diff --git a/.github/ISSUE_TEMPLATE/add-tool-and-change-information.md b/.github/ISSUE_TEMPLATE/add-tool-and-change-information.md deleted file mode 100644 index b5d8baf..0000000 --- a/.github/ISSUE_TEMPLATE/add-tool-and-change-information.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -name: Add tool and Change information -about: Describe this issue template's purpose here. -title: '' -labels: '' -assignees: '' - ---- - - diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md deleted file mode 100644 index c8f1798..0000000 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -name: Bug report -about: Create a report to help us improve -title: '' -labels: bug -assignees: '' - ---- - -**Describe the bug** -A clear and concise description of what the bug is. - -**To Reproduce** -Steps to reproduce the behavior: -1. Go to '...' -2. Click on '....' -3. Scroll down to '....' -4. See error - -**Env** -e.g OS, Version... etc... diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md deleted file mode 100644 index 4b2e2cb..0000000 --- a/.github/ISSUE_TEMPLATE/feature_request.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -name: Feature request -about: Suggest an idea for this project -title: '' -labels: feature request -assignees: '' - ---- - - diff --git a/.github/ISSUE_TEMPLATE/question.md b/.github/ISSUE_TEMPLATE/question.md deleted file mode 100644 index 6372895..0000000 --- a/.github/ISSUE_TEMPLATE/question.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -name: Question -about: If you have any questions, ask. -title: '' -labels: question -assignees: '' - ---- - - diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml deleted file mode 100644 index 20b5e3d..0000000 --- a/.github/workflows/codeql-analysis.yml +++ /dev/null @@ -1,67 +0,0 @@ -# For most projects, this workflow file will not need changing; you simply need -# to commit it to your repository. -# -# You may wish to alter this file to override the set of languages analyzed, -# or to provide custom queries or build logic. -# -# ******** NOTE ******** -# We have attempted to detect the languages in your repository. Please check -# the `language` matrix defined below to confirm you have the correct set of -# supported CodeQL languages. -# -name: "CodeQL" - -on: - push: - branches: [ main ] - pull_request: - # The branches below must be a subset of the branches above - branches: [ main ] - schedule: - - cron: '29 14 * * 4' - -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - - strategy: - fail-fast: false - matrix: - language: [ 'go' ] - # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] - # Learn more: - # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed - - steps: - - name: Checkout repository - uses: actions/checkout@v2 - - # Initializes the CodeQL tools for scanning. - - name: Initialize CodeQL - uses: github/codeql-action/init@v1 - with: - languages: ${{ matrix.language }} - # If you wish to specify custom queries, you can do so here or in a config file. - # By default, queries listed here will override any specified in a config file. - # Prefix the list here with "+" to use these queries and those in the config file. - # queries: ./path/to/local/query, your-org/your-repo/queries@main - - # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). - # If this step fails, then you should remove it and run the build manually (see below) - - name: Autobuild - uses: github/codeql-action/autobuild@v1 - - # ℹ️ Command-line programs to run using the OS shell. - # 📚 https://git.io/JvXDl - - # ✏️ If the Autobuild fails above, remove it and uncomment the following three lines - # and modify them (or add more) to build your code if your project - # uses a compiled language - - #- run: | - # make bootstrap - # make release - - - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v1 diff --git a/.github/workflows/contributors.yml b/.github/workflows/contributors.yml index 5cf79aa..d30497b 100644 --- a/.github/workflows/contributors.yml +++ b/.github/workflows/contributors.yml @@ -19,3 +19,4 @@ jobs: with: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} round: true + svgPath: ./images/CONTRIBUTORS.svg diff --git a/.github/workflows/go.yml b/.github/workflows/go.yml deleted file mode 100644 index 89e42ee..0000000 --- a/.github/workflows/go.yml +++ /dev/null @@ -1,33 +0,0 @@ -name: Build - -on: - push: - branches: [ main ] - pull_request: - branches: [ main ] - -jobs: - - build: - name: Build - runs-on: ubuntu-latest - steps: - - - name: Set up Go 1.x - uses: actions/setup-go@v2 - with: - go-version: ^1.13 - - - name: Check out code into the Go module directory - uses: actions/checkout@v2 - - - name: Get dependencies - run: | - go get -v -t -d ./... - if [ -f Gopkg.toml ]; then - curl https://raw.githubusercontent.com/golang/dep/master/install.sh | sh - dep ensure - fi - - - name: Build - run: make contribute diff --git a/.gitignore b/.gitignore deleted file mode 100644 index 02c248d..0000000 --- a/.gitignore +++ /dev/null @@ -1,2 +0,0 @@ -add-tool -distribute-readme \ No newline at end of file diff --git a/Bookmarklets/README.md b/Bookmarklets/README.md deleted file mode 100644 index 16f9b11..0000000 --- a/Bookmarklets/README.md +++ /dev/null @@ -1,13 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Bookmarklets collection - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Bookmarklets](#bookmarklets) -- [Contribute](#contribute-and-contributor) - -## Bookmarklets -| Type | Name | Description | Popularity | Language | -| ---------- | :---------- | :----------: | :----------: | :----------: | -## Contribute and Contributor -Add readme diff --git a/Bookmarklets/data.json b/Bookmarklets/data.json deleted file mode 100644 index 0db3279..0000000 --- a/Bookmarklets/data.json +++ /dev/null @@ -1,3 +0,0 @@ -{ - -} diff --git a/Bookmarklets/template/foot.md b/Bookmarklets/template/foot.md deleted file mode 100644 index be723a8..0000000 --- a/Bookmarklets/template/foot.md +++ /dev/null @@ -1,2 +0,0 @@ -## Contribute and Contributor -Add readme diff --git a/Bookmarklets/template/head.md b/Bookmarklets/template/head.md deleted file mode 100644 index 99af160..0000000 --- a/Bookmarklets/template/head.md +++ /dev/null @@ -1,9 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Bookmarklets collection - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Bookmarklets](#bookmarklets) -- [Contribute](#contribute-and-contributor) - -## Bookmarklets diff --git a/Bookmarklets/type.lst b/Bookmarklets/type.lst deleted file mode 100644 index 39cdd0d..0000000 --- a/Bookmarklets/type.lst +++ /dev/null @@ -1 +0,0 @@ -- diff --git a/Browser Extensions/README.md b/Browser Extensions/README.md deleted file mode 100644 index 7ce7db7..0000000 --- a/Browser Extensions/README.md +++ /dev/null @@ -1,70 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Extensions collection of Browser Extensions - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Browser Extensions](#extensions) -- [Contribute](#contribute-and-contributor) - -## Extensions -| Type | Name | Description | Popularity | Language | -| ---------- | :---------- | :----------: | :----------: | :----------: | -| Chrome/Cookie | [Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie) | EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies | ![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie) | ![](https://img.shields.io/github/languages/top/ETCExtensions/Edit-This-Cookie) | -| Chrome/UA | [User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae) | quick and easy way to switch between user-agents.|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Chrome/postMessage | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) | -| Firefox and Chrome/DarkMode | [Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh) | Dark mode to any site|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Firefox and Chrome/Exposed | [DotGit](https://github.com/davtur19/DotGit) | An extension for checking if .git is exposed in visited websites | ![](https://img.shields.io/github/stars/davtur19/DotGit) | ![](https://img.shields.io/github/languages/top/davtur19/DotGit) | -| Firefox and Chrome/JWT | [jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io) | JWT En/Decode and Verify | ![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io) | ![](https://img.shields.io/github/languages/top/jsonwebtoken/jsonwebtoken.github.io) | -| Firefox and Chrome/Proxy | [MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/) | Proxy Switch in Firefox and Chrome|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Firefox and Chrome/Tools | [Hack-Tools](https://github.com/LasCC/Hack-Tools) | The all-in-one Red Team extension for Web Pentester 🛠 | ![](https://img.shields.io/github/stars/LasCC/Hack-Tools) | ![](https://img.shields.io/github/languages/top/LasCC/Hack-Tools) | -| Firefox/Cache | [clear-cache](https://github.com/TenSoja/clear-cache) | Add-on to clear browser cache with a single click or via the F9 key. | ![](https://img.shields.io/github/stars/TenSoja/clear-cache) | ![](https://img.shields.io/github/languages/top/TenSoja/clear-cache) | -| Firefox/Cookie | [cookie-quick-manager](https://github.com/ysard/cookie-quick-manager) | An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox. | ![](https://img.shields.io/github/stars/ysard/cookie-quick-manager) | ![](https://img.shields.io/github/languages/top/ysard/cookie-quick-manager) | -| Firefox/DomXSS | [eval_villain](https://github.com/swoops/eval_villain) | A Firefox Web Extension to improve the discovery of DOM XSS. | ![](https://img.shields.io/github/stars/swoops/eval_villain) | ![](https://img.shields.io/github/languages/top/swoops/eval_villain) | -| Safari/DarkMode | [Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180) | Dark mode to any site|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Safari/HISTORY | [Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422) | History of website|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -## Contribute and Contributor -### Usage of add-tool -``` -./add-tool -Usage of ./add-tool: - -isFirst - if you add new type, it use - -url string - any url -``` - -### Three Procedures for the Contribute -- First, your tool append `data.json` using `add-tool -``` -$ ./add-tool -url https://github.com/sqlmapproject/sqlmap -Successfully Opened type.lst -[0] Army-Knife -[1] Discovery -[2] Fetch -[3] Scanner -[4] Utility -[+] What is type? -3 -Scanner -[+] What is method(e.g XSS, WVS, SSL, ETC..)? -SQL -Successfully Opened data.json - -``` -- Second, Give me PR or Add issue with data.json
