Hidden Parameters/README.md
Web applications often have hidden or undocumented parameters that are not exposed in the user interface. Fuzzing can help discover these parameters, which might be vulnerable to various attacks.
Use wordlists of common parameters and send them, look for unexpected behavior from the backend.
x8 -u "https://example.com/" -w <wordlist>
x8 -u "https://example.com/" -X POST -w <wordlist>
Wordlist examples:
Explore all the URL from your targets to find old parameters.