mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-02-23 16:40:05 -05:00
23 lines
5.6 KiB
Markdown
23 lines
5.6 KiB
Markdown
|
|
## The Shell based tools
|
|
|
|
| Type | Name | Description | Star | Tags | Badges |
|
|
| --- | --- | --- | --- | --- | --- |
|
|
|Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ||[`infra`](/tags/infra.md)|[](/langs/Shell.md)|
|
|
|Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |||[](/langs/Shell.md)|
|
|
|Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |||[](/langs/Shell.md)|
|
|
|Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |||[](/langs/Shell.md)|
|
|
|Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|||[](/langs/Shell.md)|
|
|
|Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |||[](/langs/Shell.md)|
|
|
|Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|||[](/langs/Shell.md)|
|
|
|Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |||[](/langs/Shell.md)|
|
|
|Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. ||[`xss`](/tags/xss.md)|[](/langs/Shell.md)|
|
|
|Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |||[](/langs/Shell.md)|
|
|
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|||[](/langs/Shell.md)|
|
|
|Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |||[](/langs/Shell.md)|
|
|
|Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|||[](/langs/Shell.md)|
|
|
|Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |||[](/langs/Shell.md)|
|
|
|Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|||[](/langs/Shell.md)|
|
|
|Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) ||[`report`](/tags/report.md)|[](/langs/Shell.md)|
|
|
|