mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-04-11 18:29:14 -04:00
distribute readme
This commit is contained in:
parent
15dfd8564a
commit
47dc02b37d
@ -63,6 +63,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. |  |  |
|
||||
| Discovery/DNS | [hakrevdns](https://github.com/hakluke/hakrevdns) | Small, fast tool for performing reverse DNS lookups en masse. |  |  |
|
||||
| Discovery/DNS | [haktrails](https://github.com/hakluke/haktrails) | Golang client for querying SecurityTrails API data |  |  |
|
||||
| Discovery/DNS | [puredns](https://github.com/d3mondev/puredns) | Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. |  |  |
|
||||
| Discovery/DNS | [rusolver](https://github.com/Edu4rdSHL/rusolver) | Fast and accurate DNS resolver. |  |  |
|
||||
| Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |  |  |
|
||||
| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! |  |  |
|
||||
@ -130,6 +131,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra |  |  |
|
||||
| Scanner/FUZZ | [wfuzz](https://github.com/xmendez/wfuzz) | Web application fuzzer |  |  |
|
||||
| Scanner/GQL | [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) | GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. |  |  |
|
||||
| Scanner/JS | [jsprime](https://github.com/dpnishant/jsprime) | a javascript static security analysis tool |  |  |
|
||||
| Scanner/LFI | [LFISuite](https://github.com/D35m0nd142/LFISuite) | Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |  |  |
|
||||
| Scanner/LFI | [dotdotpwn](https://github.com/wireghoul/dotdotpwn) | DotDotPwn - The Directory Traversal Fuzzer |  |  |
|
||||
| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  |
|
||||
@ -218,6 +220,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/URL | [burl](https://github.com/tomnomnom/burl) | A Broken-URL Checker |  |  |
|
||||
| Utility/URL | [cf-check](https://github.com/dwisiswant0/cf-check) | Cloudflare Checker written in Go |  |  |
|
||||
| Utility/URL | [gau](https://github.com/lc/gau) | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. |  |  |
|
||||
| Utility/URL | [hakcheckurl](https://github.com/hakluke/hakcheckurl) | Takes a list of URLs and returns their HTTP response codes |  |  |
|
||||
| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |
|
||||
| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin |  |  |
|
||||
| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code & content length checker |  |  |
|
||||
|
52
data.json
52
data.json
@ -1855,6 +1855,22 @@
|
||||
"Windows": "cd hacks ; git pull -v"
|
||||
}
|
||||
},
|
||||
"hakcheckurl": {
|
||||
"Data": "| Utility/URL | [hakcheckurl](https://github.com/hakluke/hakcheckurl) | Takes a list of URLs and returns their HTTP response codes |  |  |",
|
||||
"Description": "Takes a list of URLs and returns their HTTP response codes",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "URL",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"hakrawler": {
|
||||
"Data": "| Discovery/URL | [hakrawler](https://github.com/hakluke/hakrawler) | Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |  |  |",
|
||||
"Description": "Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application ",
|
||||
@ -2111,6 +2127,22 @@
|
||||
"Windows": "go get github.com/jaeles-project/jaeles"
|
||||
}
|
||||
},
|
||||
"jsprime": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/JS | [jsprime](https://github.com/dpnishant/jsprime) | a javascript static security analysis tool |  |  |",
|
||||
"Method": "JS",
|
||||
"Description": "a javascript static security analysis tool",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"jwt-cracker": {
|
||||
"Data": "| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker |  |  |",
|
||||
"Description": "Simple HS256 JWT token brute force cracker ",
|
||||
@ -2415,6 +2447,22 @@
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"puredns": {
|
||||
"Data": "| Discovery/DNS | [puredns](https://github.com/d3mondev/puredns) | Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. |  |  |",
|
||||
"Description": "Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "DNS",
|
||||
"Type": "Discovery",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"pwncat": {
|
||||
"Data": "| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |  |  |",
|
||||
"Description": "pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) ",
|
||||
@ -2496,15 +2544,15 @@
|
||||
}
|
||||
},
|
||||
"rusolver": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/DNS | [rusolver](https://github.com/Edu4rdSHL/rusolver) | Fast and accurate DNS resolver. |  |  |",
|
||||
"Method": "DNS",
|
||||
"Description": "Fast and accurate DNS resolver.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "DNS",
|
||||
"Type": "Discovery",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
|
Loading…
x
Reference in New Issue
Block a user