mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 06:15:57 -05:00
Deploy README.md and Categorize Docs
This commit is contained in:
parent
139ccdbf3b
commit
0a4e5b5155
16
README.md
16
README.md
@ -28,7 +28,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
| | Attributes |
|
||||
|-------|---------------------------------------------------|
|
||||
| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`|
|
||||
| Tags | [`pentest`](/categorize/tags/pentest.md) [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`infra`](/categorize/tags/infra.md) [`url`](/categorize/tags/url.md) [`param`](/categorize/tags/param.md) [`osint`](/categorize/tags/osint.md) [`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md) [`crawl`](/categorize/tags/crawl.md) [`dns`](/categorize/tags/dns.md) [`endpoint`](/categorize/tags/endpoint.md) [`port`](/categorize/tags/port.md) [`domain`](/categorize/tags/domain.md) [`graphql`](/categorize/tags/graphql.md) [`apk`](/categorize/tags/apk.md) [`portscan`](/categorize/tags/portscan.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`ssrf`](/categorize/tags/ssrf.md) [`broken-link`](/categorize/tags/broken-link.md) [`xss`](/categorize/tags/xss.md) [`smuggle`](/categorize/tags/smuggle.md) [`sqli`](/categorize/tags/sqli.md) [`csp`](/categorize/tags/csp.md) [`s3`](/categorize/tags/s3.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`aaa`](/categorize/tags/aaa.md) [`403`](/categorize/tags/403.md) [`cors`](/categorize/tags/cors.md) [`ssl`](/categorize/tags/ssl.md) [`exploit`](/categorize/tags/exploit.md) [`oast`](/categorize/tags/oast.md) [`xxe`](/categorize/tags/xxe.md) [`lfi`](/categorize/tags/lfi.md) [`rop`](/categorize/tags/rop.md) [`cookie`](/categorize/tags/cookie.md) [`payload`](/categorize/tags/payload.md) [`notify`](/categorize/tags/notify.md) [`http`](/categorize/tags/http.md) [`wordlist`](/categorize/tags/wordlist.md) [`darkmode`](/categorize/tags/darkmode.md) [`report`](/categorize/tags/report.md) [`diff`](/categorize/tags/diff.md) |
|
||||
| Tags | [`pentest`](/categorize/tags/pentest.md) [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`infra`](/categorize/tags/infra.md) [`url`](/categorize/tags/url.md) [`param`](/categorize/tags/param.md) [`osint`](/categorize/tags/osint.md) [`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md) [`crawl`](/categorize/tags/crawl.md) [`dns`](/categorize/tags/dns.md) [`endpoint`](/categorize/tags/endpoint.md) [`port`](/categorize/tags/port.md) [`domain`](/categorize/tags/domain.md) [`graphql`](/categorize/tags/graphql.md) [`apk`](/categorize/tags/apk.md) [`online`](/categorize/tags/online.md) [`portscan`](/categorize/tags/portscan.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`ssrf`](/categorize/tags/ssrf.md) [`broken-link`](/categorize/tags/broken-link.md) [`xss`](/categorize/tags/xss.md) [`smuggle`](/categorize/tags/smuggle.md) [`sqli`](/categorize/tags/sqli.md) [`csp`](/categorize/tags/csp.md) [`s3`](/categorize/tags/s3.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`aaa`](/categorize/tags/aaa.md) [`403`](/categorize/tags/403.md) [`cors`](/categorize/tags/cors.md) [`ssl`](/categorize/tags/ssl.md) [`exploit`](/categorize/tags/exploit.md) [`oast`](/categorize/tags/oast.md) [`xxe`](/categorize/tags/xxe.md) [`lfi`](/categorize/tags/lfi.md) [`rop`](/categorize/tags/rop.md) [`cookie`](/categorize/tags/cookie.md) [`payload`](/categorize/tags/payload.md) [`notify`](/categorize/tags/notify.md) [`http`](/categorize/tags/http.md) [`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md) [`darkmode`](/categorize/tags/darkmode.md) [`report`](/categorize/tags/report.md) [`diff`](/categorize/tags/diff.md) |
|
||||
| Langs | [`Ruby`](/categorize/langs/Ruby.md) [`Java`](/categorize/langs/Java.md) [`Shell`](/categorize/langs/Shell.md) [`Go`](/categorize/langs/Go.md) [`Rust`](/categorize/langs/Rust.md) [`Python`](/categorize/langs/Python.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`C#`](/categorize/langs/C#.md) [`HTML`](/categorize/langs/HTML.md) [`PHP`](/categorize/langs/PHP.md) [`CSS`](/categorize/langs/CSS.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`C++`](/categorize/langs/C++.md) |
|
||||
|
||||
### Tools
|
||||
@ -100,12 +100,12 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. ||[`apk`](/categorize/tags/apk.md)|[](/categorize/langs/Python.md)|
|
||||
|Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md)||
|
||||
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)||
|
||||
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |||[](/categorize/langs/Ruby.md)|
|
||||
|Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |||[](/categorize/langs/Python.md)|
|
||||
|Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |||[](/categorize/langs/Go.md)|
|
||||
|Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md)||
|
||||
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)||
|
||||
|Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ||[`subdomains`](/categorize/tags/subdomains.md)||
|
||||
|Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|||[](/categorize/langs/Python.md)|
|
||||
|Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|||[](/categorize/langs/Python.md)|
|
||||
@ -258,11 +258,11 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |||[](/categorize/langs/Go.md)|
|
||||
|Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)||[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|
||||
|Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly||[`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Shell.md)|
|
||||
|Utils|[Phoenix](https://www.hahwul.com/p/phoenix.html)| hahwul's online tools||||
|
||||
|Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|
||||
|Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. ||[`xss`](/categorize/tags/xss.md)||
|
||||
