mirror of
https://github.com/hahwul/WebHackersWeapons.git
synced 2024-12-18 20:24:27 -05:00
20 lines
4.4 KiB
Markdown
20 lines
4.4 KiB
Markdown
|
||
## The Ruby based tools
|
||
|
||
| Type | Name | Description | Star | Tags | Badges |
|
||
| --- | --- | --- | --- | --- | --- |
|
||
|Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework|![](https://img.shields.io/github/stars/rapid7/metasploit-framework?label=%20)|[`pentest`](/tags/pentest.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.|![](https://img.shields.io/github/stars/bbtfr/evil-proxy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|![](https://img.shields.io/github/stars/EasyRecon/Hunt3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|[`xss`](/tags/xss.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)|![](https://img.shields.io/github/stars/hahwul/deadfinder?label=%20)|[`broken-link`](/tags/broken-link.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|[`xxe`](/tags/xxe.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project|![](https://img.shields.io/github/stars/beefproject/beef?label=%20)|[`xss`](/tags/xss.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.|![](https://img.shields.io/github/stars/Sliim/pentest-env?label=%20)|[`pentest`](/tags/pentest.md)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|![](https://img.shields.io/github/stars/OWASP/glue?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)[![Ruby](./images/ruby.png)](/langs/Ruby.md)|
|
||
|