mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-22 14:56:33 -04:00
Deploy README.md and Categorize Docs
This commit is contained in:
parent
f1394d039d
commit
2e207ae36e
@ -28,7 +28,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
| | Attributes |
|
||||
|-------|---------------------------------------------------|
|
||||
| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`|
|
||||
| Tags | [`pentest`](/categorize/tags/pentest.md) [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md) [`infra`](/categorize/tags/infra.md) [`url`](/categorize/tags/url.md) [`param`](/categorize/tags/param.md) [`osint`](/categorize/tags/osint.md) [`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md) [`dns`](/categorize/tags/dns.md) [`endpoint`](/categorize/tags/endpoint.md) [`port`](/categorize/tags/port.md) [`domain`](/categorize/tags/domain.md) [`graphql`](/categorize/tags/graphql.md) [`apk`](/categorize/tags/apk.md) [`online`](/categorize/tags/online.md) [`portscan`](/categorize/tags/portscan.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`ssrf`](/categorize/tags/ssrf.md) [`broken-link`](/categorize/tags/broken-link.md) [`xss`](/categorize/tags/xss.md) [`smuggle`](/categorize/tags/smuggle.md) [`sqli`](/categorize/tags/sqli.md) [`csp`](/categorize/tags/csp.md) [`s3`](/categorize/tags/s3.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`aaa`](/categorize/tags/aaa.md) [`403`](/categorize/tags/403.md) [`cors`](/categorize/tags/cors.md) [`ssl`](/categorize/tags/ssl.md) [`exploit`](/categorize/tags/exploit.md) [`oast`](/categorize/tags/oast.md) [`xxe`](/categorize/tags/xxe.md) [`lfi`](/categorize/tags/lfi.md) [`rop`](/categorize/tags/rop.md) [`blind-xss`](/categorize/tags/blind-xss.md) [`cookie`](/categorize/tags/cookie.md) [`payload`](/categorize/tags/payload.md) [`notify`](/categorize/tags/notify.md) [`http`](/categorize/tags/http.md) [`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md) [`darkmode`](/categorize/tags/darkmode.md) [`report`](/categorize/tags/report.md) [`diff`](/categorize/tags/diff.md) |
|
||||
| Tags | [`pentest`](/categorize/tags/pentest.md) [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md) [`infra`](/categorize/tags/infra.md) [`url`](/categorize/tags/url.md) [`param`](/categorize/tags/param.md) [`osint`](/categorize/tags/osint.md) [`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md) [`dns`](/categorize/tags/dns.md) [`endpoint`](/categorize/tags/endpoint.md) [`port`](/categorize/tags/port.md) [`domain`](/categorize/tags/domain.md) [`graphql`](/categorize/tags/graphql.md) [`apk`](/categorize/tags/apk.md) [`online`](/categorize/tags/online.md) [`portscan`](/categorize/tags/portscan.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`cache-vuln`](/categorize/tags/cache-vuln.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`ssrf`](/categorize/tags/ssrf.md) [`broken-link`](/categorize/tags/broken-link.md) [`xss`](/categorize/tags/xss.md) [`smuggle`](/categorize/tags/smuggle.md) [`sqli`](/categorize/tags/sqli.md) [`csp`](/categorize/tags/csp.md) [`s3`](/categorize/tags/s3.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`aaa`](/categorize/tags/aaa.md) [`403`](/categorize/tags/403.md) [`cors`](/categorize/tags/cors.md) [`ssl`](/categorize/tags/ssl.md) [`exploit`](/categorize/tags/exploit.md) [`oast`](/categorize/tags/oast.md) [`xxe`](/categorize/tags/xxe.md) [`lfi`](/categorize/tags/lfi.md) [`rop`](/categorize/tags/rop.md) [`blind-xss`](/categorize/tags/blind-xss.md) [`cookie`](/categorize/tags/cookie.md) [`payload`](/categorize/tags/payload.md) [`notify`](/categorize/tags/notify.md) [`http`](/categorize/tags/http.md) [`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md) [`darkmode`](/categorize/tags/darkmode.md) [`report`](/categorize/tags/report.md) [`diff`](/categorize/tags/diff.md) |
|
||||
| Langs | [`Ruby`](/categorize/langs/Ruby.md) [`Java`](/categorize/langs/Java.md) [`Shell`](/categorize/langs/Shell.md) [`Go`](/categorize/langs/Go.md) [`Rust`](/categorize/langs/Rust.md) [`Python`](/categorize/langs/Python.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`C#`](/categorize/langs/C#.md) [`HTML`](/categorize/langs/HTML.md) [`PHP`](/categorize/langs/PHP.md) [`CSS`](/categorize/langs/CSS.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`C++`](/categorize/langs/C++.md) |
|
||||
|
||||
### Tools
|
||||
@ -182,7 +182,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |||[](/categorize/langs/Python.md)|
|
||||
|Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |||[](/categorize/langs/Perl.md)|
|
||||
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|||[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |||[](/categorize/langs/Python.md)|
|
||||
|Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.||[`403`](/categorize/tags/403.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|||[](/categorize/langs/Go.md)|
