distribute readme

This commit is contained in:
hahwul 2022-03-12 00:23:50 +09:00
parent 9137852588
commit 611240a6c5
2 changed files with 53 additions and 2 deletions

View File

@ -82,6 +82,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
| Discovery/FAVICON | [FavFreak](https://github.com/devanshbatham/FavFreak) | Making Favicon.ico based Recon Great again ! | ![](https://img.shields.io/github/stars/devanshbatham/FavFreak) | ![](https://img.shields.io/github/languages/top/devanshbatham/FavFreak) |
| Discovery/FUZZ | [DirDar](https://github.com/M4DM0e/DirDar) | DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it | ![](https://img.shields.io/github/stars/M4DM0e/DirDar) | ![](https://img.shields.io/github/languages/top/M4DM0e/DirDar) |
| Discovery/FUZZ | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner | ![](https://img.shields.io/github/stars/maurosoria/dirsearch) | ![](https://img.shields.io/github/languages/top/maurosoria/dirsearch) |
| Discovery/FUZZ | [dontgo403](https://github.com/devploit/dontgo403) | Tool to bypass 40X response codes. | ![](https://img.shields.io/github/stars/devploit/dontgo403) | ![](https://img.shields.io/github/languages/top/devploit/dontgo403) |
| Discovery/FUZZ | [feroxbuster](https://github.com/epi052/feroxbuster) | A fast, simple, recursive content discovery tool written in Rust. | ![](https://img.shields.io/github/stars/epi052/feroxbuster) | ![](https://img.shields.io/github/languages/top/epi052/feroxbuster) |
| Discovery/FUZZ | [gobuster](https://github.com/OJ/gobuster) | Directory/File, DNS and VHost busting tool written in Go | ![](https://img.shields.io/github/stars/OJ/gobuster) | ![](https://img.shields.io/github/languages/top/OJ/gobuster) |
| Discovery/FUZZ | [medusa](https://github.com/riza/medusa) | Fastest recursive HTTP fuzzer, like a Ferrari. | ![](https://img.shields.io/github/stars/riza/medusa) | ![](https://img.shields.io/github/languages/top/riza/medusa) |
@ -107,6 +108,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
| Discovery/PARAM | [ParamSpider](https://github.com/devanshbatham/ParamSpider) | Mining parameters from dark corners of Web Archives | ![](https://img.shields.io/github/stars/devanshbatham/ParamSpider) | ![](https://img.shields.io/github/languages/top/devanshbatham/ParamSpider) |
| Discovery/PARAM | [Parth](https://github.com/s0md3v/Parth) | Heuristic Vulnerable Parameter Scanner | ![](https://img.shields.io/github/stars/s0md3v/Parth) | ![](https://img.shields.io/github/languages/top/s0md3v/Parth) |
| Discovery/PARAM | [fuzzparam](https://github.com/0xsapra/fuzzparam) | A fast go based param miner to fuzz possible parameters a URL can have. | ![](https://img.shields.io/github/stars/0xsapra/fuzzparam) | ![](https://img.shields.io/github/languages/top/0xsapra/fuzzparam) |
| Discovery/PARAM | [parameth](https://github.com/maK-/parameth) | This tool can be used to brute discover GET and POST parameters | ![](https://img.shields.io/github/stars/maK-/parameth) | ![](https://img.shields.io/github/languages/top/maK-/parameth) |
| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust | ![](https://img.shields.io/github/stars/brandonskerritt/RustScan) | ![](https://img.shields.io/github/languages/top/brandonskerritt/RustScan) |
| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)|
| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ![](https://img.shields.io/github/stars/robertdavidgraham/masscan) | ![](https://img.shields.io/github/languages/top/robertdavidgraham/masscan) |
@ -120,6 +122,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
| Discovery/URL | [crawlergo](https://github.com/Qianlitp/crawlergo) | A powerful browser crawler for web vulnerability scanners | ![](https://img.shields.io/github/stars/Qianlitp/crawlergo) | ![](https://img.shields.io/github/languages/top/Qianlitp/crawlergo) |
| Discovery/URL | [gau](https://github.com/lc/gau) | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | ![](https://img.shields.io/github/stars/lc/gau) | ![](https://img.shields.io/github/languages/top/lc/gau) |
| Discovery/URL | [gauplus](https://github.com/bp0lr/gauplus) | A modified version of gau for personal usage. Support workers, proxies and some extra things. | ![](https://img.shields.io/github/stars/bp0lr/gauplus) | ![](https://img.shields.io/github/languages/top/bp0lr/gauplus) |
| Discovery/URL | [security-crawl-maze](https://github.com/google/security-crawl-maze) | Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document. | ![](https://img.shields.io/github/stars/google/security-crawl-maze) | ![](https://img.shields.io/github/languages/top/google/security-crawl-maze) |
| Discovery/URL | [urlhunter](https://github.com/utkusen/urlhunter) | a recon tool that allows searching on URLs that are exposed via shortener services | ![](https://img.shields.io/github/stars/utkusen/urlhunter) | ![](https://img.shields.io/github/languages/top/utkusen/urlhunter) |
| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain | ![](https://img.shields.io/github/stars/tomnomnom/waybackurls) | ![](https://img.shields.io/github/languages/top/tomnomnom/waybackurls) |
| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services | ![](https://img.shields.io/github/stars/s0md3v/Silver) | ![](https://img.shields.io/github/languages/top/s0md3v/Silver) |