-- Third, There's no third. - -### Add Burp Suite or ZAP Extensions -in `WebHackersWeapons/Burp and ZAP Extensions` directory -``` -$ ../add-tool -url https://github.com/nccgroup/BurpSuiteLoggerPlusPlus -``` - -### Distribute to Burp Suite or ZAP Extensions -``` -$ ../distribute-readme -=> show new README file in Burp Suite or ZAP Extensions -``` - -### Add/Distribute common tools -https://github.com/hahwul/WebHackersWeapons#contribute-and-contributor diff --git a/Browser Extensions/data.json b/Browser Extensions/data.json deleted file mode 100644 index af0c640..0000000 --- a/Browser Extensions/data.json +++ /dev/null @@ -1,210 +0,0 @@ -{ - "Dark Reader": { - "Data": "| Firefox and Chrome/DarkMode | [Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh) | Dark mode to any site|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "Dark mode to any site", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DarkMode", - "Type": "Firefox and Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Dark Reader for Safari": { - "Data": "| Safari/DarkMode | [Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180) | Dark mode to any site|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "Dark mode to any site", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DarkMode", - "Type": "Safari", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DotGit": { - "Data": "| Firefox and Chrome/Exposed | [DotGit](https://github.com/davtur19/DotGit) | An extension for checking if .git is exposed in visited websites | ![](https://img.shields.io/github/stars/davtur19/DotGit) | ![](https://img.shields.io/github/languages/top/davtur19/DotGit) |", - "Description": "An extension for checking if .git is exposed in visited websites", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Exposed", - "Type": "Firefox and Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Edit-This-Cookie": { - "Data": "| Chrome/Cookie | [Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie) | EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies | ![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie) | ![](https://img.shields.io/github/languages/top/ETCExtensions/Edit-This-Cookie) |", - "Description": "EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Cookie", - "Type": "Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Hack-Tools": { - "Data": "| Firefox and Chrome/Tools | [Hack-Tools](https://github.com/LasCC/Hack-Tools) | The all-in-one Red Team extension for Web Pentester 🛠 | ![](https://img.shields.io/github/stars/LasCC/Hack-Tools) | ![](https://img.shields.io/github/languages/top/LasCC/Hack-Tools) |", - "Description": "The all-in-one Red Team extension for Web Pentester 🛠", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Tools", - "Type": "Firefox and Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "MM3 ProxySwitch": { - "Data": "| Firefox and Chrome/Proxy | [MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/) | Proxy Switch in Firefox and Chrome|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "Proxy Switch in Firefox and Chrome", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Proxy", - "Type": "Firefox and Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "User-Agent Switcher": { - "Data": "| Chrome/UA | [User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae) | quick and easy way to switch between user-agents.|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "quick and easy way to switch between user-agents.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "UA", - "Type": "Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Wayback Machine": { - "Data": "| Safari/HISTORY | [Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422) | History of website|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "History of website", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HISTORY", - "Type": "Safari", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "clear-cache": { - "Data": "| Firefox/Cache | [clear-cache](https://github.com/TenSoja/clear-cache) | Add-on to clear browser cache with a single click or via the F9 key. | ![](https://img.shields.io/github/stars/TenSoja/clear-cache) | ![](https://img.shields.io/github/languages/top/TenSoja/clear-cache) |", - "Description": "Add-on to clear browser cache with a single click or via the F9 key.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Cache", - "Type": "Firefox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "cookie-quick-manager": { - "Data": "| Firefox/Cookie | [cookie-quick-manager](https://github.com/ysard/cookie-quick-manager) | An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox. | ![](https://img.shields.io/github/stars/ysard/cookie-quick-manager) | ![](https://img.shields.io/github/languages/top/ysard/cookie-quick-manager) |", - "Description": "An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Cookie", - "Type": "Firefox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "eval_villain": { - "Data": "| Firefox/DomXSS | [eval_villain](https://github.com/swoops/eval_villain) | A Firefox Web Extension to improve the discovery of DOM XSS. | ![](https://img.shields.io/github/stars/swoops/eval_villain) | ![](https://img.shields.io/github/languages/top/swoops/eval_villain) |", - "Description": "A Firefox Web Extension to improve the discovery of DOM XSS.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DomXSS", - "Type": "Firefox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "jsonwebtoken.github.io": { - "Type": "Firefox and Chrome", - "Data": "| Firefox and Chrome/JWT | [jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io) | JWT En/Decode and Verify | ![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io) | ![](https://img.shields.io/github/languages/top/jsonwebtoken/jsonwebtoken.github.io) |", - "Method": "JWT", - "Description": "JWT En/Decode and Verify", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "postMessage-tracker": { - "Data": "| Chrome/postMessage | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) |", - "Description": "A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "postMessage", - "Type": "Chrome", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - } -} \ No newline at end of file diff --git a/Browser Extensions/template/foot.md b/Browser Extensions/template/foot.md deleted file mode 100644 index 9d20f98..0000000 --- a/Browser Extensions/template/foot.md +++ /dev/null @@ -1,46 +0,0 @@ -## Contribute and Contributor -### Usage of add-tool -``` -./add-tool -Usage of ./add-tool: - -isFirst - if you add new type, it use - -url string - any url -``` - -### Three Procedures for the Contribute -- First, your tool append `data.json` using `add-tool -``` -$ ./add-tool -url https://github.com/sqlmapproject/sqlmap -Successfully Opened type.lst -[0] Army-Knife -[1] Discovery -[2] Fetch -[3] Scanner -[4] Utility -[+] What is type? -3 -Scanner -[+] What is method(e.g XSS, WVS, SSL, ETC..)? -SQL -Successfully Opened data.json - -``` -- Second, Give me PR or Add issue with data.json
-- Third, There's no third. - -### Add Burp Suite or ZAP Extensions -in `WebHackersWeapons/Burp and ZAP Extensions` directory -``` -$ ../add-tool -url https://github.com/nccgroup/BurpSuiteLoggerPlusPlus -``` - -### Distribute to Burp Suite or ZAP Extensions -``` -$ ../distribute-readme -=> show new README file in Burp Suite or ZAP Extensions -``` - -### Add/Distribute common tools -https://github.com/hahwul/WebHackersWeapons#contribute-and-contributor diff --git a/Browser Extensions/template/head.md b/Browser Extensions/template/head.md deleted file mode 100644 index db52724..0000000 --- a/Browser Extensions/template/head.md +++ /dev/null @@ -1,9 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Extensions collection of Browser Extensions - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Browser Extensions](#extensions) -- [Contribute](#contribute-and-contributor) - -## Extensions diff --git a/Browser Extensions/type.lst b/Browser Extensions/type.lst deleted file mode 100644 index 96d8ad3..0000000 --- a/Browser Extensions/type.lst +++ /dev/null @@ -1,5 +0,0 @@ -Firefox and Chrome -Firefox -Chrome -Safari -Edge diff --git a/Burp and ZAP Extensions/README.md b/Burp and ZAP Extensions/README.md deleted file mode 100644 index 1a183dd..0000000 --- a/Burp and ZAP Extensions/README.md +++ /dev/null @@ -1,90 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Extensions collection of Burp suite and ZAP - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Cool Extensions](#cool-extensions) -- [Contribute](#contribute-and-contributor) - -## Cool Extensions -| Type | Name | Description | Popularity | Language | -| ---------- | :---------- | :----------: | :----------: | :----------: | -| All/CODE | [http-script-generator](https://github.com/h3xstream/http-script-generator) | ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks) | ![](https://img.shields.io/github/stars/h3xstream/http-script-generator) | ![](https://img.shields.io/github/languages/top/h3xstream/http-script-generator) | -| All/PASV | [HUNT](https://github.com/bugcrowd/HUNT) | Data Driven web hacking Manual testing | ![](https://img.shields.io/github/stars/bugcrowd/HUNT) | ![](https://img.shields.io/github/languages/top/bugcrowd/HUNT) | -| All/PASV | [burp-retire-js](https://github.com/h3xstream/burp-retire-js) | Burp/ZAP/Maven extension that integrate Retire.js repository to find vulnerable Javascript libraries. | ![](https://img.shields.io/github/stars/h3xstream/burp-retire-js) | ![](https://img.shields.io/github/languages/top/h3xstream/burp-retire-js) | -| All/PASV | [csp-auditor](https://github.com/GoSecure/csp-auditor) | Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website | ![](https://img.shields.io/github/stars/GoSecure/csp-auditor) | ![](https://img.shields.io/github/languages/top/GoSecure/csp-auditor) | -| Burp/ACTIVE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | Testing HTTP Request Smuggling and Desync Attack | ![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler) | ![](https://img.shields.io/github/languages/top/PortSwigger/http-request-smuggler) | -| Burp/ACTIVE | [param-miner](https://github.com/PortSwigger/param-miner) | Parameter mining on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/param-miner) | ![](https://img.shields.io/github/languages/top/PortSwigger/param-miner) | -| Burp/ACTIVE | [turbo-intruder](https://github.com/PortSwigger/turbo-intruder) | Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. | ![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder) | ![](https://img.shields.io/github/languages/top/PortSwigger/turbo-intruder) | -| Burp/AUTH | [AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix) | AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services. | ![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix) | ![](https://img.shields.io/github/languages/top/SecurityInnovation/AuthMatrix) | -| Burp/BYPASS | [BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler) | A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteHTTPSmuggler) | -| Burp/CALLBACK | [taborator](https://github.com/hackvertor/taborator) | A Burp extension to show the Collaborator client in a tab | ![](https://img.shields.io/github/stars/hackvertor/taborator) | ![](https://img.shields.io/github/languages/top/hackvertor/taborator) | -| Burp/CODE | [burp-exporter](https://github.com/artssec/burp-exporter) | Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions. | ![](https://img.shields.io/github/stars/artssec/burp-exporter) | ![](https://img.shields.io/github/languages/top/artssec/burp-exporter) | -| Burp/EXPORT | [burp-send-to](https://github.com/bytebutcher/burp-send-to) | Adds a customizable "Send to..."