mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-03 04:19:15 -05:00
distribute readme
This commit is contained in:
parent
ab632cbbff
commit
8d85b3050c
@ -37,6 +37,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay |  |  |
|
||||
| Army-Knife/PROXY | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project |  |  |
|
||||
| Army-Knife/SCAN | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |  |  |
|
||||
| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool |  |  |
|
||||
| Discovery/ALL | [OneForAll](https://github.com/shmilylty/OneForAll) | OneForAll是一款功能强大的子域收集工具 |  |  |
|
||||
| Discovery/ALL | [aquatone](https://github.com/michenriksen/aquatone) | A Tool for Domain Flyovers |  |  |
|
||||
| Discovery/ALL | [intrigue-core](https://github.com/intrigueio/intrigue-core) | Discover Your Attack Surface |  |  |
|
||||
@ -172,6 +173,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
||||
| Utility/PAYLOAD | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |
|
||||
| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF |  |  |
|
||||
| Utility/PAYLOAD | [PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) | 📡 PoC auto collect from GitHub. Be careful malware. |  |  |
|
||||
| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker |  |  |
|
||||
| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes |  |  |
|
||||
| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 |  |  |
|
||||
|
20
data.json
20
data.json
@ -368,15 +368,15 @@
|
||||
}
|
||||
},
|
||||
"HydraRecon": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool |  |  |",
|
||||
"Method": "ALL",
|
||||
"Description": "All In One, Fast, Easy Recon Tool",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Method": "ALL",
|
||||
"Type": "Discovery",
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
@ -575,6 +575,22 @@
|
||||
"Windows": "cd Photon; git pull -v ; pip3 install -r requirements.txt"
|
||||
}
|
||||
},
|
||||
"PoC-in-GitHub": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/PAYLOAD | [PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) | 📡 PoC auto collect from GitHub. Be careful malware. |  |  |",
|
||||
"Method": "PAYLOAD",
|
||||
"Description": "📡 PoC auto collect from GitHub. Be careful malware.",
|
||||
"Install": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
},
|
||||
"Update": {
|
||||
"Linux": "",
|
||||
"MacOS": "",
|
||||
"Windows": ""
|
||||
}
|
||||
},
|
||||
"RustScan": {
|
||||
"Data": "| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust |  |  |",
|
||||
"Description": "Faster Nmap Scanning with Rust ",
|
||||
|
Loading…
x
Reference in New Issue
Block a user