* Add regex for SMB protocol in port.yaml to fix the bug #1147
Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>
* smb_fix done
* Enable SMB regex match in port.yaml to fix the bug #1147
Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>
---------
Signed-off-by: Aarush289 <cs24b064@smail.iitm.ac.in>
Co-authored-by: Sam Stepanyan <sam.stepanyan@owasp.org>
* removed the vulnerability profile as it a subset of vuln
* removed brute_force profile as it is exactly same as brute
* removed cve_2021_38702 as a profile, its already there in cve, cve2021 and more relevant ones
* removed the puneethreddyrc profile
* removed information_gathering profile, added graphql.yaml to info
* removed the wp profile, it was a subset of wordpress
* removed the infortmation profile
* made relevant changes to the doc
* coderabbit suggestions
The issue caused the program to erroneously run a regex pattern on HTML content instead of the request data. This was because the port number wasn't displayed in the HTML's body content. The commit rectifies this problem, ensuring that regex operates on the correct data.