mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 14:25:52 -05:00
distribute readme
This commit is contained in:
parent
db568606a7
commit
6669afecd8
@ -39,6 +39,7 @@ This is Cool Extensions collection of Burp suite and ZAP
|
|||||||
| Burp/REPEAT | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |
|
| Burp/REPEAT | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |
|
||||||
| Burp/REPEAT | [Stepper](https://github.com/CoreyD97/Stepper) | A natural evolution of Burp Suite's Repeater tool |  |  |
|
| Burp/REPEAT | [Stepper](https://github.com/CoreyD97/Stepper) | A natural evolution of Burp Suite's Repeater tool |  |  |
|
||||||
| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) |  |  |
|
| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) |  |  |
|
||||||
|
| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters |  |  |
|
||||||
| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities |  |  |
|
| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities |  |  |
|
||||||
| ZAP/SCRIPT | [community-scripts](https://github.com/zaproxy/community-scripts) | A collection of ZAP scripts provided by the community - pull requests very welcome! |  |  |
|
| ZAP/SCRIPT | [community-scripts](https://github.com/zaproxy/community-scripts) | A collection of ZAP scripts provided by the community - pull requests very welcome! |  |  |
|
||||||
## Contribute and Contributor
|
## Contribute and Contributor
|
||||||
|
@ -34,6 +34,11 @@
|
|||||||
"Method": "REPEAT",
|
"Method": "REPEAT",
|
||||||
"Type": "Burp"
|
"Type": "Burp"
|
||||||
},
|
},
|
||||||
|
"attack-surface-detector-zap": {
|
||||||
|
"Type": "ZAP",
|
||||||
|
"Data": "| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters |  |  |",
|
||||||
|
"Method": "PASV"
|
||||||
|
},
|
||||||
"auto-repeater": {
|
"auto-repeater": {
|
||||||
"Data": "| Burp/PASV | [auto-repeater](https://github.com/PortSwigger/auto-repeater) | Automated HTTP Request Repeating With Burp Suite |  |  |",
|
"Data": "| Burp/PASV | [auto-repeater](https://github.com/PortSwigger/auto-repeater) | Automated HTTP Request Repeating With Burp Suite |  |  |",
|
||||||
"Method": "PASV",
|
"Method": "PASV",
|
||||||
@ -90,9 +95,9 @@
|
|||||||
"Type": "Burp"
|
"Type": "Burp"
|
||||||
},
|
},
|
||||||
"reflect": {
|
"reflect": {
|
||||||
"Type": "ZAP",
|
|
||||||
"Data": "| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities |  |  |",
|
"Data": "| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities |  |  |",
|
||||||
"Method": "PASV"
|
"Method": "PASV",
|
||||||
|
"Type": "ZAP"
|
||||||
},
|
},
|
||||||
"reflected-parameters": {
|
"reflected-parameters": {
|
||||||
"Data": "| Burp/PASV | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite |  |  |",
|
"Data": "| Burp/PASV | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite |  |  |",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user