-context-menu to your BurpSuite. | ![](https://img.shields.io/github/stars/bytebutcher/burp-send-to) | ![](https://img.shields.io/github/languages/top/bytebutcher/burp-send-to) | -| Burp/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing | ![](https://img.shields.io/github/stars/doyensec/inql) | ![](https://img.shields.io/github/languages/top/doyensec/inql) | -| Burp/HISTORY | [BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus) | Burp Suite Logger++ | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteLoggerPlusPlus) | -| Burp/PASV | [Autorize](https://github.com/Quitten/Autorize) | Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests | ![](https://img.shields.io/github/stars/Quitten/Autorize) | ![](https://img.shields.io/github/languages/top/Quitten/Autorize) | -| Burp/PASV | [BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder) | Burp Extension for a passive scanning JS files for endpoint links. | ![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder) | ![](https://img.shields.io/github/languages/top/InitRoot/BurpJSLinkFinder) | -| Burp/PASV | [BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder) | Burp Suite extension to discover apikeys/accesstokens and sensitive data from HTTP response. | ![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder) | ![](https://img.shields.io/github/languages/top/m4ll0k/BurpSuite-Secret_Finder) | -| Burp/PASV | [auto-repeater](https://github.com/PortSwigger/auto-repeater) | Automated HTTP Request Repeating With Burp Suite | ![](https://img.shields.io/github/stars/PortSwigger/auto-repeater) | ![](https://img.shields.io/github/languages/top/PortSwigger/auto-repeater) | -| Burp/PASV | [collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere) | A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by causing pingbacks to Burp Collaborator | ![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere) | ![](https://img.shields.io/github/languages/top/PortSwigger/collaborator-everywhere) | -| Burp/PASV | [femida](https://github.com/wish-i-was/femida) | Automated blind-xss search for Burp Suite | ![](https://img.shields.io/github/stars/wish-i-was/femida) | ![](https://img.shields.io/github/languages/top/wish-i-was/femida) | -| Burp/PASV | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters) | ![](https://img.shields.io/github/languages/top/PortSwigger/reflected-parameters) | -| Burp/PIPE | [burp-piper](https://github.com/silentsignal/burp-piper) | Piper Burp Suite Extender plugin | ![](https://img.shields.io/github/stars/silentsignal/burp-piper) | ![](https://img.shields.io/github/languages/top/silentsignal/burp-piper) | -| Burp/REPEAT | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. | ![](https://img.shields.io/github/stars/1N3/IntruderPayloads) | ![](https://img.shields.io/github/languages/top/1N3/IntruderPayloads) | -| Burp/REPEAT | [Stepper](https://github.com/CoreyD97/Stepper) | A natural evolution of Burp Suite's Repeater tool | ![](https://img.shields.io/github/stars/CoreyD97/Stepper) | ![](https://img.shields.io/github/languages/top/CoreyD97/Stepper) | -| Burp/SCAN | [BurpBounty](https://github.com/wagiro/BurpBounty) | Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface. | ![](https://img.shields.io/github/stars/wagiro/BurpBounty) | ![](https://img.shields.io/github/languages/top/wagiro/BurpBounty) | -| Burp/THEME | [BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer) | Because just a dark theme wasn't enough! | ![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer) | ![](https://img.shields.io/github/languages/top/CoreyD97/BurpCustomizer) | -| Burp/UTIL | [knife](https://github.com/bit4woo/knife) | A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅 | ![](https://img.shields.io/github/stars/bit4woo/knife) | ![](https://img.shields.io/github/languages/top/bit4woo/knife) | -| Burp/UTIL | [safecopy](https://github.com/yashrs/safecopy) | Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be added in the future. | ![](https://img.shields.io/github/stars/yashrs/safecopy) | ![](https://img.shields.io/github/languages/top/yashrs/safecopy) | -| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) | ![](https://img.shields.io/github/stars/zaproxy/zap-hud) | ![](https://img.shields.io/github/languages/top/zaproxy/zap-hud) | -| ZAP/JWT | [owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon) | OWASP ZAP addon for finding vulnerabilities in JWT Implementations | ![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon) | ![](https://img.shields.io/github/languages/top/SasanLabs/owasp-zap-jwt-addon) | -| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters | ![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap) | ![](https://img.shields.io/github/languages/top/secdec/attack-surface-detector-zap) | -| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities | ![](https://img.shields.io/github/stars/TypeError/reflect) | ![](https://img.shields.io/github/languages/top/TypeError/reflect) | -| ZAP/SCRIPT | [community-scripts](https://github.com/zaproxy/community-scripts) | A collection of ZAP scripts provided by the community - pull requests very welcome! | ![](https://img.shields.io/github/stars/zaproxy/community-scripts) | ![](https://img.shields.io/github/languages/top/zaproxy/community-scripts) | -## Contribute and Contributor -### Usage of add-tool -``` -./add-tool -Usage of ./add-tool: - -isFirst - if you add new type, it use - -url string - any url -``` - -### Three Procedures for the Contribute -- First, your tool append `data.json` using `add-tool -``` -$ ./add-tool -url https://github.com/sqlmapproject/sqlmap -Successfully Opened type.lst -[0] Army-Knife -[1] Discovery -[2] Fetch -[3] Scanner -[4] Utility -[+] What is type? -3 -Scanner -[+] What is method(e.g XSS, WVS, SSL, ETC..)? -SQL -Successfully Opened data.json - -``` -- Second, Give me PR or Add issue with data.json
-- Third, There's no third. - -### Add Burp Suite or ZAP Extensions -in `WebHackersWeapons/Burp and ZAP Extensions` directory -``` -$ ../add-tool -url https://github.com/nccgroup/BurpSuiteLoggerPlusPlus -``` - -### Distribute to Burp Suite or ZAP Extensions -``` -$ ../distribute-readme -=> show new README file in Burp Suite or ZAP Extensions -``` - -### Add/Distribute common tools -https://github.com/hahwul/WebHackersWeapons#contribute-and-contributor diff --git a/Burp and ZAP Extensions/data.json b/Burp and ZAP Extensions/data.json deleted file mode 100644 index cd7eb60..0000000 --- a/Burp and ZAP Extensions/data.json +++ /dev/null @@ -1,189 +0,0 @@ -{ - "AuthMatrix": { - "Data": "| Burp/AUTH | [AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix) | AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services. | ![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix) | ![](https://img.shields.io/github/languages/top/SecurityInnovation/AuthMatrix) |", - "Method": "AUTH", - "Type": "Burp" - }, - "Autorize": { - "Data": "| Burp/PASV | [Autorize](https://github.com/Quitten/Autorize) | Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests | ![](https://img.shields.io/github/stars/Quitten/Autorize) | ![](https://img.shields.io/github/languages/top/Quitten/Autorize) |", - "Method": "PASV", - "Type": "Burp" - }, - "BurpBounty": { - "Data": "| Burp/SCAN | [BurpBounty](https://github.com/wagiro/BurpBounty) | Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface. | ![](https://img.shields.io/github/stars/wagiro/BurpBounty) | ![](https://img.shields.io/github/languages/top/wagiro/BurpBounty) |", - "Method": "SCAN", - "Type": "Burp" - }, - "BurpCustomizer": { - "Data": "| Burp/THEME | [BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer) | Because just a dark theme wasn't enough! | ![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer) | ![](https://img.shields.io/github/languages/top/CoreyD97/BurpCustomizer) |", - "Description": "Because just a dark theme wasn't enough!", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "THEME", - "Type": "Burp", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "BurpJSLinkFinder": { - "Data": "| Burp/PASV | [BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder) | Burp Extension for a passive scanning JS files for endpoint links. | ![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder) | ![](https://img.shields.io/github/languages/top/InitRoot/BurpJSLinkFinder) |", - "Method": "PASV", - "Type": "Burp" - }, - "BurpSuite-Secret_Finder": { - "Data": "| Burp/PASV | [BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder) | Burp Suite extension to discover apikeys/accesstokens and sensitive data from HTTP response. | ![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder) | ![](https://img.shields.io/github/languages/top/m4ll0k/BurpSuite-Secret_Finder) |", - "Method": "PASV", - "Type": "Burp" - }, - "BurpSuiteHTTPSmuggler": { - "Data": "| Burp/BYPASS | [BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler) | A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteHTTPSmuggler) |", - "Method": "BYPASS", - "Type": "Burp" - }, - "BurpSuiteLoggerPlusPlus": { - "Data": "| Burp/HISTORY | [BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus) | Burp Suite Logger++ | ![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus) | ![](https://img.shields.io/github/languages/top/nccgroup/BurpSuiteLoggerPlusPlus) |", - "Method": "HISTORY", - "Type": "Burp" - }, - "HUNT": { - "Data": "| All/PASV | [HUNT](https://github.com/bugcrowd/HUNT) | Data Driven web hacking Manual testing | ![](https://img.shields.io/github/stars/bugcrowd/HUNT) | ![](https://img.shields.io/github/languages/top/bugcrowd/HUNT) |", - "Method": "PASV", - "Type": "All" - }, - "IntruderPayloads": { - "Data": "| Burp/REPEAT | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. | ![](https://img.shields.io/github/stars/1N3/IntruderPayloads) | ![](https://img.shields.io/github/languages/top/1N3/IntruderPayloads) |", - "Method": "REPEAT", - "Type": "Burp" - }, - "Stepper": { - "Data": "| Burp/REPEAT | [Stepper](https://github.com/CoreyD97/Stepper) | A natural evolution of Burp Suite's Repeater tool | ![](https://img.shields.io/github/stars/CoreyD97/Stepper) | ![](https://img.shields.io/github/languages/top/CoreyD97/Stepper) |", - "Method": "REPEAT", - "Type": "Burp" - }, - "attack-surface-detector-zap": { - "Data": "| ZAP/PASV | [attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap) | The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters | ![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap) | ![](https://img.shields.io/github/languages/top/secdec/attack-surface-detector-zap) |", - "Method": "PASV", - "Type": "ZAP" - }, - "auto-repeater": { - "Data": "| Burp/PASV | [auto-repeater](https://github.com/PortSwigger/auto-repeater) | Automated HTTP Request Repeating With Burp Suite | ![](https://img.shields.io/github/stars/PortSwigger/auto-repeater) | ![](https://img.shields.io/github/languages/top/PortSwigger/auto-repeater) |", - "Method": "PASV", - "Type": "Burp" - }, - "burp-exporter": { - "Data": "| Burp/CODE | [burp-exporter](https://github.com/artssec/burp-exporter) | Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions. | ![](https://img.shields.io/github/stars/artssec/burp-exporter) | ![](https://img.shields.io/github/languages/top/artssec/burp-exporter) |", - "Method": "CODE", - "Type": "Burp" - }, - "burp-piper": { - "Data": "| Burp/PIPE | [burp-piper](https://github.com/silentsignal/burp-piper) | Piper Burp Suite Extender plugin | ![](https://img.shields.io/github/stars/silentsignal/burp-piper) | ![](https://img.shields.io/github/languages/top/silentsignal/burp-piper) |", - "Method": "PIPE", - "Type": "Burp" - }, - "burp-retire-js": { - "Data": "| All/PASV | [burp-retire-js](https://github.com/h3xstream/burp-retire-js) | Burp/ZAP/Maven extension that integrate Retire.js repository to find vulnerable Javascript libraries. | ![](https://img.shields.io/github/stars/h3xstream/burp-retire-js) | ![](https://img.shields.io/github/languages/top/h3xstream/burp-retire-js) |", - "Method": "PASV", - "Type": "All" - }, - "burp-send-to": { - "Data": "| Burp/EXPORT | [burp-send-to](https://github.com/bytebutcher/burp-send-to) | Adds a customizable \"Send to...