Python
I think you forgot to add an option to reuse a cookie?
gobuster dir --url http://192.168.246.147:17445 -x jsp,php,txt,sh -w /usr/share/wordlists/dirb/big.txt -t 40 -c "JSESSIONID=6F792E7FC837806D825C8DC077AF9230"
This option can certainly be done in the "Header" argument field but for ease of use, suggest you give the user a shortcut with a cookie argument