mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 06:15:57 -05:00
Deploy README.md and Categorize Docs
This commit is contained in:
parent
048f7aad0c
commit
6c3a870f5c
@ -29,7 +29,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|-------|---------------------------------------------------|
|
||||
| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`|
|
||||
| Tags | [`pentest`](/categorize/tags/pentest.md) [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`infra`](/categorize/tags/infra.md) [`url`](/categorize/tags/url.md) [`param`](/categorize/tags/param.md) [`osint`](/categorize/tags/osint.md) [`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md) [`crawl`](/categorize/tags/crawl.md) [`dns`](/categorize/tags/dns.md) [`endpoint`](/categorize/tags/endpoint.md) [`port`](/categorize/tags/port.md) [`domain`](/categorize/tags/domain.md) [`graphql`](/categorize/tags/graphql.md) [`apk`](/categorize/tags/apk.md) [`portscan`](/categorize/tags/portscan.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`ssrf`](/categorize/tags/ssrf.md) [`broken-link`](/categorize/tags/broken-link.md) [`xss`](/categorize/tags/xss.md) [`smuggle`](/categorize/tags/smuggle.md) [`sqli`](/categorize/tags/sqli.md) [`csp`](/categorize/tags/csp.md) [`s3`](/categorize/tags/s3.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`aaa`](/categorize/tags/aaa.md) [`403`](/categorize/tags/403.md) [`cors`](/categorize/tags/cors.md) [`ssl`](/categorize/tags/ssl.md) [`exploit`](/categorize/tags/exploit.md) [`oast`](/categorize/tags/oast.md) [`xxe`](/categorize/tags/xxe.md) [`lfi`](/categorize/tags/lfi.md) [`rop`](/categorize/tags/rop.md) [`cookie`](/categorize/tags/cookie.md) [`payload`](/categorize/tags/payload.md) [`notify`](/categorize/tags/notify.md) [`http`](/categorize/tags/http.md) [`wordlist`](/categorize/tags/wordlist.md) [`darkmode`](/categorize/tags/darkmode.md) [`report`](/categorize/tags/report.md) [`diff`](/categorize/tags/diff.md) |
|
||||
| Langs | [`Ruby`](/categorize/langs/Ruby.md) [`Java`](/categorize/langs/Java.md) [`Shell`](/categorize/langs/Shell.md) [`Go`](/categorize/langs/Go.md) [`Rust`](/categorize/langs/Rust.md) [`Python`](/categorize/langs/Python.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`C#`](/categorize/langs/C#.md) [`HTML`](/categorize/langs/HTML.md) [`PHP`](/categorize/langs/PHP.md) [`CSS`](/categorize/langs/CSS.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`C++`](/categorize/langs/C++.md) |
|
||||
| Langs | [`Ruby`](/categorize/langs/Ruby.md) [`Java`](/categorize/langs/Java.md) [`Shell`](/categorize/langs/Shell.md) [`Go`](/categorize/langs/Go.md) [`Rust`](/categorize/langs/Rust.md) [`Python`](/categorize/langs/Python.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`C#`](/categorize/langs/C#.md) [`HTML`](/categorize/langs/HTML.md) [`PHP`](/categorize/langs/PHP.md) [`CSS`](/categorize/langs/CSS.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`C++`](/categorize/langs/C++.md) |
|
||||
|
||||
### Tools
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
@ -225,6 +225,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
|
||||
|Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|
||||
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Ruby.md)|
|
||||
|Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|||[](/categorize/langs/Go.md)|
|
||||
|Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)| SQL Injection scanner||||
|
||||
|Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers ||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Python.md)|
|
||||
|Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|||[](/categorize/langs/Python.md)|
|
||||
|
@ -3,6 +3,7 @@
|
||||
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site||[`darkmode`](/categorize/tags/darkmode.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph ||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|||[](/categorize/langs/TypeScript.md)|
|
||||
|
@ -4,6 +4,7 @@
|
||||
| Type | Name | Description | Star | Tags | Badges |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Ruby.md)|
|
||||
|Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/TypeScript.md)|
|
||||
|Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Python.md)|
|
||||
|Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)||[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|
||||
|
||||
|
@ -1 +1 @@
|
||||
Sun Oct 23 15:34:41 UTC 2022
|
||||
Fri Oct 28 01:59:22 UTC 2022
|
||||
|
Loading…
x
Reference in New Issue
Block a user