mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-12-19 12:44:28 -05:00
distribute readme
This commit is contained in:
parent
3554002e81
commit
d6846195cd
@ -38,6 +38,7 @@ This is Cool Extensions collection of Burp suite and ZAP
|
||||
| Burp/PASV | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite |  |  |
|
||||
| Burp/REPEAT | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. |  |  |
|
||||
| Burp/REPEAT | [Stepper](https://github.com/CoreyD97/Stepper) | A natural evolution of Burp Suite's Repeater tool |  |  |
|
||||
| Burp/UTIL | [safecopy](https://github.com/yashrs/safecopy) | Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be added in the future. |  |  |
|
||||
| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) |  |  |
|
||||
| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters |  |  |
|
||||
| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities |  |  |
|
||||
|
@ -35,9 +35,9 @@
|
||||
"Type": "Burp"
|
||||
},
|
||||
"attack-surface-detector-zap": {
|
||||
"Type": "ZAP",
|
||||
"Data": "| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters |  |  |",
|
||||
"Method": "PASV"
|
||||
"Method": "PASV",
|
||||
"Type": "ZAP"
|
||||
},
|
||||
"auto-repeater": {
|
||||
"Data": "| Burp/PASV | [auto-repeater](https://github.com/PortSwigger/auto-repeater) | Automated HTTP Request Repeating With Burp Suite |  |  |",
|
||||
@ -104,6 +104,11 @@
|
||||
"Method": "PASV",
|
||||
"Type": "Burp"
|
||||
},
|
||||
"safecopy": {
|
||||
"Type": "Burp",
|
||||
"Data": "| Burp/UTIL | [safecopy](https://github.com/yashrs/safecopy) | Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be added in the future. |  |  |",
|
||||
"Method": "UTIL"
|
||||
},
|
||||
"taborator": {
|
||||
"Data": "| Burp/CALLBACK | [taborator](https://github.com/hackvertor/taborator) | A Burp extension to show the Collaborator client in a tab |  |  |",
|
||||
"Method": "CALLBACK",
|
||||
|
Loading…
Reference in New Issue
Block a user