mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-10-01 05:25:58 +00:00
update footer
This commit is contained in:
parent
e3e786a253
commit
aa6b2fa56c
55
data.json
55
data.json
@ -19,6 +19,11 @@
|
|||||||
"Method": "BRIDGE",
|
"Method": "BRIDGE",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
|
"Blacklist3r": {
|
||||||
|
"Data": "| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r | ![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r) | ![](https://img.shields.io/github/languages/top/NotSoSecure/Blacklist3r) |",
|
||||||
|
"Method": "PAYLOAD",
|
||||||
|
"Type": "Utility"
|
||||||
|
},
|
||||||
"Bug-Bounty-Toolz": {
|
"Bug-Bounty-Toolz": {
|
||||||
"Data": "| ToolBox/ALL | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools | ![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz) | ![](https://img.shields.io/github/languages/top/m4ll0k/Bug-Bounty-Toolz) |",
|
"Data": "| ToolBox/ALL | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools | ![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz) | ![](https://img.shields.io/github/languages/top/m4ll0k/Bug-Bounty-Toolz) |",
|
||||||
"Method": "ALL",
|
"Method": "ALL",
|
||||||
@ -44,6 +49,11 @@
|
|||||||
"Method": "DOMAIN",
|
"Method": "DOMAIN",
|
||||||
"Type": "Discovery"
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
|
"CorsMe": {
|
||||||
|
"Type": "Scanner",
|
||||||
|
"Data": "| Scanner/CORS | [CorsMe](https://github.com/Shivangx01b/CorsMe) | Cross Origin Resource Sharing MisConfiguration Scanner | ![](https://img.shields.io/github/stars/Shivangx01b/CorsMe) | ![](https://img.shields.io/github/languages/top/Shivangx01b/CorsMe) |",
|
||||||
|
"Method": "CORS"
|
||||||
|
},
|
||||||
"Corsy": {
|
"Corsy": {
|
||||||
"Data": "| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner | ![](https://img.shields.io/github/stars/s0md3v/Corsy) | ![](https://img.shields.io/github/languages/top/s0md3v/Corsy) |",
|
"Data": "| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner | ![](https://img.shields.io/github/stars/s0md3v/Corsy) | ![](https://img.shields.io/github/languages/top/s0md3v/Corsy) |",
|
||||||
"Method": "CORS",
|
"Method": "CORS",
|
||||||
@ -70,8 +80,8 @@
|
|||||||
"Type": "Discovery"
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
"Gopherus": {
|
"Gopherus": {
|
||||||
"Data": "| Utility/VULN | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | ![](https://img.shields.io/github/stars/tarunkant/Gopherus) | ![](https://img.shields.io/github/languages/top/tarunkant/Gopherus) |",
|
"Data": "| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | ![](https://img.shields.io/github/stars/tarunkant/Gopherus) | ![](https://img.shields.io/github/languages/top/tarunkant/Gopherus) |",
|
||||||
"Method": "VULN",
|
"Method": "PAYLOAD",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"GraphQLmap": {
|
"GraphQLmap": {
|
||||||
@ -285,9 +295,9 @@
|
|||||||
"Type": "Scanner"
|
"Type": "Scanner"
|
||||||
},
|
},
|
||||||
"dalfox": {
|
"dalfox": {
|
||||||
"Type": "Scanner",
|
|
||||||
"Data": "| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | ![](https://img.shields.io/github/stars/hahwul/dalfox) | ![](https://img.shields.io/github/languages/top/hahwul/dalfox) |",
|
"Data": "| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | ![](https://img.shields.io/github/stars/hahwul/dalfox) | ![](https://img.shields.io/github/languages/top/hahwul/dalfox) |",
|
||||||
"Method": "XSS"
|
"Method": "XSS",
|
||||||
|
"Type": "Scanner"
|
||||||
},
|
},
|
||||||
"dirsearch": {
|
"dirsearch": {
|
||||||
"Data": "| Discovery/FUZZ | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner | ![](https://img.shields.io/github/stars/maurosoria/dirsearch) | ![](https://img.shields.io/github/languages/top/maurosoria/dirsearch) |",
|
"Data": "| Discovery/FUZZ | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner | ![](https://img.shields.io/github/stars/maurosoria/dirsearch) | ![](https://img.shields.io/github/languages/top/maurosoria/dirsearch) |",
|
||||||
@ -414,9 +424,14 @@
|
|||||||
"Method": "DNS",
|
"Method": "DNS",
|
||||||
"Type": "Discovery"
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
|
"hashcat": {
|
||||||
|
"Data": "| Utility/CRACK | [hashcat](https://github.com/hashcat/hashcat/) | World's fastest and most advanced password recovery utility | ![](https://img.shields.io/github/stars/hashcat/hashcat/) | ![](https://img.shields.io/github/languages/top/hashcat/hashcat/) |",
|
||||||
|
"Method": "CRACK",
|
||||||
|
"Type": "Utility"
|
||||||
|
},
|
||||||
"hinject": {
|
"hinject": {
|
||||||
"Data": "| Utility/VULN | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker | ![](https://img.shields.io/github/stars/dwisiswant0/hinject) | ![](https://img.shields.io/github/languages/top/dwisiswant0/hinject) |",
|
