mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-23 00:19:50 -05:00
distribute readme
This commit is contained in:
parent
590dc30af9
commit
5461ca368a
@ -80,6 +80,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |  |  |
|
||||
| Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |  |  |
|
||||
| Discovery/PORT | [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. |  |  |
|
||||
| Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. |  |  |
|
||||
| Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go |  |  |
|
||||
| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain |  |  |
|
||||
| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services |  |  |
|
||||
@ -92,6 +93,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/CORS | [CorsMe](https://github.com/Shivangx01b/CorsMe) | Cross Origin Resource Sharing MisConfiguration Scanner |  |  |
|
||||
| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner |  |  |
|
||||
| Scanner/CRLF | [crlfuzz](https://github.com/dwisiswant0/crlfuzz) | A fast tool to scan CRLF vulnerability written in Go |  |  |
|
||||
| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. |  |  |
|
||||
| Scanner/FUZZ | [VHostScan](https://github.com/codingo/VHostScan) | A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |  |  |
|
||||
| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go |  |  |
|
||||
| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra |  |  |
|
||||
@ -104,6 +106,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/RECON | [Osmedeus](https://github.com/j3ssie/Osmedeus) | Fully automated offensive security framework for reconnaissance and vulnerability scanning |  |  |
|
||||
| Scanner/RECON | [Sn1per](https://github.com/1N3/Sn1per) | Automated pentest framework for offensive security experts |  |  |
|
||||
| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |  |  |
|
||||
| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets |  |  |
|
||||
| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents |  |  |
|
||||
| Scanner/SMUGGLE | [h2csmuggler](https://github.com/BishopFox/h2csmuggler) | HTTP Request Smuggling over HTTP/2 Cleartext (h2c) |  |  |
|
||||
| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |  |  |
|
||||
@ -147,7 +150,9 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker |  |  |
|
||||
| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) |  |  |
|
||||
| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r |  |  |
|
||||
| Utility/PAYLOAD | [Findsploit](https://github.com/1N3/Findsploit) | Find exploits in local and online databases instantly |  |  |
|
||||
| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
||||
| Utility/PAYLOAD | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |
|
||||
| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF |  |  |
|
||||
| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker |  |  |
|
||||
| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |
|
||||
|
92
data.json
92
data.json
@ -1,4 +1,20 @@
|
||||
{
|
||||
"AWSBucketDump": {
|
||||
"Data": "| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets |  |  |",
|
||||
"Description": "Security Tool to Look For Interesting Files in S3 Buckets",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "S3",
|
||||
"Type": "Scanner",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"Amass": {
|
||||
"Data": "| Discovery/DOMAIN | [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery |  |  |",
|
||||
"Description": "In-depth Attack Surface Mapping and Asset Discovery ",
|
||||
@ -79,6 +95,22 @@
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"BruteX": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. |  |  |",
|
||||
"Method": "FUZZ",
|
||||
"Description": "Automatically brute force all services running on a target.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"Bug-Bounty-Toolz": {
|
||||
"Data": "| ToolBox/ALL | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools |  |  |",
|
||||
"Description": "BBT - Bug Bounty Tools ",
|
||||
@ -239,6 +271,22 @@
|
||||
"Windows": "cd FavFreak; git pull -v ; pip install -r requirements.txt"
|
||||
}
|
||||
},
|
||||
"Findsploit": {
|
||||
"Data": "| Utility/PAYLOAD | [Findsploit](https://github.com/1N3/Findsploit) | Find exploits in local and online databases instantly |  |  |",
|
||||
"Description": "Find exploits in local and online databases instantly",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "PAYLOAD",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"Gf-Patterns": {
|
||||
"Data": "| Utility/ENV | [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) | GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |  |  |",
|
||||
"Description": "GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep ",
|
||||
@ -303,6 +351,22 @@
|
||||
"Windows": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt"
|
||||
}
|
||||
},
|
||||
"IntruderPayloads": {
|
||||
"Data": "| Utility/PAYLOAD | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |",
|
||||
"Description": "A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "PAYLOAD",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"JSFScan.sh": {
|
||||
"Data": "| Discovery/JS | [JSFScan.sh](https://github.com/KathanP19/JSFScan.sh) | Automation for javascript recon in bug bounty. |  |  |",
|
||||
"Description": "Automation for javascript recon in bug bounty. ",
|
||||
@ -867,8 +931,8 @@
|
||||
"Data": "| Utility/PENTEST | [axiom](https://github.com/pry0cc/axiom) | A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |  |  |",
|
||||
"Description": "A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ",
|
||||
"Install": {
|
||||
"Linux": "bash <(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)",
|
||||
"MacOS": "bash <(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)",
|
||||
"Linux": "bash \u003c(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)",
|
||||
"MacOS": "bash \u003c(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "PENTEST",
|
||||
@ -927,6 +991,22 @@
|
||||
"Windows": "cd c-jwt-cracker ; git pull -v ; make"
|
||||
}
|
||||
},
|
||||
"can-i-take-over-xyz": {
|
||||
"Data": "| Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | \"Can I take over XYZ?\" — a list of services and how to claim (sub)domains with dangling DNS records. |  |  |",
|
||||
"Description": "\"Can I take over XYZ?\" — a list of services and how to claim (sub)domains with dangling DNS records.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "TKOV",
|
||||
"Type": "Discovery",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"cc.py": {
|
||||
"Data": "| Discovery/CRAWL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of \"commoncrawl.org\" |  |  |",
|
||||
"Description": "Extracting URLs of a specific target based on the results of \"commoncrawl.org\" ",
|
||||
@ -1109,7 +1189,7 @@
|
||||
"Install": {
|
||||
"Linux": "curl -sL https://raw.githubusercontent.com/epi052/feroxbuster/master/install-nix.sh | bash",
|
||||
"MacOS": "brew tap tgotwig/feroxbuster ; brew install feroxbuster",
|
||||
"Windows": "Invoke-WebRequest https://github.com/epi052/feroxbuster/releases/latest/download/x86_64-windows-feroxbuster.exe.zip -OutFile feroxbuster.zip; Expand-Archive .\feroxbuster.zip; .\feroxbuster\feroxbuster.exe -V"
|
||||
"Windows": "Invoke-WebRequest https://github.com/epi052/feroxbuster/releases/latest/download/x86_64-windows-feroxbuster.exe.zip -OutFile feroxbuster.zip; Expand-Archive .\u000ceroxbuster.zip; .\u000ceroxbuster\u000ceroxbuster.exe -V"
|
||||
},
|
||||
"Method": "FUZZ",
|
||||
"Type": "Discovery",
|
||||
@ -1600,15 +1680,15 @@
|
||||
}
|
||||
},
|
||||
"jwt-hack": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) |  |  |",
|
||||
"Method": "JWT",
|
||||
"Description": "🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)",
|
||||
"Install": {
|
||||
"Linux": "go get -u github.com/hahwul/jwt-hack",
|
||||
"MacOS": "go get -u github.com/hahwul/jwt-hack",
|
||||
"Windows": "go get -u github.com/hahwul/jwt-hack"
|
||||
},
|
||||
"Method": "JWT",
|
||||
"Type": "Utility",
|
||||
"Update": {
|
||||
"Linux": "go get -u github.com/hahwul/jwt-hack",
|
||||
"MacOS": "go get -u github.com/hahwul/jwt-hack",
|
||||
@ -2335,4 +2415,4 @@
|
||||
"Windows": ""
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user