mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-08 06:56:06 -05:00
distribute readme
This commit is contained in:
parent
5a85e2c5f7
commit
2f6434dadb
@ -58,6 +58,8 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
|||||||
| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing |  |  |
|
| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing |  |  |
|
||||||
| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. |  |  |
|
| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. |  |  |
|
||||||
| Discovery/HTTP | [Aron](https://github.com/m4ll0k/Aron) | Aron is a GO script for finding hidden GET & POST parameters |  |  |
|
| Discovery/HTTP | [Aron](https://github.com/m4ll0k/Aron) | Aron is a GO script for finding hidden GET & POST parameters |  |  |
|
||||||
|
| Discovery/JS | [LinkFinder](https://github.com/GerbenJavado/LinkFinder) | A python script that finds endpoints in JavaScript files |  |  |
|
||||||
|
| Discovery/JS | [SecretFinder](https://github.com/m4ll0k/SecretFinder) | SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |  |  |
|
||||||
| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust |  |  |
|
| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust |  |  |
|
||||||
| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices| | |
|
| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices| | |
|
||||||
| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |  |  |
|
| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |  |  |
|
||||||
@ -133,6 +135,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
|||||||
| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |
|
| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |
|
||||||
| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin |  |  |
|
| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin |  |  |
|
||||||
| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code & content length checker |  |  |
|
| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code & content length checker |  |  |
|
||||||
|
| Utility/VULN | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools |  |  |
|
||||||
| Utility/VULN | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
| Utility/VULN | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
||||||
| Utility/VULN | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker |  |  |
|
| Utility/VULN | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker |  |  |
|
||||||
| Utility/VULN | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |
|
| Utility/VULN | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |
|
||||||
|
19
data.json
19
data.json
@ -19,6 +19,11 @@
|
|||||||
"Method": "BRIDGE",
|
"Method": "BRIDGE",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
|
"Bug-Bounty-Toolz": {
|
||||||
|
"Type": "Utility",
|
||||||
|
"Data": "| Utility/VULN | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools |  |  |",
|
||||||
|
"Method": "VULN"
|
||||||
|
},
|
||||||
"BurpSuite": {
|
"BurpSuite": {
|
||||||
"Data": "| Army-Knife/ALL | [BurpSuite](https://portswigger.net/burp) | the BurpSuite project | | |",
|
"Data": "| Army-Knife/ALL | [BurpSuite](https://portswigger.net/burp) | the BurpSuite project | | |",
|
||||||
"Method": "BURP",
|
"Method": "BURP",
|
||||||
@ -79,6 +84,11 @@
|
|||||||
"Method": "LFI",
|
"Method": "LFI",
|
||||||
"Type": "Scanner"
|
"Type": "Scanner"
|
||||||
},
|
},
|
||||||
|
"LinkFinder": {
|
||||||
|
"Data": "| Discovery/JS | [LinkFinder](https://github.com/GerbenJavado/LinkFinder) | A python script that finds endpoints in JavaScript files |  |  |",
|
||||||
|
"Method": "JS",
|
||||||
|
"Type": "Discovery"
|
||||||
|
},
|
||||||
"NoSQLMap": {
|
"NoSQLMap": {
|
||||||
"Data": "| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  |",
|
"Data": "| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  |",
|
||||||
"Method": "NOSQL",
|
"Method": "NOSQL",
|
||||||
@ -139,6 +149,11 @@
|
|||||||
"Method": "WORD",
|
"Method": "WORD",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
|
"SecretFinder": {
|
||||||
|
"Data": "| Discovery/JS | [SecretFinder](https://github.com/m4ll0k/SecretFinder) | SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |  |  |",
|
||||||
|
"Method": "JS",
|
||||||
|
"Type": "Discovery"
|
||||||
|
},
|
||||||
"SecurityTrails": {
|
"SecurityTrails": {
|
||||||
"Data": "| Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool| | |",
|
"Data": "| Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool| | |",
|
||||||
"Method": "DNS",
|
"Method": "DNS",
|
||||||
@ -410,9 +425,9 @@
|
|||||||
"Type": "Discovery"
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
"intrigue-core": {
|
"intrigue-core": {
|
||||||
"Type": "Discovery",
|
|
||||||
"Data": "| Discovery/ALL | [intrigue-core](https://github.com/intrigueio/intrigue-core) | Discover Your Attack Surface |  |  |",
|
"Data": "| Discovery/ALL | [intrigue-core](https://github.com/intrigueio/intrigue-core) | Discover Your Attack Surface |  |  |",
|
||||||
"Method": "ALL"
|
"Method": "ALL",
|
||||||
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
"jaeles": {
|
"jaeles": {
|
||||||
"Data": "| Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing |  |  |",
|
"Data": "| Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing |  |  |",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user