Web Hacker's Weapons
A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
## Category
- [Weapons](#weapons)
- [Subdomain Enumeration](#subdomain-enumeration)
- [Fetch path and host](#fetch-path-and-host)
- [Port scanner](#port-scanner)
- [Web Crawler](#web-crawler)
- [Web Vulnerability Scanner](#web-vulnerability-scanner)
- [XSS](#xss)
- [CSRF](#csrf)
- [Path traversal / Directory traversal / LFI](#path-traversal--directory-traversal--lfi)
- [Command Injection](#command-injection)
- [SQL Injection](#sql-injection)
- [NoSQL Injection](#nosql-injection)
- [SSRF](#ssrf)
- [CORS Misconfiguration](#cors-misconfiguration)
- [WebSocket](#websocket)
- [Cloud Security](#cloud-security)
- [Utility for hackers](#utility-for-hackers)
- [Online tools](#online-tools)
- [Contribute](#contribute-and-contributor)
## Weapons
### Subdomain Enumeration
### Fetch path and host
### Port scanner
### Web Crawler
### Web Vulnerability Scanner
### XSS
### CSRF
### Path traversal / Directory traversal / LFI
### Command Injection
### SQL Injection
### NoSQL Injection
### SSRF
### CORS Misconfiguration
### WebSocket
### Cloud Security
### Utility for hackers
### Online tools
## Contribute and Contributor
### Usage of weapon-md
```
./weapon-md
Usage of ./weapon-md:
-isFirst
if you add new type, it use
-url string
github / gitlab / bitbucket url
```
### Three Procedures for the Contribute
- First, generate markdown code using `weapon-md`
```
$ ./weapon-md -url https://github.com/hahwul/xspear
| [xspear](https://github.com/hahwul/xspear) | Powerfull XSS Scanning and Parameter analysis tool&gem | ![](https://img.shields.io/github/stars/hahwul/xspear) | ![](https://img.shields.io/github/languages/top/hahwul/xspear) | ![](https://img.shields.io/github/repo-size/hahwul/xspear)
![](https://img.shields.io/github/license/hahwul/xspear)
![](https://img.shields.io/github/forks/hahwul/xspear)
![](https://img.shields.io/github/watchers/hahwul/xspear) |
```
- Second, Give me PR or Add issue with output code
- Third, There's no third.