mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 06:15:57 -05:00
Update README.md
This commit is contained in:
parent
7c5880cb9d
commit
c093551fd5
200
README.md
200
README.md
@ -7,160 +7,72 @@
|
|||||||
</h1>
|
</h1>
|
||||||
A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
|
A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
|
||||||
|
|
||||||
## Category
|
|
||||||
- [Weapons](#weapons)
|
|
||||||
- [Main Weapon](#main-weapon)
|
|
||||||
- [Subdomain Enumeration](#subdomain-enumeration)
|
|
||||||
- [Fetch path and host](#fetch-path-and-host)
|
|
||||||
- [Port scanner](#port-scanner)
|
|
||||||
- [Web Discovery](#web-discovery)
|
|
||||||
- [Web Vulnerability Scanner](#web-vulnerability-scanner)
|
|
||||||
- [XSS](#xss)
|
|
||||||
- [CSRF](#csrf)
|
|
||||||
- [Path traversal / Directory traversal / LFI](#path-traversal--directory-traversal--lfi)
|
|
||||||
- [Command Injection](#command-injection)
|
|
||||||
- [SQL Injection](#sql-injection)
|
|
||||||
- [NoSQL Injection](#nosql-injection)
|
|
||||||
- [SSRF](#ssrf)
|
|
||||||
- [CORS Misconfiguration](#cors-misconfiguration)
|
|
||||||
- [WebSocket](#websocket)
|
|
||||||
- [Cloud Security](#cloud-security)
|
|
||||||
- [Utility for hackers](#utility-for-hackers)
|
|
||||||
- [Online tools](#online-tools)
|
|
||||||
- [Contribute](#contribute-and-contributor)
|
|
||||||
|
|
||||||
## Weapons
|
## Weapons
|
||||||
|
| Type | Name | Description | Popularity | Language |
|
||||||
## Fetch path and host
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
||||||
| [httprobe](https://github.com/tomnomnom/httprobe) | Take a list of domains and probe for working HTTP and HTTPS servers |  |  | <br> <br>  <br>  |
|
| Discovery/CRAWL | [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. |  |  |
|
||||||
| [meg](https://github.com/tomnomnom/meg) | Fetch many paths for many hosts - without killing the hosts |  |  | <br> <br>  <br>  |
|
| Discovery/CRAWL | [gospider](https://github.com/jaeles-project/gospider) | Gospider - Fast web spider written in Go |  |  |
|
||||||
|
| Discovery/DNS | [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |  |  |
|
||||||
## Web Discovery
|
| Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |  |  |
|
||||||
|
| Discovery/DOMAIN | [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery |  |  |
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
| Discovery/DOMAIN | [assetfinder](https://github.com/tomnomnom/assetfinder) | Find domains and subdomains related to a given domain |  |  |
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
| Discovery/DOMAIN | [findomain](https://github.com/Edu4rdSHL/findomain) | The fastest and cross-platform subdomain enumerator, do not waste your time. |  |  |
|
||||||
| [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. |  |  | <br> <br>  <br>  |
|
| Discovery/DOMAIN | [subfinder](https://github.com/projectdiscovery/subfinder) | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |  |  |
|
||||||
| [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. |  |  | <br> <br>  <br>  |
|
| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. |  |  |
|
||||||
| [ReconDog](https://github.com/s0md3v/ReconDog) | Reconnaissance Swiss Army Knife |  |  | <br> <br>  <br>  |
|
| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |  |  |
|
||||||
| [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |  |  | <br> <br>  <br>  |
|
| Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |  |  |
|
||||||
| [gospider](https://github.com/jaeles-project/gospider) | Gospider - Fast web spider written in Go |  |  | <br> <br>  <br>  |
|
| Discovery/PORT | [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. |  |  |
|
||||||
| [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |  |  | <br> <br>  <br>  |
|
| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain |  |  |
|
||||||
| [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain |  |  | <br> <br>  <br>  |
|
| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services |  |  |
|
||||||
|
| Fetch/TOM | [httprobe](https://github.com/tomnomnom/httprobe) | Take a list of domains and probe for working HTTP and HTTPS servers |  |  |
|
||||||
## XSS
|
| Fetch/TOM | [meg](https://github.com/tomnomnom/meg) | Fetch many paths for many hosts - without killing the hosts |  |  |
|
||||||
|
| Fetch/WSOCK | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler |  |  |
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner |  |  |
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  |
|
||||||
| [XSStrike](https://github.com/s0md3v/XSStrike) | Most advanced XSS scanner. |  |  | <br> <br>  <br>  |
|
| Scanner/SQL | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool |  |  |
|
||||||
| [Xspear](https://github.com/hahwul/Xspear) | Powerfull XSS Scanning and Parameter analysis tool&gem |  |  | <br> <br>  <br>  |
|
| Scanner/SQL | [sqlninja](https://github.com/xxgrunge/sqlninja) | SQL Injection Tool |  |  |
|
||||||
|
| Scanner/SSL | [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability |  |  |
|
||||||
## SQL Injection
|
| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. |  |  |
|
||||||
|
