mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-10-01 01:25:58 -04:00
82 lines
6.2 KiB
JSON
82 lines
6.2 KiB
JSON
{
|
|
"Autorize": {
|
|
"Data": "| Burp/ANALYSIS | [Autorize](https://github.com/Quitten/Autorize) | Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests | ![](https://img.shields.io/github/stars/Quitten/Autorize) | ![](https://img.shields.io/github/languages/top/Quitten/Autorize) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"BurpSuiteHTTPSmuggler": {
|
|
"Type": "Burp",
|
|
"Data": "| Burp/BYPASS | [BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler) | A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteHTTPSmuggler) |",
|
|
"Method": "BYPASS"
|
|
},
|
|
"BurpSuiteLoggerPlusPlus": {
|
|
"Data": "| Burp/HISTORY | [BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus) | Burp Suite Logger++ | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteLoggerPlusPlus) |",
|
|
"Method": "HISTORY",
|
|
"Type": "Burp"
|
|
},
|
|
"HUNT": {
|
|
"Data": "| All/ANALYSIS | [HUNT](https://github.com/bugcrowd/HUNT) | Data Driven web hacking Manual testing | ![](https://img.shields.io/github/stars/bugcrowd/HUNT) | ![](https://img.shields.io/github/languages/top/bugcrowd/HUNT) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "All"
|
|
},
|
|
"burp-exporter": {
|
|
"Data": "| Burp/CODE | [burp-exporter](https://github.com/artssec/burp-exporter) | Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions. | ![](https://img.shields.io/github/stars/artssec/burp-exporter) | ![](https://img.shields.io/github/languages/top/artssec/burp-exporter) |",
|
|
"Method": "CODE",
|
|
"Type": "Burp"
|
|
},
|
|
"burp-retire-js": {
|
|
"Data": "| All/ANALYSIS | [burp-retire-js](https://github.com/h3xstream/burp-retire-js) | Burp/ZAP/Maven extension that integrate Retire.js repository to find vulnerable Javascript libraries. | ![](https://img.shields.io/github/stars/h3xstream/burp-retire-js) | ![](https://img.shields.io/github/languages/top/h3xstream/burp-retire-js) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "All"
|
|
},
|
|
"burp-send-to": {
|
|
"Data": "| Burp/ANALYSIS | [burp-send-to](https://github.com/bytebutcher/burp-send-to) | Adds a customizable \"Send to...\"-context-menu to your BurpSuite. | ![](https://img.shields.io/github/stars/bytebutcher/burp-send-to) | ![](https://img.shields.io/github/languages/top/bytebutcher/burp-send-to) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"collaborator-everywhere": {
|
|
"Data": "| Burp/ANALYSIS | [collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere) | A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by causing pingbacks to Burp Collaborator | ![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere) | ![](https://img.shields.io/github/languages/top/PortSwigger/collaborator-everywhere) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"csp-auditor": {
|
|
"Data": "| All/ANALYSIS | [csp-auditor](https://github.com/GoSecure/csp-auditor) | Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website | ![](https://img.shields.io/github/stars/GoSecure/csp-auditor) | ![](https://img.shields.io/github/languages/top/GoSecure/csp-auditor) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "All"
|
|
},
|
|
"http-request-smuggler": {
|
|
"Data": "| Burp/ANALYSIS | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | Testing HTTP Request Smuggling and Desync Attack | ![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler) | ![](https://img.shields.io/github/languages/top/PortSwigger/http-request-smuggler) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"http-script-generator": {
|
|
"Data": "| All/POC | [http-script-generator](https://github.com/h3xstream/http-script-generator) | ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks) | ![](https://img.shields.io/github/stars/h3xstream/http-script-generator) | ![](https://img.shields.io/github/languages/top/h3xstream/http-script-generator) |",
|
|
"Method": "POC",
|
|
"Type": "All"
|
|
},
|
|
"param-miner": {
|
|
"Data": "| Burp/ANALYSIS | [param-miner](https://github.com/PortSwigger/param-miner) | Parameter mining on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/param-miner) | ![](https://img.shields.io/github/languages/top/PortSwigger/param-miner) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"reflected-parameters": {
|
|
"Data": "| Burp/ANALYSIS | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters) | ![](https://img.shields.io/github/languages/top/PortSwigger/reflected-parameters) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"taborator": {
|
|
"Data": "| Burp/ANALYSIS | [taborator](https://github.com/hackvertor/taborator) | A Burp extension to show the Collaborator client in a tab | ![](https://img.shields.io/github/stars/hackvertor/taborator) | ![](https://img.shields.io/github/languages/top/hackvertor/taborator) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"turbo-intruder": {
|
|
"Data": "| Burp/ANALYSIS | [turbo-intruder](https://github.com/PortSwigger/turbo-intruder) | Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. | ![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder) | ![](https://img.shields.io/github/languages/top/PortSwigger/turbo-intruder) |",
|
|
"Method": "ANALYSIS",
|
|
"Type": "Burp"
|
|
},
|
|
"zap-hud": {
|
|
"Data": "| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) | ![](https://img.shields.io/github/stars/zaproxy/zap-hud) | ![](https://img.shields.io/github/languages/top/zaproxy/zap-hud) |",
|
|
"Method": "INTERFACE",
|
|
"Type": "ZAP"
|
|
}
|
|
} |