View File

@ -1663,6 +1663,22 @@
"Windows": "cd domdig ; npm i"
}
},
"dontgo403": {
"Type": "Discovery",
"Data": "| Discovery/FUZZ | [dontgo403](https://github.com/devploit/dontgo403) | Tool to bypass 40X response codes. | ![](https://img.shields.io/github/stars/devploit/dontgo403) | ![](https://img.shields.io/github/languages/top/devploit/dontgo403) |",
"Method": "FUZZ",
"Description": "Tool to bypass 40X response codes.",
"Install": {
"Linux": "",
"MacOS": "",
"Windows": ""
},
"Update": {
"Linux": "",
"MacOS": "",
"Windows": ""
}
},
"dotdotpwn": {
"Data": "| Scanner/LFI | [dotdotpwn](https://github.com/wireghoul/dotdotpwn) | DotDotPwn - The Directory Traversal Fuzzer | ![](https://img.shields.io/github/stars/wireghoul/dotdotpwn) | ![](https://img.shields.io/github/languages/top/wireghoul/dotdotpwn) |",
"Description": "DotDotPwn - The Directory Traversal Fuzzer ",
@ -2879,6 +2895,22 @@
"Windows": ""
}
},
"parameth": {
"Data": "| Discovery/PARAM | [parameth](https://github.com/maK-/parameth) | This tool can be used to brute discover GET and POST parameters | ![](https://img.shields.io/github/stars/maK-/parameth) | ![](https://img.shields.io/github/languages/top/maK-/parameth) |",
"Description": "This tool can be used to brute discover GET and POST parameters",
"Install": {
"Linux": "",
"MacOS": "",
"Windows": ""
},
"Method": "PARAM",
"Type": "Discovery",
"Update": {
"Linux": "",
"MacOS": "",
"Windows": ""
}
},
"pentest-tools": {
"Data": "| ToolBox/ALL | [pentest-tools](https://github.com/gwen001/pentest-tools) | Custom pentesting tools | ![](https://img.shields.io/github/stars/gwen001/pentest-tools) | ![](https://img.shields.io/github/languages/top/gwen001/pentest-tools) |",
"Description": "Custom pentesting tools ",
@ -3151,6 +3183,22 @@
"Windows": "go get-u github.com/edoardottt/scilla"
}
},
"security-crawl-maze": {
"Data": "| Discovery/URL | [security-crawl-maze](https://github.com/google/security-crawl-maze) | Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document. | ![](https://img.shields.io/github/stars/google/security-crawl-maze) | ![](https://img.shields.io/github/languages/top/google/security-crawl-maze) |",
"Description": "Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.",
"Install": {
"Linux": "",
"MacOS": "",
"Windows": ""
},
"Method": "URL",
"Type": "Discovery",
"Update": {
"Linux": "",
"MacOS": "",
"Windows": ""
}
},
"security-research-pocs": {
"Data": "| Utility/PAYLOAD | [security-research-pocs](https://github.com/google/security-research-pocs) | Proof-of-concept codes created as part of security research done by Google Security Team. | ![](https://img.shields.io/github/stars/google/security-research-pocs) | ![](https://img.shields.io/github/languages/top/google/security-research-pocs) |",
"Description": "Proof-of-concept codes created as part of security research done by Google Security Team.",
@ -3488,15 +3536,15 @@
}
},
"uncover": {
"Type": "Discovery",
"Data": "| Discovery/HOST | [uncover](https://github.com/projectdiscovery/uncover) | Quickly discover exposed hosts on the internet using multiple search engine. | ![](https://img.shields.io/github/stars/projectdiscovery/uncover) | ![](https://img.shields.io/github/languages/top/projectdiscovery/uncover) |",
"Method": "HOST",
"Description": "Quickly discover exposed hosts on the internet using multiple search engine.",
"Install": {
"Linux": "",
"MacOS": "",
"Windows": ""
},
"Method": "HOST",
"Type": "Discovery",
"Update": {
"Linux": "",
"MacOS": "",