\"-context-menu to your BurpSuite. | ![](https://img.shields.io/github/stars/bytebutcher/burp-send-to) | ![](https://img.shields.io/github/languages/top/bytebutcher/burp-send-to) |", - "Method": "EXPORT", - "Type": "Burp" - }, - "collaborator-everywhere": { - "Data": "| Burp/PASV | [collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere) | A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by causing pingbacks to Burp Collaborator | ![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere) | ![](https://img.shields.io/github/languages/top/PortSwigger/collaborator-everywhere) |", - "Method": "PASV", - "Type": "Burp" - }, - "community-scripts": { - "Data": "| ZAP/SCRIPT | [community-scripts](https://github.com/zaproxy/community-scripts) | A collection of ZAP scripts provided by the community - pull requests very welcome! | ![](https://img.shields.io/github/stars/zaproxy/community-scripts) | ![](https://img.shields.io/github/languages/top/zaproxy/community-scripts) |", - "Method": "SCRIPT", - "Type": "ZAP" - }, - "csp-auditor": { - "Data": "| All/PASV | [csp-auditor](https://github.com/GoSecure/csp-auditor) | Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website | ![](https://img.shields.io/github/stars/GoSecure/csp-auditor) | ![](https://img.shields.io/github/languages/top/GoSecure/csp-auditor) |", - "Method": "PASV", - "Type": "All" - }, - "femida": { - "Data": "| Burp/PASV | [femida](https://github.com/wish-i-was/femida) | Automated blind-xss search for Burp Suite | ![](https://img.shields.io/github/stars/wish-i-was/femida) | ![](https://img.shields.io/github/languages/top/wish-i-was/femida) |", - "Method": "PASV", - "Type": "Burp" - }, - "http-request-smuggler": { - "Data": "| Burp/ACTIVE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | Testing HTTP Request Smuggling and Desync Attack | ![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler) | ![](https://img.shields.io/github/languages/top/PortSwigger/http-request-smuggler) |", - "Method": "ACTIVE", - "Type": "Burp" - }, - "http-script-generator": { - "Data": "| All/CODE | [http-script-generator](https://github.com/h3xstream/http-script-generator) | ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks) | ![](https://img.shields.io/github/stars/h3xstream/http-script-generator) | ![](https://img.shields.io/github/languages/top/h3xstream/http-script-generator) |", - "Method": "CODE", - "Type": "All" - }, - "inql": { - "Data": "| Burp/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing | ![](https://img.shields.io/github/stars/doyensec/inql) | ![](https://img.shields.io/github/languages/top/doyensec/inql) |", - "Method": "GQL", - "Type": "Burp" - }, - "knife": { - "Type": "Burp", - "Data": "| Burp/UTIL | [knife](https://github.com/bit4woo/knife) | A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅 | ![](https://img.shields.io/github/stars/bit4woo/knife) | ![](https://img.shields.io/github/languages/top/bit4woo/knife) |", - "Method": "UTIL", - "Description": "A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "owasp-zap-jwt-addon": { - "Data": "| ZAP/JWT | [owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon) | OWASP ZAP addon for finding vulnerabilities in JWT Implementations | ![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon) | ![](https://img.shields.io/github/languages/top/SasanLabs/owasp-zap-jwt-addon) |", - "Method": "JWT", - "Type": "ZAP" - }, - "param-miner": { - "Data": "| Burp/ACTIVE | [param-miner](https://github.com/PortSwigger/param-miner) | Parameter mining on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/param-miner) | ![](https://img.shields.io/github/languages/top/PortSwigger/param-miner) |", - "Method": "ACTIVE", - "Type": "Burp" - }, - "reflect": { - "Data": "| ZAP/PASV | [reflect](https://github.com/TypeError/reflect) | OWASP ZAP add-on to help find reflected parameter vulnerabilities | ![](https://img.shields.io/github/stars/TypeError/reflect) | ![](https://img.shields.io/github/languages/top/TypeError/reflect) |", - "Method": "PASV", - "Type": "ZAP" - }, - "reflected-parameters": { - "Data": "| Burp/PASV | [reflected-parameters](https://github.com/PortSwigger/reflected-parameters) | Find reflected parameter on Burpsuite | ![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters) | ![](https://img.shields.io/github/languages/top/PortSwigger/reflected-parameters) |", - "Method": "PASV", - "Type": "Burp" - }, - "safecopy": { - "Data": "| Burp/UTIL | [safecopy](https://github.com/yashrs/safecopy) | Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be added in the future. | ![](https://img.shields.io/github/stars/yashrs/safecopy) | ![](https://img.shields.io/github/languages/top/yashrs/safecopy) |", - "Method": "UTIL", - "Type": "Burp" - }, - "taborator": { - "Data": "| Burp/CALLBACK | [taborator](https://github.com/hackvertor/taborator) | A Burp extension to show the Collaborator client in a tab | ![](https://img.shields.io/github/stars/hackvertor/taborator) | ![](https://img.shields.io/github/languages/top/hackvertor/taborator) |", - "Method": "CALLBACK", - "Type": "Burp" - }, - "turbo-intruder": { - "Data": "| Burp/ACTIVE | [turbo-intruder](https://github.com/PortSwigger/turbo-intruder) | Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. | ![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder) | ![](https://img.shields.io/github/languages/top/PortSwigger/turbo-intruder) |", - "Method": "ACTIVE", - "Type": "Burp" - }, - "zap-hud": { - "Data": "| ZAP/INTERFACE | [zap-hud](https://github.com/zaproxy/zap-hud) | The OWASP ZAP Heads Up Display (HUD) | ![](https://img.shields.io/github/stars/zaproxy/zap-hud) | ![](https://img.shields.io/github/languages/top/zaproxy/zap-hud) |", - "Method": "INTERFACE", - "Type": "ZAP" - } -} \ No newline at end of file diff --git a/Burp and ZAP Extensions/template/foot.md b/Burp and ZAP Extensions/template/foot.md deleted file mode 100644 index 9d20f98..0000000 --- a/Burp and ZAP Extensions/template/foot.md +++ /dev/null @@ -1,46 +0,0 @@ -## Contribute and Contributor -### Usage of add-tool -``` -./add-tool -Usage of ./add-tool: - -isFirst - if you add new type, it use - -url string - any url -``` - -### Three Procedures for the Contribute -- First, your tool append `data.json` using `add-tool -``` -$ ./add-tool -url https://github.com/sqlmapproject/sqlmap -Successfully Opened type.lst -[0] Army-Knife -[1] Discovery -[2] Fetch -[3] Scanner -[4] Utility -[+] What is type? -3 -Scanner -[+] What is method(e.g XSS, WVS, SSL, ETC..)? -SQL -Successfully Opened data.json - -``` -- Second, Give me PR or Add issue with data.json
-- Third, There's no third. - -### Add Burp Suite or ZAP Extensions -in `WebHackersWeapons/Burp and ZAP Extensions` directory -``` -$ ../add-tool -url https://github.com/nccgroup/BurpSuiteLoggerPlusPlus -``` - -### Distribute to Burp Suite or ZAP Extensions -``` -$ ../distribute-readme -=> show new README file in Burp Suite or ZAP Extensions -``` - -### Add/Distribute common tools -https://github.com/hahwul/WebHackersWeapons#contribute-and-contributor diff --git a/Burp and ZAP Extensions/template/head.md b/Burp and ZAP Extensions/template/head.md deleted file mode 100644 index 38041a7..0000000 --- a/Burp and ZAP Extensions/template/head.md +++ /dev/null @@ -1,9 +0,0 @@ -A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
-This is Cool Extensions collection of Burp suite and ZAP - -## Table of Contents -- [Web Hacker's Weapons Main](https://github.com/hahwul/WebHackersWeapons) -- [Cool Extensions](#cool-extensions) -- [Contribute](#contribute-and-contributor) - -## Cool Extensions diff --git a/Burp and ZAP Extensions/type.lst b/Burp and ZAP Extensions/type.lst deleted file mode 100644 index 8b8fbcb..0000000 --- a/Burp and ZAP Extensions/type.lst +++ /dev/null @@ -1,3 +0,0 @@ -All -Burp -ZAP diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index ae29152..569a9d3 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -1,82 +1,30 @@ -# Contribute -## Fork and Build Contribute tools -First, fork this repository -![1414](https://user-images.githubusercontent.com/13212227/98445633-fd479700-215b-11eb-876f-fcc82a010bb6.png) +## Contribute +### First, Fork Repository +Fork this repository :D -Second, Clone forked repo and compile `add-tool` and `distribute-readme` using `make` command: -``` -$ git clone https://github.com/{your-id}/WebHackersWeaponse -$ cd WebHackersWeaponse +### Second, Write `./weapons/.yaml` and Commit/PR +Write YAML Code. +```yaml +--- +name: App Name +description: App Description +url: App URL # https://github.com/hahwul/dalfox +category: tool # tool / tool-addon / browser-addon / bookmarklet +type: # recon / fuzzer / scanner / exploit / utils / etc +platform: +- linux # linux +- macos # macos application +- windows # windows application +- firefox # firefox addon +- safari # safari addon +- chrome # chrome addon +- zap # zap addon +- burpsuite # burpsuite addon +# If supported crossplatform, you write out all three (linux/macos/windows) +lang: # go / python / ruby / rust / etc... +tags: [] # xss / sqli / ssrf / oast / etc... ``` -```bash -$ make contribute -``` - -## Add new tool -### First, your tool append `data.json` using `add-tool -Usage -``` -./add-tool -Usage of ./add-tool: - -isFirst - if you add new type, it use - -url string - any url -``` - -E.g -``` -$ ./add-tool -url https://github.com/sqlmapproject/sqlmap -Successfully Opened type.lst -[0] Army-Knife -[1] Discovery -[2] Fetch -[3] Scanner -[4] Utility -[+] What is type? -3 -Scanner -[+] What is method(e.g XSS, WVS, SSL, ETC..)? -SQL -Successfully Opened data.json -``` - -And if you want to add an install / update script for whw-tools, please open data.json and fill out the additional parts. -![1416](https://user-images.githubusercontent.com/13212227/98445636-0173b480-215c-11eb-8390-5dca78e0f79b.png) - -### Second, Give me PR or Add issue with data.json
