mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-06 13:55:55 -05:00
distribute readme (add jwt tools)
This commit is contained in:
parent
2c5d78f932
commit
f64c0c86d4
@ -130,6 +130,9 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin
|
||||
| Utility/FLOW | [SequenceDiagram](https://sequencediagram.org) | Online tool for creating UML sequence diagrams| | |
|
||||
| Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things |  |  |
|
||||
| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! |  |  |
|
||||
| Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C |  |  |
|
||||
| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker |  |  |
|
||||
| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | jwt-hack is JWT hacking, security testing utility |  |  |
|
||||
| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r |  |  |
|
||||
| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |  |  |
|
||||
| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF |  |  |
|
||||
|
19
data.json
19
data.json
@ -279,6 +279,11 @@
|
||||
"Method": "URL",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"c-jwt-cracker": {
|
||||
"Data": "| Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C |  |  |",
|
||||
"Method": "JWT",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"cc.py": {
|
||||
"Data": "| Discovery/CRAWL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of \"commoncrawl.org\" |  |  |",
|
||||
"Method": "CRAWL",
|
||||
@ -469,6 +474,16 @@
|
||||
"Method": "JAELES",
|
||||
"Type": "Army-Knife"
|
||||
},
|
||||
"jwt-cracker": {
|
||||
"Data": "| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker |  |  |",
|
||||
"Method": "JWT",
|
||||
"Type": "Utility"
|
||||
},
|
||||
"jwt-hack": {
|
||||
"Type": "Utility",
|
||||
"Data": "| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | jwt-hack is JWT hacking, security testing utility |  |  |",
|
||||
"Method": "JWT"
|
||||
},
|
||||
"knock": {
|
||||
"Data": "| Discovery/DOMAIN | [knock](https://github.com/guelfoweb/knock) | Knock Subdomain Scan |  |  |",
|
||||
"Method": "DOMAIN",
|
||||
@ -625,9 +640,9 @@
|
||||
"Type": "Utility"
|
||||
},
|
||||
"urlgrab": {
|
||||
"Type": "Discovery",
|
||||
"Data": "| Discovery/CRAWL | [urlgrab](https://github.com/IAmStoxe/urlgrab) | A golang utility to spider through a website searching for additional links. |  |  |",
|
||||
"Method": "CRAWL"
|
||||
"Method": "CRAWL",
|
||||
"Type": "Discovery"
|
||||
},
|
||||
"urlprobe": {
|
||||
"Data": "| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code \u0026 content length checker |  |  |",
|
||||
|
Loading…
x
Reference in New Issue
Block a user