mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-01 11:31:22 -05:00
distribute readme
This commit is contained in:
parent
26d329949e
commit
189cdf110e
@ -111,6 +111,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool |  |  |
|
||||
| Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. |  |  |
|
||||
| Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go |  |  |
|
||||
| Discovery/URL | [cariddi](https://github.com/edoardottt/cariddi) | Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more... |  |  |
|
||||
| Discovery/URL | [urlhunter](https://github.com/utkusen/urlhunter) | a recon tool that allows searching on URLs that are exposed via shortener services |  |  |
|
||||
| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain |  |  |
|
||||
| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services |  |  |
|
||||
@ -197,6 +198,9 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C |  |  |
|
||||
| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker |  |  |
|
||||
| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) |  |  |
|
||||
| Utility/NOTIFY | [Emissary](https://github.com/BountyStrike/Emissary) | Send notifications on different channels such as Slack, Telegram, Discord etc. |  |  |
|
||||
| Utility/NOTIFY | [ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack) | Hacky Slack - a bash script that sends beautiful messages to Slack |  |  |
|
||||
| Utility/NOTIFY | [slackcat](https://github.com/bcicen/slackcat) | CLI utility to post files and command output to slack |  |  |
|
||||
| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r |  |  |
|
||||
| Utility/PAYLOAD | [Findsploit](https://github.com/1N3/Findsploit) | Find exploits in local and online databases instantly |  |  |
|
||||
| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
||||
|
52
data.json
52
data.json
@ -303,6 +303,22 @@
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"Emissary": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/NOTIFY | [Emissary](https://github.com/BountyStrike/Emissary) | Send notifications on different channels such as Slack, Telegram, Discord etc. |  |  |",
|
||||
"Method": "NOTIFY",
|
||||
"Description": "Send notifications on different channels such as Slack, Telegram, Discord etc.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"FavFreak": {
|
||||
"Data": "| Discovery/FAVICON | [FavFreak](https://github.com/devanshbatham/FavFreak) | Making Favicon.ico based Recon Great again ! |  |  |",
|
||||
"Description": "Making Favicon.ico based Recon Great again ! ",
|
||||
@ -1168,15 +1184,15 @@
|
||||
}
|
||||
},
|
||||
"cariddi": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/URL | [cariddi](https://github.com/edoardottt/cariddi) | Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more... |  |  |",
|
||||
"Method": "URL",
|
||||
"Description": "Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "URL",
|
||||
"Type": "Discovery",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
@ -2383,6 +2399,22 @@
|
||||
"Windows": "go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei"
|
||||
}
|
||||
},
|
||||
"ob_hacky_slack": {
|
||||
"Data": "| Utility/NOTIFY | [ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack) | Hacky Slack - a bash script that sends beautiful messages to Slack |  |  |",
|
||||
"Description": "Hacky Slack - a bash script that sends beautiful messages to Slack",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "NOTIFY",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"oxml_xxe": {
|
||||
"Data": "| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |",
|
||||
"Description": "A tool for embedding XXE/XML exploits into different filetypes ",
|
||||
@ -2623,6 +2655,22 @@
|
||||
"Windows": "go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns"
|
||||
}
|
||||
},
|
||||
"slackcat": {
|
||||
"Data": "| Utility/NOTIFY | [slackcat](https://github.com/bcicen/slackcat) | CLI utility to post files and command output to slack |  |  |",
|
||||
"Description": "CLI utility to post files and command output to slack",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "NOTIFY",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"smuggler": {
|
||||
"Data": "| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |  |  |",
|
||||
"Description": "Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 ",
|
||||
|
Loading…
x
Reference in New Issue
Block a user