mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-12-18 04:04:29 -05:00
distribute readme
This commit is contained in:
parent
67e1f71847
commit
8319dd6135
@ -129,6 +129,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
|||||||
| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. | ![](https://img.shields.io/github/stars/1N3/BruteX) | ![](https://img.shields.io/github/languages/top/1N3/BruteX) |
|
| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. | ![](https://img.shields.io/github/stars/1N3/BruteX) | ![](https://img.shields.io/github/languages/top/1N3/BruteX) |
|
||||||
| Scanner/FUZZ | [VHostScan](https://github.com/codingo/VHostScan) | A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. | ![](https://img.shields.io/github/stars/codingo/VHostScan) | ![](https://img.shields.io/github/languages/top/codingo/VHostScan) |
|
| Scanner/FUZZ | [VHostScan](https://github.com/codingo/VHostScan) | A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. | ![](https://img.shields.io/github/stars/codingo/VHostScan) | ![](https://img.shields.io/github/languages/top/codingo/VHostScan) |
|
||||||
| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go | ![](https://img.shields.io/github/stars/ffuf/ffuf) | ![](https://img.shields.io/github/languages/top/ffuf/ffuf) |
|
| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go | ![](https://img.shields.io/github/stars/ffuf/ffuf) | ![](https://img.shields.io/github/languages/top/ffuf/ffuf) |
|
||||||
|
| Scanner/FUZZ | [ppfuzz](https://github.com/dwisiswant0/ppfuzz) | A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 | ![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/ppfuzz) |
|
||||||
| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra | ![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra) | ![](https://img.shields.io/github/languages/top/vanhauser-thc/thc-hydra) |
|
| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra | ![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra) | ![](https://img.shields.io/github/languages/top/vanhauser-thc/thc-hydra) |
|
||||||
| Scanner/FUZZ | [wfuzz](https://github.com/xmendez/wfuzz) | Web application fuzzer | ![](https://img.shields.io/github/stars/xmendez/wfuzz) | ![](https://img.shields.io/github/languages/top/xmendez/wfuzz) |
|
| Scanner/FUZZ | [wfuzz](https://github.com/xmendez/wfuzz) | Web application fuzzer | ![](https://img.shields.io/github/stars/xmendez/wfuzz) | ![](https://img.shields.io/github/languages/top/xmendez/wfuzz) |
|
||||||
| Scanner/GQL | [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) | GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. | ![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/GraphQLmap) |
|
| Scanner/GQL | [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) | GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. | ![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/GraphQLmap) |
|
||||||
|
20
data.json
20
data.json
@ -1136,15 +1136,15 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"boast": {
|
"boast": {
|
||||||
"Type": "Utility",
|
|
||||||
"Data": "| Utility/CALLBACK | [boast](https://github.com/marcoagner/boast) | The BOAST Outpost for AppSec Testing (v0.1.0) | ![](https://img.shields.io/github/stars/marcoagner/boast) | ![](https://img.shields.io/github/languages/top/marcoagner/boast) |",
|
"Data": "| Utility/CALLBACK | [boast](https://github.com/marcoagner/boast) | The BOAST Outpost for AppSec Testing (v0.1.0) | ![](https://img.shields.io/github/stars/marcoagner/boast) | ![](https://img.shields.io/github/languages/top/marcoagner/boast) |",
|
||||||
"Method": "CALLBACK",
|
|
||||||
"Description": "The BOAST Outpost for AppSec Testing (v0.1.0)",
|
"Description": "The BOAST Outpost for AppSec Testing (v0.1.0)",
|
||||||
"Install": {
|
"Install": {
|
||||||
"Linux": "",
|
"Linux": "",
|
||||||
"MacOS": "",
|
"MacOS": "",
|
||||||
"Windows": ""
|
"Windows": ""
|
||||||
},
|
},
|
||||||
|
"Method": "CALLBACK",
|
||||||
|
"Type": "Utility",
|
||||||
"Update": {
|
"Update": {
|
||||||
"Linux": "",
|
"Linux": "",
|
||||||
"MacOS": "",
|
"MacOS": "",
|
||||||
@ -2511,6 +2511,22 @@
|
|||||||
"Windows": "cd postMessage-tracker ; git pull -v"
|
"Windows": "cd postMessage-tracker ; git pull -v"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"ppfuzz": {
|
||||||
|
"Type": "Scanner",
|
||||||
|
"Data": "| Scanner/FUZZ | [ppfuzz](https://github.com/dwisiswant0/ppfuzz) | A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 | ![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/ppfuzz) |",
|
||||||
|
"Method": "FUZZ",
|
||||||
|
"Description": "A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀",
|
||||||
|
"Install": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
},
|
||||||
|
"Update": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
}
|
||||||
|
},
|
||||||
"proxify": {
|
"proxify": {
|
||||||
"Data": "| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) |",
|
"Data": "| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) |",
|
||||||
"Description": "Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay",
|
"Description": "Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay",
|
||||||
|
Loading…
Reference in New Issue
Block a user