"Data": "| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker | ![](https://img.shields.io/github/stars/dwisiswant0/hinject) | ![](https://img.shields.io/github/languages/top/dwisiswant0/hinject) |",
|
||||||
"Method": "VULN",
|
"Method": "PAYLOAD",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"httprobe": {
|
"httprobe": {
|
||||||
@ -490,13 +505,13 @@
|
|||||||
"Type": "Discovery"
|
"Type": "Discovery"
|
||||||
},
|
},
|
||||||
"nuclei": {
|
"nuclei": {
|
||||||
"Data": "| Scanner/WVS | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | ![](https://img.shields.io/github/stars/projectdiscovery/nuclei) | ![](https://img.shields.io/github/languages/top/projectdiscovery/nuclei) |",
|
"Data": "| Army-Knife/SCAN | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | ![](https://img.shields.io/github/stars/projectdiscovery/nuclei) | ![](https://img.shields.io/github/languages/top/projectdiscovery/nuclei) |",
|
||||||
"Method": "WVS",
|
"Method": "SCAN",
|
||||||
"Type": "Scanner"
|
"Type": "Army-Knife"
|
||||||
},
|
},
|
||||||
"oxml_xxe": {
|
"oxml_xxe": {
|
||||||
"Data": "| Utility/VULN | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes | ![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe) | ![](https://img.shields.io/github/languages/top/BuffaloWill/oxml_xxe) |",
|
"Data": "| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes | ![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe) | ![](https://img.shields.io/github/languages/top/BuffaloWill/oxml_xxe) |",
|
||||||
"Method": "VULN",
|
"Method": "PAYLOAD",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"pentest-tools": {
|
"pentest-tools": {
|
||||||
@ -510,8 +525,8 @@
|
|||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"postMessage-tracker": {
|
"postMessage-tracker": {
|
||||||
"Data": "| Utility/VULN | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) |",
|
"Data": "| Utility/B-ADDON | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) |",
|
||||||
"Method": "VULN",
|
"Method": "B-ADDON",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"pwncat": {
|
"pwncat": {
|
||||||
@ -629,14 +644,24 @@
|
|||||||
"Method": "REPEAT",
|
"Method": "REPEAT",
|
||||||
"Type": "Fetch"
|
"Type": "Fetch"
|
||||||
},
|
},
|
||||||
|
"xss-cheatsheet-data": {
|
||||||
|
"Data": "| Utility/PAYLOAD | [xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data) | This repository contains all the XSS cheatsheet data to allow contributions from the community. | ![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data) | ![](https://img.shields.io/github/languages/top/PortSwigger/xss-cheatsheet-data) |",
|
||||||
|
"Method": "PAYLOAD",
|
||||||
|
"Type": "Utility"
|
||||||
|
},
|
||||||
"xsser": {
|
"xsser": {
|
||||||
"Data": "| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site \"Scripter\" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. | ![](https://img.shields.io/github/stars/epsylon/xsser) | ![](https://img.shields.io/github/languages/top/epsylon/xsser) |",
|
"Data": "| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site \"Scripter\" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. | ![](https://img.shields.io/github/stars/epsylon/xsser) | ![](https://img.shields.io/github/languages/top/epsylon/xsser) |",
|
||||||
"Method": "XSS",
|
"Method": "XSS",
|
||||||
"Type": "Scanner"
|
"Type": "Scanner"
|
||||||
},
|
},
|
||||||
"ysoserial": {
|
"ysoserial": {
|
||||||
"Data": "| Utility/VULN | [ysoserial](https://github.com/frohoff/ysoserial) | A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | ![](https://img.shields.io/github/stars/frohoff/ysoserial) | ![](https://img.shields.io/github/languages/top/frohoff/ysoserial) |",
|
"Data": "| Utility/PAYLOAD | [ysoserial](https://github.com/frohoff/ysoserial) | A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | ![](https://img.shields.io/github/stars/frohoff/ysoserial) | ![](https://img.shields.io/github/languages/top/frohoff/ysoserial) |",
|
||||||
"Method": "VULN",
|
"Method": "PAYLOAD",
|
||||||
|
"Type": "Utility"
|
||||||
|
},
|
||||||
|
"ysoserial.net": {
|
||||||
|
"Data": "| Utility/PAYLOAD | [ysoserial.net](https://github.com/pwntester/ysoserial.net) | Deserialization payload generator for a variety of .NET formatters | ![](https://img.shields.io/github/stars/pwntester/ysoserial.net) | ![](https://img.shields.io/github/languages/top/pwntester/ysoserial.net) |",
|
||||||
|
"Method": "PAYLOAD",
|
||||||
"Type": "Utility"
|
"Type": "Utility"
|
||||||
},
|
},
|
||||||
"zap-cli": {
|
"zap-cli": {
|
||||||
|
@ -71,4 +71,5 @@ $ ../distribute-readme
|
|||||||
```
|
```
|
||||||
|
|
||||||
## Thanks to (Contributor)
|
## Thanks to (Contributor)
|
||||||
|
I would like to thank everyone who helped with this project 👍😎 <br>
|
||||||
[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran)
|
[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran)
|
||||||
|
Loading…
Reference in New Issue
Block a user