mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-23 00:19:50 -05:00
distribute readme
This commit is contained in:
parent
7da26ecd0d
commit
49f54d96a8
@ -155,6 +155,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/SSL | [testssl.sh](https://github.com/drwetter/testssl.sh) | Testing TLS/SSL encryption anywhere on any port |  |  |
|
||||
| Scanner/SSRF | [SSRFmap](https://github.com/swisskyrepo/SSRFmap) | Automatic SSRF fuzzer and exploitation tool |  |  |
|
||||
| Scanner/SSRF | [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) | A simple SSRF-testing sheriff written in Go |  |  |
|
||||
| Scanner/SSTI | [tplmap](https://github.com/epinna/tplmap) | Server-Side Template Injection and Code Injection Detection and Exploitation Tool |  |  |
|
||||
| Scanner/WP | [wprecon](https://github.com/blackcrw/wprecon) | Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go. |  |  |
|
||||
| Scanner/WP | [wpscan](https://github.com/wpscanteam/wpscan) | WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |  |  |
|
||||
| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. |  |  |
|
||||
|
20
data.json
20
data.json
@ -2192,15 +2192,15 @@
|
||||
}
|
||||
},
|
||||
"jsfuck": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/PAYLOAD | [jsfuck](https://github.com/aemkei/jsfuck) | Write any JavaScript with 6 Characters |  |  |",
|
||||
"Method": "PAYLOAD",
|
||||
"Description": "Write any JavaScript with 6 Characters",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "PAYLOAD",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
@ -2959,6 +2959,22 @@
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"tplmap": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/SSTI | [tplmap](https://github.com/epinna/tplmap) | Server-Side Template Injection and Code Injection Detection and Exploitation Tool |  |  |",
|
||||
"Method": "SSTI",
|
||||
"Description": "Server-Side Template Injection and Code Injection Detection and Exploitation Tool",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"unfurl": {
|
||||
"Data": "| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin |  |  |",
|
||||
"Description": "Pull out bits of URLs provided on stdin ",
|
||||
|
Loading…
x
Reference in New Issue
Block a user