mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-23 00:19:50 -05:00
distribute readme
This commit is contained in:
parent
6bc54ab249
commit
7da26ecd0d
@ -211,6 +211,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF |  |  |
|
||||
| Utility/PAYLOAD | [PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) | 📡 PoC auto collect from GitHub. Be careful malware. |  |  |
|
||||
| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker |  |  |
|
||||
| Utility/PAYLOAD | [jsfuck](https://github.com/aemkei/jsfuck) | Write any JavaScript with 6 Characters |  |  |
|
||||
| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |
|
||||
| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 |  |  |
|
||||
| Utility/PAYLOAD | [xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data) | This repository contains all the XSS cheatsheet data to allow contributions from the community. |  |  |
|
||||
|
20
data.json
20
data.json
@ -2191,6 +2191,22 @@
|
||||
"Windows": "go get github.com/jaeles-project/jaeles"
|
||||
}
|
||||
},
|
||||
"jsfuck": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/PAYLOAD | [jsfuck](https://github.com/aemkei/jsfuck) | Write any JavaScript with 6 Characters |  |  |",
|
||||
"Method": "PAYLOAD",
|
||||
"Description": "Write any JavaScript with 6 Characters",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"jsprime": {
|
||||
"Data": "| Scanner/JS | [jsprime](https://github.com/dpnishant/jsprime) | a javascript static security analysis tool |  |  |",
|
||||
"Description": "a javascript static security analysis tool",
|
||||
@ -2512,15 +2528,15 @@
|
||||
}
|
||||
},
|
||||
"ppfuzz": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/FUZZ | [ppfuzz](https://github.com/dwisiswant0/ppfuzz) | A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 |  |  |",
|
||||
"Method": "FUZZ",
|
||||
"Description": "A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "FUZZ",
|
||||
"Type": "Scanner",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
|
Loading…
x
Reference in New Issue
Block a user