|
||||
@ -192,6 +192,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |||[](/categorize/langs/Python.md)|
|
||||
|Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner ||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|||[](/categorize/langs/Perl.md)|
|
||||
|Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |||[](/categorize/langs/JavaScript.md)|
|
||||
|Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |||[](/categorize/langs/Python.md)|
|
||||
@ -205,7 +206,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|||[](/categorize/langs/JavaScript.md)|
|
||||
|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |||[](/categorize/langs/Ruby.md)|
|
||||
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|||[](/categorize/langs/JavaScript.md)|
|
||||
|Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner||||
|
||||
@ -352,7 +353,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||||[](/categorize/langs/JavaScript.md)|
|
||||
|Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters||[`endpoint`](/categorize/tags/endpoint.md)|[](/categorize/langs/Java.md)|
|
||||
|Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)|||||
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)|||[`csp`](/categorize/tags/csp.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)|||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[Autorize](https://github.com/Quitten/Autorize)|||[`aaa`](/categorize/tags/aaa.md)|[](/categorize/langs/Python.md)|
|
||||
|
@ -72,7 +72,7 @@
|
||||
|Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go ||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Go.md)|
|
||||
|Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |||[](/categorize/langs/Go.md)|
|
||||
|Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Go.md)|
|
||||
|
@ -8,7 +8,7 @@
|
||||
|Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters||[`endpoint`](/categorize/tags/endpoint.md)|[](/categorize/langs/Java.md)|
|
||||
|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|
||||
|Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters||[`endpoint`](/categorize/tags/endpoint.md)|[](/categorize/langs/Java.md)|
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)|||[`csp`](/categorize/tags/csp.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)|||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)|||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Java.md)|
|
||||
|
@ -52,6 +52,7 @@
|
||||
|Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents ||[`s3`](/categorize/tags/s3.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner ||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |||[](/categorize/langs/Python.md)|
|
||||
|Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |||[](/categorize/langs/Python.md)|
|
||||
|Scanner|[deadlinks](https://github.com/butuzov/deadlinks)|Health checks for your documentation links.||[`broken-link`](/categorize/tags/broken-link.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|||[](/categorize/langs/Python.md)|
|
||||
|
@ -12,7 +12,7 @@
|
||||
|Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|||[](/categorize/langs/Shell.md)|
|
||||
|Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go ||[`crlf`](/categorize/tags/crlf.md)|[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|||[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port ||[`ssl`](/categorize/tags/ssl.md)|[](/categorize/langs/Shell.md)|
|
||||
|Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |||[](/categorize/langs/Shell.md)|
|
||||
|Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly||[`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Shell.md)|
|
||||
|
10
categorize/tags/cache-vuln.md
Normal file
10
categorize/tags/cache-vuln.md
Normal file
@ -0,0 +1,10 @@
|
||||
|
||||
## Tools for cache-vuln
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Java.md)|
|
||||
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Shell.md)|
|
||||
|Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Python.md)|
|
||||
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Go.md)|
|
||||
|
@ -8,6 +8,6 @@
|
||||
|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|
||||
|Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives ||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|
||||
|Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. ||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|
||||
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Java.md)|
|
||||
|Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Go.md)|
|
||||
|
||||
|
@ -1 +1 @@
|
||||
Tue Nov 8 12:58:34 UTC 2022
|
||||
Mon Nov 14 12:01:20 UTC 2022
|
||||
|
Loading…
x
Reference in New Issue
Block a user