mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 06:15:57 -05:00
distribute readme
This commit is contained in:
parent
8af39128ca
commit
7826ec0e6a
@ -18,6 +18,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Type | Name | Description | Popularity | Language |
|
||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
||||
| Army-Knife/BURP | [BurpSuite](https://portswigger.net/burp) | It's Awesome| | |
|
||||
| Army-Knife/JAELES | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing |  |  |
|
||||
| Army-Knife/ZAP | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project |  |  |
|
||||
| Discovery/CRAWL | [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. |  |  |
|
||||
| Discovery/CRAWL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of "commoncrawl.org" |  |  |
|
||||
@ -76,7 +77,6 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/XSS | [XSpear](https://github.com/hahwul/XSpear) | Powerfull XSS Scanning and Parameter analysis tool&gem |  |  |
|
||||
| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |  |  |
|
||||
| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |  |  |
|
||||
| Utility/CLIP | [ftc](https://github.com/hahwul/ftc) | simple copy to file to clipboard |  |  |
|
||||
| Utility/CSP | [CSP Evaluator](https://csp-evaluator.withgoogle.com) | Online CSP Evaluator from google| | |
|
||||
| Utility/ETC | [Phoenix](https://www.hahwul.com/p/phoenix.html) | hahwul's online tools| | |
|
||||
| Utility/FIND | [fzf](https://github.com/junegunn/fzf) | A command-line fuzzy finder |  |  |
|
||||
|
11
data.json
11
data.json
@ -254,6 +254,11 @@
|
||||
"Method": "TOM",
|
||||
"Type": "Fetch"
|
||||
},
|
||||
"jaeles": {
|
||||
"Type": "Army-Knife",
|
||||
"Data": "| Army-Knife/JAELES | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing |  |  |",
|
||||
"Method": "JAELES"
|
||||
},
|
||||
"knock": {
|
||||
"Data": "| Discovery/DOMAIN | [knock](https://github.com/guelfoweb/knock) | Knock Subdomain Scan |  |  |",
|
||||
"Method": "DOMAIN",
|
||||
@ -290,9 +295,9 @@
|
||||
"Type": "Utility"
|
||||
},
|
||||
"pentest-tools": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/VULN | [pentest-tools](https://github.com/gwen001/pentest-tools) | Custom pentesting tools |  |  |",
|
||||
"Method": "VULN"
|
||||
"Method": "VULN",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"qsreplace": {
|
||||
"Data": "| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |",
|
||||
@ -384,4 +389,4 @@
|
||||
"Method": "ZAP",
|
||||
"Type": "Army-Knife"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user