http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?page=Hacksudo2
To find hidden content, I proceeded with directory fuzzing: $ ffuf -u http://[TARGET_IP]/FUZZ -w /path/to/SecLists/Discovery/Web-Content/files_possible.txt This revealed several directories and a potentially interesting file: web [Status: 301, Size: 314, Words: 20, Lines: 10]
audio [Status: 301, Size: 316, Words: 20, Lines: 10]
css [Status: 301, Size: 314, Words: 20, Lines: 10]
lib [Status: 301, Size: 314, Words:...