mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 14:25:52 -05:00
distribute readme
This commit is contained in:
parent
c14ceae1ef
commit
eff2b547f8
@ -144,7 +144,10 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
|||||||
| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |  |  |
|
| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |  |  |
|
||||||
| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets |  |  |
|
| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets |  |  |
|
||||||
| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents |  |  |
|
| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents |  |  |
|
||||||
|
| Scanner/SMUGGLE | [HRS](https://github.com/SafeBreach-Labs/HRS) | HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. |  |  |
|
||||||
| Scanner/SMUGGLE | [h2csmuggler](https://github.com/BishopFox/h2csmuggler) | HTTP Request Smuggling over HTTP/2 Cleartext (h2c) |  |  |
|
| Scanner/SMUGGLE | [h2csmuggler](https://github.com/BishopFox/h2csmuggler) | HTTP Request Smuggling over HTTP/2 Cleartext (h2c) |  |  |
|
||||||
|
| Scanner/SMUGGLE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs. |  |  |
|
||||||
|
| Scanner/SMUGGLE | [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) | HTTP Request Smuggling Detection Tool |  |  |
|
||||||
| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server. |  |  |
|
| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server. |  |  |
|
||||||
| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |  |  |
|
| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |  |  |
|
||||||
| Scanner/SMUGGLE | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler |  |  |
|
| Scanner/SMUGGLE | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler |  |  |
|
||||||
|
54
data.json
54
data.json
@ -431,6 +431,22 @@
|
|||||||
"Windows": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt"
|
"Windows": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"HRS": {
|
||||||
|
"Type": "Scanner",
|
||||||
|
"Data": "| Scanner/SMUGGLE | [HRS](https://github.com/SafeBreach-Labs/HRS) | HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. |  |  |",
|
||||||
|
"Method": "SMUGGLE",
|
||||||
|
"Description": "HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.",
|
||||||
|
"Install": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
},
|
||||||
|
"Update": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
}
|
||||||
|
},
|
||||||
"HydraRecon": {
|
"HydraRecon": {
|
||||||
"Data": "| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool |  |  |",
|
"Data": "| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool |  |  |",
|
||||||
"Description": "All In One, Fast, Easy Recon Tool",
|
"Description": "All In One, Fast, Easy Recon Tool",
|
||||||
@ -2079,16 +2095,48 @@
|
|||||||
"Windows": "go get github.com/htcat/htcat/cmd/htcat"
|
"Windows": "go get github.com/htcat/htcat/cmd/htcat"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"http2smugl": {
|
"http-request-smuggler": {
|
||||||
"Type": "Scanner",
|
"Data": "| Scanner/SMUGGLE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs. |  |  |",
|
||||||
"Data": "| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server. |  |  |",
|
"Description": "This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs.",
|
||||||
|
"Install": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
},
|
||||||
"Method": "SMUGGLE",
|
"Method": "SMUGGLE",
|
||||||
|
"Type": "Scanner",
|
||||||
|
"Update": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http-request-smuggling": {
|
||||||
|
"Data": "| Scanner/SMUGGLE | [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) | HTTP Request Smuggling Detection Tool |  |  |",
|
||||||
|
"Description": "HTTP Request Smuggling Detection Tool",
|
||||||
|
"Install": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
},
|
||||||
|
"Method": "SMUGGLE",
|
||||||
|
"Type": "Scanner",
|
||||||
|
"Update": {
|
||||||
|
"Linux": "",
|
||||||
|
"MacOS": "",
|
||||||
|
"Windows": ""
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http2smugl": {
|
||||||
|
"Data": "| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server. |  |  |",
|
||||||
"Description": "This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server.",
|
"Description": "This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server.",
|
||||||
"Install": {
|
"Install": {
|
||||||
"Linux": "",
|
"Linux": "",
|
||||||
"MacOS": "",
|
"MacOS": "",
|
||||||
"Windows": ""
|
"Windows": ""
|
||||||
},
|
},
|
||||||
|
"Method": "SMUGGLE",
|
||||||
|
"Type": "Scanner",
|
||||||
"Update": {
|
"Update": {
|
||||||
"Linux": "",
|
"Linux": "",
|
||||||
"MacOS": "",
|
"MacOS": "",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user