mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2025-03-07 06:15:57 -05:00
21 lines
5.0 KiB
Markdown
21 lines
5.0 KiB
Markdown
|
||
## Tools Made of Ruby
|
||
|
||
| Type | Name | Description | Star | Tags | Badges |
|
||
| --- | --- | --- | --- | --- | --- |
|
||
|Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|
|
||
|Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Ruby.md)|
|
||
|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|||[](/categorize/langs/Ruby.md)|
|
||
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |||[](/categorize/langs/Ruby.md)|
|
||
|Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)||[`broken-link`](/categorize/tags/broken-link.md)|[](/categorize/langs/Ruby.md)|
|
||
|Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |||[](/categorize/langs/Ruby.md)|
|
||
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |||[](/categorize/langs/Ruby.md)|
|
||
|Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Ruby.md)|
|
||
|Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Ruby.md)|
|
||
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Ruby.md)|
|
||
|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |||[](/categorize/langs/Ruby.md)|
|
||
|Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Ruby.md)|
|
||
|Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|
|
||
|Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|||[](/categorize/langs/Ruby.md)|
|
||
|