mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-08 06:56:06 -05:00
20 lines
4.4 KiB
Markdown
20 lines
4.4 KiB
Markdown
|
||
## The Ruby based tools
|
||
|
||
| Type | Name | Description | Star | Tags | Badges |
|
||
| --- | --- | --- | --- | --- | --- |
|
||
|Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework||[`pentest`](/tags/pentest.md)|[](/langs/Ruby.md)|
|
||
|Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.|||[](/langs/Ruby.md)|
|
||
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |||[](/langs/Ruby.md)|
|
||
|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|||[](/langs/Ruby.md)|
|
||
|Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |||[](/langs/Ruby.md)|
|
||
|Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem ||[`xss`](/tags/xss.md)|[](/langs/Ruby.md)|
|
||
|Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)||[`broken-link`](/tags/broken-link.md)|[](/langs/Ruby.md)|
|
||
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |||[](/langs/Ruby.md)|
|
||
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/tags/xxe.md)|[](/langs/Ruby.md)|
|
||
|Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project||[`xss`](/tags/xss.md)|[](/langs/Ruby.md)|
|
||
|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |||[](/langs/Ruby.md)|
|
||
|Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.||[`pentest`](/tags/pentest.md)|[](/langs/Ruby.md)|
|
||
|Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|||[](/langs/Ruby.md)|
|
||
|