mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-22 16:09:54 -05:00
distribute readme
This commit is contained in:
parent
f1d9b0b006
commit
8d8916bb78
@ -66,12 +66,16 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/LFI | [LFISuite](https://github.com/D35m0nd142/LFISuite) | Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |  |  |
|
||||
| Scanner/LFI | [dotdotpwn](https://github.com/wireghoul/dotdotpwn) | DotDotPwn - The Directory Traversal Fuzzer |  |  |
|
||||
| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  |
|
||||
| Scanner/RECON | [Osmedeus](https://github.com/j3ssie/Osmedeus) | Fully automated offensive security framework for reconnaissance and vulnerability scanning |  |  |
|
||||
| Scanner/RECON | [Sn1per](https://github.com/1N3/Sn1per) | Automated pentest framework for offensive security experts |  |  |
|
||||
| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |  |  |
|
||||
| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents |  |  |
|
||||
| Scanner/SQL | [SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner| | |
|
||||
| Scanner/SQL | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool |  |  |
|
||||
| Scanner/SSL | [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability |  |  |
|
||||
| Scanner/SSL | [testssl.sh](https://github.com/drwetter/testssl.sh) | Testing TLS/SSL encryption anywhere on any port |  |  |
|
||||
| Scanner/SSRF | [SSRFmap](https://github.com/swisskyrepo/SSRFmap) | Automatic SSRF fuzzer and exploitation tool |  |  |
|
||||
| Scanner/SSRF | [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) | A simple SSRF-testing sheriff written in Go |  |  |
|
||||
| Scanner/WP | [wpscan](https://github.com/wpscanteam/wpscan) | WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |  |  |
|
||||
| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. |  |  |
|
||||
| Scanner/WVS | [arachni](https://github.com/Arachni/arachni) | Web Application Security Scanner Framework |  |  |
|
||||
@ -81,6 +85,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Scanner/XSS | [XSStrike](https://github.com/s0md3v/XSStrike) | Most advanced XSS scanner. |  |  |
|
||||
| Scanner/XSS | [XSpear](https://github.com/hahwul/XSpear) | Powerfull XSS Scanning and Parameter analysis tool&gem |  |  |
|
||||
| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |  |  |
|
||||
| Scanner/XSS | [ezXSS](https://github.com/ssl/ezXSS) | ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |  |  |
|
||||
| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |  |  |
|
||||
| Utility/CSP | [CSP Evaluator](https://csp-evaluator.withgoogle.com) | Online CSP Evaluator from google| | |
|
||||
| Utility/ENV | [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) | GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |  |  |
|
||||
|
29
data.json
29
data.json
@ -69,6 +69,11 @@
|
||||
"Method": "ALL",
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"Osmedeus": {
|
||||
"Data": "| Scanner/RECON | [Osmedeus](https://github.com/j3ssie/Osmedeus) | Fully automated offensive security framework for reconnaissance and vulnerability scanning |  |  |",
|
||||
"Method": "RECON",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"ParamSpider": {
|
||||
"Data": "| Discovery/FUZZ | [ParamSpider](https://github.com/devanshbatham/ParamSpider) | Mining parameters from dark corners of Web Archives |  |  |",
|
||||
"Method": "FUZZ",
|
||||
@ -129,6 +134,11 @@
|
||||
"Method": "VULN",
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"Sn1per": {
|
||||
"Type": "Scanner",
|
||||
"Data": "| Scanner/RECON | [Sn1per](https://github.com/1N3/Sn1per) | Automated pentest framework for offensive security experts |  |  |",
|
||||
"Method": "RECON"
|
||||
},
|
||||
"Striker": {
|
||||
"Data": "| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. |  |  |",
|
||||
"Method": "WVS",
|
||||
@ -209,6 +219,11 @@
|
||||
"Method": "LFI",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"ezXSS": {
|
||||
"Data": "| Scanner/XSS | [ezXSS](https://github.com/ssl/ezXSS) | ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |  |  |",
|
||||
"Method": "XSS",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"ffuf": {
|
||||
"Data": "| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go |  |  |",
|
||||
"Method": "FUZZ",
|
||||
@ -240,9 +255,9 @@
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"github-search": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/GIT | [github-search](https://github.com/gwen001/github-search) | Tools to perform basic search on GitHub. |  |  |",
|
||||
"Method": "GIT"
|
||||
"Method": "GIT",
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"gitrob": {
|
||||
"Data": "| Discovery/GIT | [gitrob](https://github.com/michenriksen/gitrob) | Reconnaissance tool for GitHub organizations |  |  |",
|
||||
@ -314,6 +329,11 @@
|
||||
"Method": "TOM",
|
||||
"Type": "Fetch"
|
||||
},
|
||||
"megplus": {
|
||||
"Data": "| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |  |  |",
|
||||
"Method": "RECON",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"naabu": {
|
||||
"Data": "| Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |  |  |",
|
||||
"Method": "PORT",
|
||||
@ -369,6 +389,11 @@
|
||||
"Method": "SQL",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"ssrf-sheriff": {
|
||||
"Data": "| Scanner/SSRF | [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) | A simple SSRF-testing sheriff written in Go |  |  |",
|
||||
"Method": "SSRF",
|
||||
"Type": "Scanner"
|
||||
},
|
||||
"subfinder": {
|
||||
"Data": "| Discovery/DOMAIN | [subfinder](https://github.com/projectdiscovery/subfinder) | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |  |  |",
|
||||
"Method": "DOMAIN",
|
||||
|
Loading…
x
Reference in New Issue
Block a user