mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-12-19 12:44:28 -05:00
distribute readme
This commit is contained in:
parent
8f6f7710fe
commit
d8c26fb93d
@ -49,6 +49,8 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Discovery/GIT | [github-search](https://github.com/gwen001/github-search) | Tools to perform basic search on GitHub. |  |  |
|
||||
| Discovery/GIT | [gitleaks](https://github.com/zricethezav/gitleaks) | Scan git repos for secrets using regex and entropy 🔑 |  |  |
|
||||
| Discovery/GIT | [gitrob](https://github.com/michenriksen/gitrob) | Reconnaissance tool for GitHub organizations |  |  |
|
||||
| Discovery/GQL | [graphql-voyager](https://github.com/APIs-guru/graphql-voyager) | 🛰️ Represent any GraphQL API as an interactive graph |  |  |
|
||||
| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing |  |  |
|
||||
| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. |  |  |
|
||||
| Discovery/HTTP | [Aron](https://github.com/m4ll0k/Aron) | Aron is a GO script for finding hidden GET & POST parameters |  |  |
|
||||
| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices| | |
|
||||
|
16
data.json
16
data.json
@ -319,6 +319,11 @@
|
||||
"Method": "SHOT",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"graphql-voyager": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/GQL | [graphql-voyager](https://github.com/APIs-guru/graphql-voyager) | 🛰️ Represent any GraphQL API as an interactive graph |  |  |",
|
||||
"Method": "GQL"
|
||||
},
|
||||
"gron": {
|
||||
"Data": "| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! |  |  |",
|
||||
"Method": "JSON",
|
||||
@ -349,6 +354,11 @@
|
||||
"Method": "HTTP",
|
||||
"Type": "Fetch"
|
||||
},
|
||||
"inql": {
|
||||
"Data": "| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing |  |  |",
|
||||
"Method": "GQL",
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"jaeles": {
|
||||
"Data": "| Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing |  |  |",
|
||||
"Method": "JAELES",
|
||||
@ -415,9 +425,9 @@
|
||||
"Type": "Utility"
|
||||
},
|
||||
"pwncat": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |  |  |",
|
||||
"Method": "PENTEST"
|
||||
"Method": "PENTEST",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"qsreplace": {
|
||||
"Data": "| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value |  |  |",
|
||||
@ -534,4 +544,4 @@
|
||||
"Method": "ZAP",
|
||||
"Type": "Army-Knife"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user