|Utils|[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie||[`http`](/categorize/tags/http.md)|[](/categorize/langs/Python.md)|
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |||[](/categorize/langs/Java.md)|
|
||||
|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||||[](/categorize/langs/BlitzBasic.md)|
|
||||
|Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection ||[`http`](/categorize/tags/http.md)|[](/categorize/langs/Go.md)|
|
||||
@ -274,7 +274,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. ||[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|
||||
|Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|||[](/categorize/langs/Go.md)|
|
||||
|Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|||[](/categorize/langs/Go.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker||[`infra`](/categorize/tags/infra.md)|[](/categorize/langs/Python.md)|
|
||||
|Utils|[mubeng](https://github.com/kitabisa/mubeng)|An incredibly fast proxy checker & IP rotator with ease.|||[](/categorize/langs/Go.md)|
|
||||
|Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|||[](/categorize/langs/Python.md)|
|
||||
@ -285,7 +285,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |||[](/categorize/langs/Shell.md)|
|
||||
|Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph ||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Utils|[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep ||||
|
||||
|Utils|[SequenceDiagram](https://sequencediagram.org)| Online tool for creating UML sequence diagrams||||
|
||||
|Utils|[SequenceDiagram](https://sequencediagram.org)|Online tool for creating UML sequence diagrams||[`online`](/categorize/tags/online.md)||
|
||||
|Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|||[](/categorize/langs/Rust.md)|
|
||||
|Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|||[](/categorize/langs/Rust.md)|
|
||||
|Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) ||[`report`](/categorize/tags/report.md)|[](/categorize/langs/Shell.md)|
|
||||
@ -305,7 +305,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack||[`notify`](/categorize/tags/notify.md)|[](/categorize/langs/Shell.md)|
|
||||
|Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.||||
|
||||
|Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google||[`csp`](/categorize/tags/csp.md)||
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1||[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. ||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Go.md)|
|
||||
|Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|
@ -3,5 +3,5 @@
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
|
||||
|
||||
|
@ -19,6 +19,7 @@
|
||||
|Utils|[reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator)|Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)||[`payload`](/categorize/tags/payload.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|||[](/categorize/langs/JavaScript.md)|
|
||||
@ -26,7 +27,7 @@
|
||||
|Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies||[`cookie`](/categorize/tags/cookie.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|||[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1||[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|
||||
|
@ -4,5 +4,5 @@
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/PHP.md)|
|
||||
|
||||
|
@ -8,7 +8,7 @@
|
||||
|Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them ||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Python.md)|
|
||||
|Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. ||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Rust.md)|
|
||||
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md)||
|
||||
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)||
|
||||
|Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. ||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|
||||
|
9
categorize/tags/documents.md
Normal file
9
categorize/tags/documents.md
Normal file
@ -0,0 +1,9 @@
|
||||
|
||||
## Tools for documents
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1||[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|
10
categorize/tags/online.md
Normal file
10
categorize/tags/online.md
Normal file
@ -0,0 +1,10 @@
|
||||
|
||||
## Tools for online
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)||
|
||||
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)||
|
||||
|Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[SequenceDiagram](https://sequencediagram.org)|Online tool for creating UML sequence diagrams||[`online`](/categorize/tags/online.md)||
|
||||
|
@ -15,7 +15,7 @@
|
||||
|Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md)||
|
||||
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)||
|
||||
|Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|
||||
|Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ||[`subdomains`](/categorize/tags/subdomains.md)||
|
||||
|Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool||[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|[](/categorize/langs/Go.md)|
|
||||
|
@ -3,6 +3,6 @@
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md)|[](/categorize/langs/PHP.md)|
|
||||
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
|
||||
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/PHP.md)|
|
||||
|
||||
|
@ -18,6 +18,7 @@
|
||||
|Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)||[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|
||||
|Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. ||[`xss`](/categorize/tags/xss.md)||
|
||||
|Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1||[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|
||||
|
||||
|
@ -1 +1 @@
|
||||
Sun Oct 30 09:03:09 UTC 2022
|
||||
Mon Oct 31 13:53:27 UTC 2022
|
||||
|
Loading…
x
Reference in New Issue
Block a user