mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-22 16:09:54 -05:00
distribute readme
This commit is contained in:
parent
d797d7bf86
commit
62e9306440
@ -106,6 +106,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! |  |  |
|
||||
| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF |  |  |
|
||||
| Utility/PENTEST | [axiom](https://github.com/pry0cc/axiom) | A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |  |  |
|
||||
| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |  |  |
|
||||
| Utility/S3 | [s3reverse](https://github.com/hahwul/s3reverse) | The format of various s3 buckets is convert in one format. for bugbounty and security testing. |  |  |
|
||||
| Utility/SHOT | [gowitness](https://github.com/sensepost/gowitness) | 🔍 gowitness - a golang, web screenshot utility using Chrome Headless |  |  |
|
||||
| Utility/TEMPLATE | [bountyplz](https://github.com/fransr/bountyplz) | Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |  |  |
|
||||
|
@ -395,9 +395,9 @@
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"nuclei": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/WVS | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |  |  |",
|
||||
"Method": "WVS"
|
||||
"Method": "WVS",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"oxml_xxe": {
|
||||
"Data": "| Utility/VULN | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |",
|
||||
@ -414,6 +414,11 @@
|
||||
"Method": "VULN",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"pwncat": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |  |  |",
|
||||
"Method": "PENTEST"
|
||||
},
|
||||
"qsreplace": {
|
||||
"Data": "| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |",
|
||||
"Method": "URL",
|
||||
|
Loading…
x
Reference in New Issue
Block a user