| Scanner/XSS | [XSStrike](https://github.com/s0md3v/XSStrike) | Most advanced XSS scanner. |  |  |
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
| Scanner/XSS | [xspear](https://github.com/hahwul/xspear) | Powerfull XSS Scanning and Parameter analysis tool&gem |  |  |
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
| Utility/CLIP | [ftc](https://github.com/hahwul/ftc) | simple copy to file to clipboard |  |  |
|
||||||
| [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool |  |  | <br> <br>  <br>  |
|
| Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things |  |  |
|
||||||
| [sqlninja](https://github.com/xxgrunge/sqlninja) | SQL Injection Tool |  |  | <br> <br>  <br>  |
|
| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! |  |  |
|
||||||
|
| Utility/S3 | [s3reverse](https://github.com/hahwul/s3reverse) | The format of various s3 buckets is convert in one format. for bugbounty and security testing. |  |  |
|
||||||
## NoSQL Injection
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## CORS Misconfiguration
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## Cloud Security
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [s3reverse](https://github.com/hahwul/s3reverse) | The format of various s3 buckets is convert in one format. for bugbounty and security testing. |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## Main Weapon
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
|
|
||||||
## Subdomain Enumeration
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery |  |  | <br> <br>  <br>  |
|
|
||||||
| [assetfinder](https://github.com/tomnomnom/assetfinder) | Find domains and subdomains related to a given domain |  |  | <br> <br>  <br>  |
|
|
||||||
| [findomain](https://github.com/Edu4rdSHL/findomain) | The fastest and cross-platform subdomain enumerator, do not waste your time. |  |  | <br> <br>  <br>  |
|
|
||||||
| [subfinder](https://github.com/projectdiscovery/subfinder) | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## Port scanner
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |  |  | <br> <br>  <br>  |
|
|
||||||
| [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |  |  | <br> <br>  <br>  |
|
|
||||||
| [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## Web Vulnerability Scanner
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services |  |  | <br> <br>  <br>  |
|
|
||||||
| [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. |  |  | <br> <br>  <br>  |
|
|
||||||
| [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## CSRF
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
|
|
||||||
## WebSocket
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler |  |  | <br> <br>  <br>  |
|
|
||||||
|
|
||||||
## Path traversal / Directory traversal / LFI
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
|
|
||||||
## Command Injection
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
|
|
||||||
## SSRF
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
|
|
||||||
## Utility for hackers
|
|
||||||
|
|
||||||
| Name | Description | Popularity | Language | Metadata |
|
|
||||||
| ---------- | :---------- | :----------: | :----------: | :----------: |
|
|
||||||
| [ftc](https://github.com/hahwul/ftc) | simple copy to file to clipboard |  |  | <br> <br>  <br>  |
|
|
||||||
| [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things |  |  | <br> <br>  <br>  |
|
|
||||||
| [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! |  |  | <br> <br>  <br>  |
|
|
||||||
## Contribute and Contributor
|
## Contribute and Contributor
|
||||||
### Usage of weapon-md
|
### Usage of add-tool
|
||||||
```
|
```
|
||||||
./weapon-md
|
./add-tool
|
||||||
Usage of ./weapon-md:
|
Usage of ./add-tool:
|
||||||
-isFirst
|
-isFirst
|
||||||
if you add new type, it use
|
if you add new type, it use
|
||||||
-url string
|
-url string
|
||||||
github / gitlab / bitbucket url
|
any url
|
||||||
```
|
```
|
||||||
|
|
||||||
### Three Procedures for the Contribute
|
### Three Procedures for the Contribute
|
||||||
- First, generate markdown code using `weapon-md`
|
- First, your tool append `data.json` using `add-tool
|
||||||
```
|
```
|
||||||
$ ./weapon-md -url https://github.com/hahwul/xspear
|
$ ./add-tool -url https://github.com/sqlmapproject/sqlmap
|
||||||
| [xspear](https://github.com/hahwul/xspear) | Powerfull XSS Scanning and Parameter analysis tool&gem |  |  | <br> <br>  <br>  |
|
Successfully Opened type.lst
|
||||||
|
[0] Army-Knife
|
||||||
|
[1] Discovery
|
||||||
|
[2] Fetch
|
||||||
|
[3] Scanner
|
||||||
|
[4] Utility
|
||||||
|
[+] What is type?
|
||||||
|
3
|
||||||
|
Scanner
|
||||||
|
[+] What is method(e.g XSS, WVS, SSL, ETC..)?
|
||||||
|
SQL
|
||||||
|
Successfully Opened data.json
|
||||||
|
|
||||||
```
|
```
|
||||||
- Second, Give me PR or Add issue with output code<br>
|
- Second, Give me PR or Add issue with data.json<br>
|
||||||
- Third, There's no third.
|
- Third, There's no third.
|
||||||
|
|
||||||
|
### Distribute
|
||||||
|
```
|
||||||
|
$ ./distribute-readme
|
||||||
|
=> show new README file
|
||||||
|
```
|
||||||
|
Loading…
x
Reference in New Issue
Block a user