![1415](https://user-images.githubusercontent.com/13212227/98445635-00db1e00-215c-11eb-8a59-d7d21dd98db0.png) -### Third, There's no third. - -### Asciinema video -[![asciicast](https://asciinema.org/a/318456.svg)](https://asciinema.org/a/318456) - -## Add Other type tools -(`Burp Suite or ZAP Extensions`, `Bookmarklets`, `Browser Extensions`) - -### First, add-tool in -``` -$ cd {Other directory} -``` -e.g : `./WebHackersWeapons/Burp and ZAP Extensions`, `./Bookmarklets`, `./Browser Extensions` - -``` -$ ../add-tool -url https://github.com/nccgroup/BurpSuiteLoggerPlusPlus -``` - -### Second, PR data.json - -## Distruibute (only for me) -### Distribute to common tools -``` -$ ./distribute-readme -=> show new README file -``` - -### Distribute to Another directory -``` -$ ../distribute-readme -=> show new README file in Burp Suite or ZAP Extensions -``` +### Third, There's no third. \ No newline at end of file diff --git a/Makefile b/Makefile deleted file mode 100644 index 0010ff9..0000000 --- a/Makefile +++ /dev/null @@ -1,40 +0,0 @@ -.PHONY: default help contribute add-tool distribute-readme clean - -SHELL = /bin/bash -APP_NAME = WebHackersWeapons -ADD_TOOL = add-tool -DISTRIBUTE_README = distribute-readme -VERSION = $(shell git describe --always --tags) -GIT_COMMIT = $(shell git rev-parse HEAD) -GIT_DIRTY = $(shell test -n "`git status --porcelain`" && echo "+CHANGES" || true) -BUILD_DATE = $(shell date '+%Y-%m-%d-%H:%M:%S') - -default: help - -help: - @echo 'Management commands for ${APP_NAME}:' - @echo - @echo 'Usage:' - @echo ' make contribute Compile ${ADD_TOOL} & ${DISTRIBUTE_README}.' - @echo ' make add-tool Build ${ADD_TOOL}' - @echo ' make distribute-readme Build ${DISTRIBUTE_README}' - @echo ' make clean Clean the contribute file.' - - @echo - -contribute: add-tool distribute-readme - -add-tool: - @echo "Build ${ADD_TOOL} ${VERSION}" - @echo "GOPATH=${GOPATH}" - go build -ldflags "-w -X github.com/hahwul/WebHackersWeapons/version.GitCommit=${GIT_COMMIT}${GIT_DIRTY} -X github.com/hahwul/WebHackersWeapons/version.Version=${VERSION} -X github.com/hahwul/WebHackersWeapons/version.BuildDate=${BUILD_DATE}" -o ./${ADD_TOOL} ./${ADD_TOOL}.go - -distribute-readme: - @echo "Build ${ADD_TOOL} ${VERSION}" - @echo "GOPATH=${GOPATH}" - go build -ldflags "-w -X github.com/hahwul/WebHackersWeapons/version.GitCommit=${GIT_COMMIT}${GIT_DIRTY} -X github.com/hahwul/WebHackersWeapons/version.Version=${VERSION} -X github.com/hahwul/WebHackersWeapons/version.BuildDate=${BUILD_DATE}" -o ./${DISTRIBUTE_README} ./${DISTRIBUTE_README}.go - -clean: - @echo "Removing ${APP_NAME} ${VERSION}" - @test ! -e ${ADD_TOOL} || rm ${ADD_TOOL} - @test ! -e ${DISTRIBUTE_README} || rm ${DISTRIBUTE_README} \ No newline at end of file diff --git a/README.md b/README.md index c433b19..344d962 100644 --- a/README.md +++ b/README.md @@ -1,290 +1,347 @@ +

-
- -
- - - - - - +
+ +
+ + + +

-A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting +A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting ## Family project [![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) [![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) ## Table of Contents -- [WHW-Tools](https://whw-tools.hahwul.com) - [Weapons](#weapons) -- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) -- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) -- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) -- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) + - [Tools](#tools) + - [Bookmarklets](#bookmarklets) + - [Browser Addons](#browser-addons) + - [Burp and ZAP Addons](#burpsuite-and-zap-addons) +- [Contribute](CONTRIBUTING.md) - [Thanks to contributor](#thanks-to-contributor) -## WHW-Tools -> Always use the latest tools 😎 - -`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) - ## Weapons -| Type | Name | Description | Popularity | Language | -| ---------- | :---------- | :----------: | :----------: | :----------: | -| Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing | ![](https://img.shields.io/github/stars/jaeles-project/jaeles) | ![](https://img.shields.io/github/languages/top/jaeles-project/jaeles) | -| Army-Knife/PROXY | [BurpSuite](https://portswigger.net/burp) | the BurpSuite Project|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Army-Knife/PROXY | [hetty](https://github.com/dstotijn/hetty) | Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. | ![](https://img.shields.io/github/stars/dstotijn/hetty) | ![](https://img.shields.io/github/languages/top/dstotijn/hetty) | -| Army-Knife/PROXY | [httptoolkit](https://github.com/httptoolkit/httptoolkit) | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac | ![](https://img.shields.io/github/stars/httptoolkit/httptoolkit) | ![](https://img.shields.io/github/languages/top/httptoolkit/httptoolkit) | -| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) | -| Army-Knife/PROXY | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project | ![](https://img.shields.io/github/stars/zaproxy/zaproxy) | ![](https://img.shields.io/github/languages/top/zaproxy/zaproxy) | -| Army-Knife/SCAN | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | ![](https://img.shields.io/github/stars/projectdiscovery/nuclei) | ![](https://img.shields.io/github/languages/top/projectdiscovery/nuclei) | -| Discovery/ALL | [3klCon](https://github.com/eslam3kl/3klCon) | Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files. | ![](https://img.shields.io/github/stars/eslam3kl/3klCon) | ![](https://img.shields.io/github/languages/top/eslam3kl/3klCon) | -| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool | ![](https://img.shields.io/github/stars/aufzayed/HydraRecon) | ![](https://img.shields.io/github/languages/top/aufzayed/HydraRecon) | -| Discovery/ALL | [OneForAll](https://github.com/shmilylty/OneForAll) | OneForAll是一款功能强大的子域收集工具 | ![](https://img.shields.io/github/stars/shmilylty/OneForAll) | ![](https://img.shields.io/github/languages/top/shmilylty/OneForAll) | -| Discovery/ALL | [aquatone](https://github.com/michenriksen/aquatone) | A Tool for Domain Flyovers | ![](https://img.shields.io/github/stars/michenriksen/aquatone) | ![](https://img.shields.io/github/languages/top/michenriksen/aquatone) | -| Discovery/ALL | [intrigue-core](https://github.com/intrigueio/intrigue-core) | Discover Your Attack Surface | ![](https://img.shields.io/github/stars/intrigueio/intrigue-core) | ![](https://img.shields.io/github/languages/top/intrigueio/intrigue-core) | -| Discovery/ALL | [lazyrecon](https://github.com/nahamsec/lazyrecon) | This script is intended to automate your reconnaissance process in an organized fashion | ![](https://img.shields.io/github/stars/nahamsec/lazyrecon) | ![](https://img.shields.io/github/languages/top/nahamsec/lazyrecon) | -| Discovery/ALL | [reconftw](https://github.com/six2dez/reconftw) | reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities | ![](https://img.shields.io/github/stars/six2dez/reconftw) | ![](https://img.shields.io/github/languages/top/six2dez/reconftw) | -| Discovery/ALL | [rengine](https://github.com/yogeshojha/rengine) | reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. | ![](https://img.shields.io/github/stars/yogeshojha/rengine) | ![](https://img.shields.io/github/languages/top/yogeshojha/rengine) | -| Discovery/ALL | [scilla](https://github.com/edoardottt/scilla) | 🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration | ![](https://img.shields.io/github/stars/edoardottt/scilla) | ![](https://img.shields.io/github/languages/top/edoardottt/scilla) | -| Discovery/ALL | [sn0int](https://github.com/kpcyrd/sn0int) | Semi-automatic OSINT framework and package manager | ![](https://img.shields.io/github/stars/kpcyrd/sn0int) | ![](https://img.shields.io/github/languages/top/kpcyrd/sn0int) | -| Discovery/API | [kiterunner](https://github.com/assetnote/kiterunner) | Contextual Content Discovery Tool | ![](https://img.shields.io/github/stars/assetnote/kiterunner) | ![](https://img.shields.io/github/languages/top/assetnote/kiterunner) | -| Discovery/APK | [apkleaks](https://github.com/dwisiswant0/apkleaks) | Scanning APK file for URIs, endpoints & secrets. | ![](https://img.shields.io/github/stars/dwisiswant0/apkleaks) | ![](https://img.shields.io/github/languages/top/dwisiswant0/apkleaks) | -| Discovery/URL | [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. | ![](https://img.shields.io/github/stars/s0md3v/Photon) | ![](https://img.shields.io/github/languages/top/s0md3v/Photon) | -| Discovery/URL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of "commoncrawl.org" | ![](https://img.shields.io/github/stars/si9int/cc.py) | ![](https://img.shields.io/github/languages/top/si9int/cc.py) | -| Discovery/URL | [go-dork](https://github.com/dwisiswant0/go-dork) | The fastest dork scanner written in Go. | ![](https://img.shields.io/github/stars/dwisiswant0/go-dork) | ![](https://img.shields.io/github/languages/top/dwisiswant0/go-dork) | -| Discovery/URL | [gospider](https://github.com/jaeles-project/gospider) | Gospider - Fast web spider written in Go | ![](https://img.shields.io/github/stars/jaeles-project/gospider) | ![](https://img.shields.io/github/languages/top/jaeles-project/gospider) | -| Discovery/URL | [hakrawler](https://github.com/hakluke/hakrawler) | Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application | ![](https://img.shields.io/github/stars/hakluke/hakrawler) | ![](https://img.shields.io/github/languages/top/hakluke/hakrawler) | -| Discovery/URL | [urlgrab](https://github.com/IAmStoxe/urlgrab) | A golang utility to spider through a website searching for additional links. | ![](https://img.shields.io/github/stars/IAmStoxe/urlgrab) | ![](https://img.shields.io/github/languages/top/IAmStoxe/urlgrab) | -| Discovery/DNS | [DNSDumpster](https://dnsdumpster.com) | Online dns recon & research, find & lookup dns records|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Discovery/DNS | [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsprobe) | -| Discovery/DNS | [dnsvalidator](https://github.com/vortexau/dnsvalidator) | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | ![](https://img.shields.io/github/stars/vortexau/dnsvalidator) | ![](https://img.shields.io/github/languages/top/vortexau/dnsvalidator) | -| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsx) | -| Discovery/DNS | [hakrevdns](https://github.com/hakluke/hakrevdns) | Small, fast tool for performing reverse DNS lookups en masse. | ![](https://img.shields.io/github/stars/hakluke/hakrevdns) | ![](https://img.shields.io/github/languages/top/hakluke/hakrevdns) | -| Discovery/DNS | [haktrails](https://github.com/hakluke/haktrails) | Golang client for querying SecurityTrails API data | ![](https://img.shields.io/github/stars/hakluke/haktrails) | ![](https://img.shields.io/github/languages/top/hakluke/haktrails) | -| Discovery/DNS | [puredns](https://github.com/d3mondev/puredns) | Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. | ![](https://img.shields.io/github/stars/d3mondev/puredns) | ![](https://img.shields.io/github/languages/top/d3mondev/puredns) | -| Discovery/DNS | [rusolver](https://github.com/Edu4rdSHL/rusolver) | Fast and accurate DNS resolver. | ![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/rusolver) | -| Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. | ![](https://img.shields.io/github/stars/projectdiscovery/shuffledns) | ![](https://img.shields.io/github/languages/top/projectdiscovery/shuffledns) | -| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) | -| Discovery/DNS | [zdns](https://github.com/zmap/zdns) | Fast CLI DNS Lookup Tool | ![](https://img.shields.io/github/stars/zmap/zdns) | ![](https://img.shields.io/github/languages/top/zmap/zdns) | -| Discovery/DOMAIN | [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery | ![](https://img.shields.io/github/stars/OWASP/Amass) | ![](https://img.shields.io/github/languages/top/OWASP/Amass) | -| Discovery/DOMAIN | [Chaos Web](https://chaos.projectdiscovery.io) | actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) -| Discovery/DOMAIN | [Sublist3r](https://github.com/aboul3la/Sublist3r) | Fast subdomains enumeration tool for penetration testers | ![](https://img.shields.io/github/stars/aboul3la/Sublist3r) | ![](https://img.shields.io/github/languages/top/aboul3la/Sublist3r) | -| Discovery/DOMAIN | [altdns](https://github.com/infosec-au/altdns) | Generates permutations, alterations and mutations of subdomains and then resolves them | ![](https://img.shields.io/github/stars/infosec-au/altdns) | ![](https://img.shields.io/github/languages/top/infosec-au/altdns) | -| Discovery/DOMAIN | [assetfinder](https://github.com/tomnomnom/assetfinder) | Find domains and subdomains related to a given domain | ![](https://img.shields.io/github/stars/tomnomnom/assetfinder) | ![](https://img.shields.io/github/languages/top/tomnomnom/assetfinder) | -| Discovery/DOMAIN | [chaos-client](https://github.com/projectdiscovery/chaos-client) | Go client to communicate with Chaos DNS API. | ![](https://img.shields.io/github/stars/projectdiscovery/chaos-client) | ![](https://img.shields.io/github/languages/top/projectdiscovery/chaos-client) | -| Discovery/DOMAIN | [ditto](https://github.com/evilsocket/ditto) | A tool for IDN homograph attacks and detection. | ![](https://img.shields.io/github/stars/evilsocket/ditto) | ![](https://img.shields.io/github/languages/top/evilsocket/ditto) | -| Discovery/DOMAIN | [dmut](https://github.com/bp0lr/dmut) | A tool to perform permutations, mutations and alteration of subdomains in golang. | ![](https://img.shields.io/github/stars/bp0lr/dmut) | ![](https://img.shields.io/github/languages/top/bp0lr/dmut) | -| Discovery/DOMAIN | [findomain](https://github.com/Edu4rdSHL/findomain) | The fastest and cross-platform subdomain enumerator, do not waste your time. | ![](https://img.shields.io/github/stars/Edu4rdSHL/findomain) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/findomain) | -| Discovery/DOMAIN | [knock](https://github.com/guelfoweb/knock) | Knock Subdomain Scan | ![](https://img.shields.io/github/stars/guelfoweb/knock) | ![](https://img.shields.io/github/languages/top/guelfoweb/knock) | -| Discovery/DOMAIN | [subfinder](https://github.com/projectdiscovery/subfinder) | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. | ![](https://img.shields.io/github/stars/projectdiscovery/subfinder) | ![](https://img.shields.io/github/languages/top/projectdiscovery/subfinder) | -| Discovery/FAVICON | [FavFreak](https://github.com/devanshbatham/FavFreak) | Making Favicon.ico based Recon Great again ! | ![](https://img.shields.io/github/stars/devanshbatham/FavFreak) | ![](https://img.shields.io/github/languages/top/devanshbatham/FavFreak) | -| Discovery/FUZZ | [DirDar](https://github.com/M4DM0e/DirDar) | DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it | ![](https://img.shields.io/github/stars/M4DM0e/DirDar) | ![](https://img.shields.io/github/languages/top/M4DM0e/DirDar) | -| Discovery/FUZZ | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner | ![](https://img.shields.io/github/stars/maurosoria/dirsearch) | ![](https://img.shields.io/github/languages/top/maurosoria/dirsearch) | -| Discovery/FUZZ | [dontgo403](https://github.com/devploit/dontgo403) | Tool to bypass 40X response codes. | ![](https://img.shields.io/github/stars/devploit/dontgo403) | ![](https://img.shields.io/github/languages/top/devploit/dontgo403) | -| Discovery/FUZZ | [feroxbuster](https://github.com/epi052/feroxbuster) | A fast, simple, recursive content discovery tool written in Rust. | ![](https://img.shields.io/github/stars/epi052/feroxbuster) | ![](https://img.shields.io/github/languages/top/epi052/feroxbuster) | -| Discovery/FUZZ | [gobuster](https://github.com/OJ/gobuster) | Directory/File, DNS and VHost busting tool written in Go | ![](https://img.shields.io/github/stars/OJ/gobuster) | ![](https://img.shields.io/github/languages/top/OJ/gobuster) | -| Discovery/FUZZ | [medusa](https://github.com/riza/medusa) | Fastest recursive HTTP fuzzer, like a Ferrari. | ![](https://img.shields.io/github/stars/riza/medusa) | ![](https://img.shields.io/github/languages/top/riza/medusa) | -| Discovery/GH | [pagodo](https://github.com/opsdisk/pagodo) | pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching | ![](https://img.shields.io/github/stars/opsdisk/pagodo) | ![](https://img.shields.io/github/languages/top/opsdisk/pagodo) | -| Discovery/GIT | [GitMiner](https://github.com/UnkL4b/GitMiner) | Tool for advanced mining for content on Github | ![](https://img.shields.io/github/stars/UnkL4b/GitMiner) | ![](https://img.shields.io/github/languages/top/UnkL4b/GitMiner) | -| Discovery/GIT | [gitGraber](https://github.com/hisxo/gitGraber) | gitGraber | ![](https://img.shields.io/github/stars/hisxo/gitGraber) | ![](https://img.shields.io/github/languages/top/hisxo/gitGraber) | -| Discovery/GIT | [github-endpoints](https://github.com/gwen001/github-endpoints) | Find endpoints on GitHub. | ![](https://img.shields.io/github/stars/gwen001/github-endpoints) | ![](https://img.shields.io/github/languages/top/gwen001/github-endpoints) | -| Discovery/GIT | [github-regexp](https://github.com/gwen001/github-regexp) | Basically a regexp over a GitHub search. | ![](https://img.shields.io/github/stars/gwen001/github-regexp) | ![](https://img.shields.io/github/languages/top/gwen001/github-regexp) | -| Discovery/GIT | [github-search](https://github.com/gwen001/github-search) | Tools to perform basic search on GitHub. | ![](https://img.shields.io/github/stars/gwen001/github-search) | ![](https://img.shields.io/github/languages/top/gwen001/github-search) | -| Discovery/GIT | [github-subdomains](https://github.com/gwen001/github-subdomains) | Find subdomains on GitHub | ![](https://img.shields.io/github/stars/gwen001/github-subdomains) | ![](https://img.shields.io/github/languages/top/gwen001/github-subdomains) | -| Discovery/GIT | [gitleaks](https://github.com/zricethezav/gitleaks) | Scan git repos (or files) for secrets using regex and entropy 🔑 | ![](https://img.shields.io/github/stars/zricethezav/gitleaks) | ![](https://img.shields.io/github/languages/top/zricethezav/gitleaks) | -| Discovery/GIT | [gitrob](https://github.com/michenriksen/gitrob) | Reconnaissance tool for GitHub organizations | ![](https://img.shields.io/github/stars/michenriksen/gitrob) | ![](https://img.shields.io/github/languages/top/michenriksen/gitrob) | -| Discovery/GQL | [graphql-voyager](https://github.com/APIs-guru/graphql-voyager) | 🛰️ Represent any GraphQL API as an interactive graph | ![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager) | ![](https://img.shields.io/github/languages/top/APIs-guru/graphql-voyager) | -| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing | ![](https://img.shields.io/github/stars/doyensec/inql) | ![](https://img.shields.io/github/languages/top/doyensec/inql) | -| Discovery/HOST | [uncover](https://github.com/projectdiscovery/uncover) | Quickly discover exposed hosts on the internet using multiple search engine. | ![](https://img.shields.io/github/stars/projectdiscovery/uncover) | ![](https://img.shields.io/github/languages/top/projectdiscovery/uncover) | -| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. | ![](https://img.shields.io/github/stars/s0md3v/Arjun) | ![](https://img.shields.io/github/languages/top/s0md3v/Arjun) | -| Discovery/HTTP | [headi](https://github.com/mlcsec/headi) | Customisable and automated HTTP header injection | ![](https://img.shields.io/github/stars/mlcsec/headi) | ![](https://img.shields.io/github/languages/top/mlcsec/headi) | -| Discovery/JS | [JSFScan.sh](https://github.com/KathanP19/JSFScan.sh) | Automation for javascript recon in bug bounty. | ![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh) | ![](https://img.shields.io/github/languages/top/KathanP19/JSFScan.sh) | -| Discovery/JS | [LinkFinder](https://github.com/GerbenJavado/LinkFinder) | A python script that finds endpoints in JavaScript files | ![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder) | ![](https://img.shields.io/github/languages/top/GerbenJavado/LinkFinder) | -| Discovery/JS | [SecretFinder](https://github.com/m4ll0k/SecretFinder) | SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files | ![](https://img.shields.io/github/stars/m4ll0k/SecretFinder) | ![](https://img.shields.io/github/languages/top/m4ll0k/SecretFinder) | -| Discovery/JS | [subjs](https://github.com/lc/subjs) | Fetches javascript file from a list of URLS or subdomains. | ![](https://img.shields.io/github/stars/lc/subjs) | ![](https://img.shields.io/github/languages/top/lc/subjs) | -| Discovery/OSINT | [spiderfoot](https://github.com/smicallef/spiderfoot) | SpiderFoot automates OSINT collection so that you can focus on analysis. | ![](https://img.shields.io/github/stars/smicallef/spiderfoot) | ![](https://img.shields.io/github/languages/top/smicallef/spiderfoot) | -| Discovery/PARAM | [ParamSpider](https://github.com/devanshbatham/ParamSpider) | Mining parameters from dark corners of Web Archives | ![](https://img.shields.io/github/stars/devanshbatham/ParamSpider) | ![](https://img.shields.io/github/languages/top/devanshbatham/ParamSpider) | -| Discovery/PARAM | [Parth](https://github.com/s0md3v/Parth) | Heuristic Vulnerable Parameter Scanner | ![](https://img.shields.io/github/stars/s0md3v/Parth) | ![](https://img.shields.io/github/languages/top/s0md3v/Parth) | -| Discovery/PARAM | [fuzzparam](https://github.com/0xsapra/fuzzparam) | A fast go based param miner to fuzz possible parameters a URL can have. | ![](https://img.shields.io/github/stars/0xsapra/fuzzparam) | ![](https://img.shields.io/github/languages/top/0xsapra/fuzzparam) | -| Discovery/PARAM | [parameth](https://github.com/maK-/parameth) | This tool can be used to brute discover GET and POST parameters | ![](https://img.shields.io/github/stars/maK-/parameth) | ![](https://img.shields.io/github/languages/top/maK-/parameth) | -| Discovery/PARAM | [x8](https://github.com/Sh1Yo/x8) | Hidden parameters discovery suite | ![](https://img.shields.io/github/stars/Sh1Yo/x8) | ![](https://img.shields.io/github/languages/top/Sh1Yo/x8) | -| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust | ![](https://img.shields.io/github/stars/brandonskerritt/RustScan) | ![](https://img.shields.io/github/languages/top/brandonskerritt/RustScan) | -| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ![](https://img.shields.io/github/stars/robertdavidgraham/masscan) | ![](https://img.shields.io/github/languages/top/robertdavidgraham/masscan) | -| Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests | ![](https://img.shields.io/github/stars/projectdiscovery/naabu) | ![](https://img.shields.io/github/languages/top/projectdiscovery/naabu) | -| Discovery/PORT | [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. | ![](https://img.shields.io/github/stars/nmap/nmap) | ![](https://img.shields.io/github/languages/top/nmap/nmap) | -| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool | ![](https://img.shields.io/github/stars/Ice3man543/SubOver) | ![](https://img.shields.io/github/languages/top/Ice3man543/SubOver) | -| Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. | ![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz) | ![](https://img.shields.io/github/languages/top/EdOverflow/can-i-take-over-xyz) | -| Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go | ![](https://img.shields.io/github/stars/haccer/subjack) | ![](https://img.shields.io/github/languages/top/haccer/subjack) | -| Discovery/TKOV | [subzy](https://github.com/LukaSikic/subzy) | Subdomain takeover vulnerability checker | ![](https://img.shields.io/github/stars/LukaSikic/subzy) | ![](https://img.shields.io/github/languages/top/LukaSikic/subzy) | -| Discovery/URL | [cariddi](https://github.com/edoardottt/cariddi) | Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more... | ![](https://img.shields.io/github/stars/edoardottt/cariddi) | ![](https://img.shields.io/github/languages/top/edoardottt/cariddi) | -| Discovery/URL | [crawlergo](https://github.com/Qianlitp/crawlergo) | A powerful browser crawler for web vulnerability scanners | ![](https://img.shields.io/github/stars/Qianlitp/crawlergo) | ![](https://img.shields.io/github/languages/top/Qianlitp/crawlergo) | -| Discovery/URL | [gau](https://github.com/lc/gau) | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | ![](https://img.shields.io/github/stars/lc/gau) | ![](https://img.shields.io/github/languages/top/lc/gau) | -| Discovery/URL | [gauplus](https://github.com/bp0lr/gauplus) | A modified version of gau for personal usage. Support workers, proxies and some extra things. | ![](https://img.shields.io/github/stars/bp0lr/gauplus) | ![](https://img.shields.io/github/languages/top/bp0lr/gauplus) | -| Discovery/URL | [security-crawl-maze](https://github.com/google/security-crawl-maze) | Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document. | ![](https://img.shields.io/github/stars/google/security-crawl-maze) | ![](https://img.shields.io/github/languages/top/google/security-crawl-maze) | -| Discovery/URL | [urlhunter](https://github.com/utkusen/urlhunter) | a recon tool that allows searching on URLs that are exposed via shortener services | ![](https://img.shields.io/github/stars/utkusen/urlhunter) | ![](https://img.shields.io/github/languages/top/utkusen/urlhunter) | -| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain | ![](https://img.shields.io/github/stars/tomnomnom/waybackurls) | ![](https://img.shields.io/github/languages/top/tomnomnom/waybackurls) | -| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services | ![](https://img.shields.io/github/stars/s0md3v/Silver) | ![](https://img.shields.io/github/languages/top/s0md3v/Silver) | -| Discovery/WEBSOCK | [STEWS](https://github.com/PalindromeLabs/STEWS) | A Security Tool for Enumerating WebSockets | ![](https://img.shields.io/github/stars/PalindromeLabs/STEWS) | ![](https://img.shields.io/github/languages/top/PalindromeLabs/STEWS) | -| Discovery/WEBSOCK | [wssip](https://github.com/nccgroup/wssip) | Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa. | ![](https://img.shields.io/github/stars/nccgroup/wssip) | ![](https://img.shields.io/github/languages/top/nccgroup/wssip) | -| Fetch/HTTP | [fhc](https://github.com/Edu4rdSHL/fhc) | Fast HTTP Checker. | ![](https://img.shields.io/github/stars/Edu4rdSHL/fhc) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/fhc) | -| Fetch/HTTP | [htcat](https://github.com/htcat/htcat) | Parallel and Pipelined HTTP GET Utility | ![](https://img.shields.io/github/stars/htcat/htcat) | ![](https://img.shields.io/github/languages/top/htcat/htcat) | -| Fetch/HTTP | [httprobe](https://github.com/tomnomnom/httprobe) | Take a list of domains and probe for working HTTP and HTTPS servers | ![](https://img.shields.io/github/stars/tomnomnom/httprobe) | ![](https://img.shields.io/github/languages/top/tomnomnom/httprobe) | -| Fetch/HTTP | [httpx](https://github.com/projectdiscovery/httpx) | httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. | ![](https://img.shields.io/github/stars/projectdiscovery/httpx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/httpx) | -| Fetch/HTTP | [meg](https://github.com/tomnomnom/meg) | Fetch many paths for many hosts - without killing the hosts | ![](https://img.shields.io/github/stars/tomnomnom/meg) | ![](https://img.shields.io/github/languages/top/tomnomnom/meg) | -| Fetch/HTTP | [wuzz](https://github.com/asciimoo/wuzz) | Interactive cli tool for HTTP inspection | ![](https://img.shields.io/github/stars/asciimoo/wuzz) | ![](https://img.shields.io/github/languages/top/asciimoo/wuzz) | -| Fetch/JS | [getJS](https://github.com/003random/getJS) | A tool to fastly get all javascript sources/files | ![](https://img.shields.io/github/stars/003random/getJS) | ![](https://img.shields.io/github/languages/top/003random/getJS) | -| Scanner/CACHE | [Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner) | Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/). | ![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner) | ![](https://img.shields.io/github/languages/top/Hackmanit/Web-Cache-Vulnerability-Scanner) | -| Scanner/CACHE-POISON | [fockcache](https://github.com/tismayil/fockcache) | FockCache - Minimalized Test Cache Poisoning | ![](https://img.shields.io/github/stars/tismayil/fockcache) | ![](https://img.shields.io/github/languages/top/tismayil/fockcache) | -| Scanner/CACHE-POISON | [web_cache_poison](https://github.com/fngoo/web_cache_poison) | web cache poison - Top 1 web hacking technique of 2019 | ![](https://img.shields.io/github/stars/fngoo/web_cache_poison) | ![](https://img.shields.io/github/languages/top/fngoo/web_cache_poison) | -| Scanner/CONFUSE | [confused](https://github.com/visma-prodsec/confused) | Tool to check for dependency confusion vulnerabilities in multiple package management systems | ![](https://img.shields.io/github/stars/visma-prodsec/confused) | ![](https://img.shields.io/github/languages/top/visma-prodsec/confused) | -| Scanner/CORS | [CorsMe](https://github.com/Shivangx01b/CorsMe) | Cross Origin Resource Sharing MisConfiguration Scanner | ![](https://img.shields.io/github/stars/Shivangx01b/CorsMe) | ![](https://img.shields.io/github/languages/top/Shivangx01b/CorsMe) | -| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner | ![](https://img.shields.io/github/stars/s0md3v/Corsy) | ![](https://img.shields.io/github/languages/top/s0md3v/Corsy) | -| Scanner/CORS | [corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan) | Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS). | ![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan) | ![](https://img.shields.io/github/languages/top/Santandersecurityresearch/corsair_scan) | -| Scanner/CRLF | [crlfuzz](https://github.com/dwisiswant0/crlfuzz) | A fast tool to scan CRLF vulnerability written in Go | ![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/crlfuzz) | -| Scanner/CSRF | [XSRFProbe](https://github.com/0xInfection/XSRFProbe) | The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. | ![](https://img.shields.io/github/stars/0xInfection/XSRFProbe) | ![](https://img.shields.io/github/languages/top/0xInfection/XSRFProbe) | -| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. | ![](https://img.shields.io/github/stars/1N3/BruteX) | ![](https://img.shields.io/github/languages/top/1N3/BruteX) | -| Scanner/FUZZ | [PPScan](https://github.com/msrkp/PPScan) | Client Side Prototype Pollution Scanner | ![](https://img.shields.io/github/stars/msrkp/PPScan) | ![](https://img.shields.io/github/languages/top/msrkp/PPScan) | -| Scanner/FUZZ | [VHostScan](https://github.com/codingo/VHostScan) | A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. | ![](https://img.shields.io/github/stars/codingo/VHostScan) | ![](https://img.shields.io/github/languages/top/codingo/VHostScan) | -| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go | ![](https://img.shields.io/github/stars/ffuf/ffuf) | ![](https://img.shields.io/github/languages/top/ffuf/ffuf) | -| Scanner/FUZZ | [plution](https://github.com/raverrr/plution) | Prototype pollution scanner using headless chrome | ![](https://img.shields.io/github/stars/raverrr/plution) | ![](https://img.shields.io/github/languages/top/raverrr/plution) | -| Scanner/FUZZ | [ppfuzz](https://github.com/dwisiswant0/ppfuzz) | A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 | ![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/ppfuzz) | -| Scanner/FUZZ | [ppmap](https://github.com/kleiton0x00/ppmap) | A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets. | ![](https://img.shields.io/github/stars/kleiton0x00/ppmap) | ![](https://img.shields.io/github/languages/top/kleiton0x00/ppmap) | -| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra | ![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra) | ![](https://img.shields.io/github/languages/top/vanhauser-thc/thc-hydra) | -| Scanner/FUZZ | [wfuzz](https://github.com/xmendez/wfuzz) | Web application fuzzer | ![](https://img.shields.io/github/stars/xmendez/wfuzz) | ![](https://img.shields.io/github/languages/top/xmendez/wfuzz) | -| Scanner/GQL | [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) | GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. | ![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/GraphQLmap) | -| Scanner/JS | [jsprime](https://github.com/dpnishant/jsprime) | a javascript static security analysis tool | ![](https://img.shields.io/github/stars/dpnishant/jsprime) | ![](https://img.shields.io/github/languages/top/dpnishant/jsprime) | -| Scanner/LFI | [LFISuite](https://github.com/D35m0nd142/LFISuite) | Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner | ![](https://img.shields.io/github/stars/D35m0nd142/LFISuite) | ![](https://img.shields.io/github/languages/top/D35m0nd142/LFISuite) | -| Scanner/LFI | [dotdotpwn](https://github.com/wireghoul/dotdotpwn) | DotDotPwn - The Directory Traversal Fuzzer | ![](https://img.shields.io/github/stars/wireghoul/dotdotpwn) | ![](https://img.shields.io/github/languages/top/wireghoul/dotdotpwn) | -| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. | ![](https://img.shields.io/github/stars/codingo/NoSQLMap) | ![](https://img.shields.io/github/languages/top/codingo/NoSQLMap) | -| Scanner/NOSQL | [nosqli](https://github.com/Charlie-belmer/nosqli) | NoSql Injection CLI tool | ![](https://img.shields.io/github/stars/Charlie-belmer/nosqli) | ![](https://img.shields.io/github/languages/top/Charlie-belmer/nosqli) | -| Scanner/RCE | [commix](https://github.com/commixproject/commix) | Automated All-in-One OS Command Injection Exploitation Tool. | ![](https://img.shields.io/github/stars/commixproject/commix) | ![](https://img.shields.io/github/languages/top/commixproject/commix) | -| Scanner/RECON | [Osmedeus](https://github.com/j3ssie/Osmedeus) | Fully automated offensive security framework for reconnaissance and vulnerability scanning | ![](https://img.shields.io/github/stars/j3ssie/Osmedeus) | ![](https://img.shields.io/github/languages/top/j3ssie/Osmedeus) | -| Scanner/RECON | [Sn1per](https://github.com/1N3/Sn1per) | Automated pentest framework for offensive security experts | ![](https://img.shields.io/github/stars/1N3/Sn1per) | ![](https://img.shields.io/github/languages/top/1N3/Sn1per) | -| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] | ![](https://img.shields.io/github/stars/EdOverflow/megplus) | ![](https://img.shields.io/github/languages/top/EdOverflow/megplus) | -| Scanner/REDIRECT | [OpenRedireX](https://github.com/devanshbatham/OpenRedireX) | A Fuzzer for OpenRedirect issues | ![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX) | ![](https://img.shields.io/github/languages/top/devanshbatham/OpenRedireX) | -| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets | ![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump) | ![](https://img.shields.io/github/languages/top/jordanpotti/AWSBucketDump) | -| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents | ![](https://img.shields.io/github/stars/sa7mon/S3Scanner) | ![](https://img.shields.io/github/languages/top/sa7mon/S3Scanner) | -| Scanner/SMUGGLE | [HRS](https://github.com/SafeBreach-Labs/HRS) | HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. | ![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS) | ![](https://img.shields.io/github/languages/top/SafeBreach-Labs/HRS) | -| Scanner/SMUGGLE | [h2csmuggler](https://github.com/assetnote/h2csmuggler) | HTTP Request Smuggling Detection Tool | ![](https://img.shields.io/github/stars/assetnote/h2csmuggler) | ![](https://img.shields.io/github/languages/top/assetnote/h2csmuggler) | -| Scanner/SMUGGLE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs. | ![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler) | ![](https://img.shields.io/github/languages/top/PortSwigger/http-request-smuggler) | -| Scanner/SMUGGLE | [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) | HTTP Request Smuggling Detection Tool | ![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling) | ![](https://img.shields.io/github/languages/top/anshumanpattnaik/http-request-smuggling) | -| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server. | ![](https://img.shields.io/github/stars/neex/http2smugl) | ![](https://img.shields.io/github/languages/top/neex/http2smugl) | -| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | ![](https://img.shields.io/github/stars/defparam/smuggler) | ![](https://img.shields.io/github/languages/top/defparam/smuggler) | -| Scanner/SMUGGLE | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler | ![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/websocket-connection-smuggler) | -| Scanner/SMUGGLE | [ws-smuggler](https://github.com/hahwul/ws-smuggler) | WebSocket Connection Smuggler | ![](https://img.shields.io/github/stars/hahwul/ws-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/ws-smuggler) | -| Scanner/SQL | [SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Scanner/SQLi | [DSSS](https://github.com/stamparm/DSSS) | Damn Small SQLi Scanner | ![](https://img.shields.io/github/stars/stamparm/DSSS) | ![](https://img.shields.io/github/languages/top/stamparm/DSSS) | -| Scanner/SQLi | [SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) -| Scanner/SQLi | [sqliv](https://github.com/the-robot/sqliv) | massive SQL injection vulnerability scanner | ![](https://img.shields.io/github/stars/the-robot/sqliv) | ![](https://img.shields.io/github/languages/top/the-robot/sqliv) | -| Scanner/SQLi | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool | ![](https://img.shields.io/github/stars/sqlmapproject/sqlmap) | ![](https://img.shields.io/github/languages/top/sqlmapproject/sqlmap) | -| Scanner/SSL | [DeepViolet](https://github.com/spoofzu/DeepViolet) | Tool for introspection of SSL\TLS sessions | ![](https://img.shields.io/github/stars/spoofzu/DeepViolet) | ![](https://img.shields.io/github/languages/top/spoofzu/DeepViolet) | -| Scanner/SSL | [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability | ![](https://img.shields.io/github/stars/hahwul/a2sv) | ![](https://img.shields.io/github/languages/top/hahwul/a2sv) | -| Scanner/SSL | [testssl.sh](https://github.com/drwetter/testssl.sh) | Testing TLS/SSL encryption anywhere on any port | ![](https://img.shields.io/github/stars/drwetter/testssl.sh) | ![](https://img.shields.io/github/languages/top/drwetter/testssl.sh) | -| Scanner/SSRF | [SSRFmap](https://github.com/swisskyrepo/SSRFmap) | Automatic SSRF fuzzer and exploitation tool | ![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/SSRFmap) | -| Scanner/SSRF | [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) | A simple SSRF-testing sheriff written in Go | ![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff) | ![](https://img.shields.io/github/languages/top/teknogeek/ssrf-sheriff) | -| Scanner/SSTI | [tplmap](https://github.com/epinna/tplmap) | Server-Side Template Injection and Code Injection Detection and Exploitation Tool | ![](https://img.shields.io/github/stars/epinna/tplmap) | ![](https://img.shields.io/github/languages/top/epinna/tplmap) | -| Scanner/WP | [wprecon](https://github.com/blackcrw/wprecon) | Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go. | ![](https://img.shields.io/github/stars/blackcrw/wprecon) | ![](https://img.shields.io/github/languages/top/blackcrw/wprecon) | -| Scanner/WP | [wpscan](https://github.com/wpscanteam/wpscan) | WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. | ![](https://img.shields.io/github/stars/wpscanteam/wpscan) | ![](https://img.shields.io/github/languages/top/wpscanteam/wpscan) | -| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. | ![](https://img.shields.io/github/stars/s0md3v/Striker) | ![](https://img.shields.io/github/languages/top/s0md3v/Striker) | -| Scanner/WVS | [Taipan](https://github.com/enkomio/Taipan) | Web application vulnerability scanner | ![](https://img.shields.io/github/stars/enkomio/Taipan) | ![](https://img.shields.io/github/languages/top/enkomio/Taipan) | -| Scanner/WVS | [arachni](https://github.com/Arachni/arachni) | Web Application Security Scanner Framework | ![](https://img.shields.io/github/stars/Arachni/arachni) | ![](https://img.shields.io/github/languages/top/Arachni/arachni) | -| Scanner/WVS | [nikto](https://github.com/sullo/nikto) | Nikto web server scanner | ![](https://img.shields.io/github/stars/sullo/nikto) | ![](https://img.shields.io/github/languages/top/sullo/nikto) | -| Scanner/WVS | [rapidscan](https://github.com/skavngr/rapidscan) | The Multi-Tool Web Vulnerability Scanner. | ![](https://img.shields.io/github/stars/skavngr/rapidscan) | ![](https://img.shields.io/github/languages/top/skavngr/rapidscan) | -| Scanner/WVS | [zap-cli](https://github.com/Grunny/zap-cli) | A simple tool for interacting with OWASP ZAP from the commandline. | ![](https://img.shields.io/github/stars/Grunny/zap-cli) | ![](https://img.shields.io/github/languages/top/Grunny/zap-cli) | -| Scanner/XSS | [Cyclops](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking) | Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink. | ![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking) | ![](https://img.shields.io/github/languages/top/v8blink/Chromium-based-XSS-Taint-Tracking) | -| Scanner/XSS | [DOMPurify](https://github.com/cure53/DOMPurify) | DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo: | ![](https://img.shields.io/github/stars/cure53/DOMPurify) | ![](https://img.shields.io/github/languages/top/cure53/DOMPurify) | -| Scanner/XSS | [XSStrike](https://github.com/s0md3v/XSStrike) | Most advanced XSS scanner. | ![](https://img.shields.io/github/stars/s0md3v/XSStrike) | ![](https://img.shields.io/github/languages/top/s0md3v/XSStrike) | -| Scanner/XSS | [XSpear](https://github.com/hahwul/XSpear) | Powerfull XSS Scanning and Parameter analysis tool&gem | ![](https://img.shields.io/github/stars/hahwul/XSpear) | ![](https://img.shields.io/github/languages/top/hahwul/XSpear) | -| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | ![](https://img.shields.io/github/stars/hahwul/dalfox) | ![](https://img.shields.io/github/languages/top/hahwul/dalfox) | -| Scanner/XSS | [domdig](https://github.com/fcavallarin/domdig) | DOM XSS scanner for Single Page Applications | ![](https://img.shields.io/github/stars/fcavallarin/domdig) | ![](https://img.shields.io/github/languages/top/fcavallarin/domdig) | -| Scanner/XSS | [ezXSS](https://github.com/ssl/ezXSS) | ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. | ![](https://img.shields.io/github/stars/ssl/ezXSS) | ![](https://img.shields.io/github/languages/top/ssl/ezXSS) | -| Scanner/XSS | [findom-xss](https://github.com/dwisiswant0/findom-xss) | A fast DOM based XSS vulnerability scanner with simplicity. | ![](https://img.shields.io/github/stars/dwisiswant0/findom-xss) | ![](https://img.shields.io/github/languages/top/dwisiswant0/findom-xss) | -| Scanner/XSS | [xsscrapy](https://github.com/DanMcInerney/xsscrapy) | XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. | ![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy) | ![](https://img.shields.io/github/languages/top/DanMcInerney/xsscrapy) | -| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. | ![](https://img.shields.io/github/stars/epsylon/xsser) | ![](https://img.shields.io/github/languages/top/epsylon/xsser) | -| ToolBox/ALL | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools | ![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz) | ![](https://img.shields.io/github/languages/top/m4ll0k/Bug-Bounty-Toolz) | -| ToolBox/ALL | [CyberChef](https://github.com/gchq/CyberChef) | The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis | ![](https://img.shields.io/github/stars/gchq/CyberChef) | ![](https://img.shields.io/github/languages/top/gchq/CyberChef) | -| ToolBox/ALL | [hacks](https://github.com/tomnomnom/hacks) | A collection of hacks and one-off scripts | ![](https://img.shields.io/github/stars/tomnomnom/hacks) | ![](https://img.shields.io/github/languages/top/tomnomnom/hacks) | -| ToolBox/ALL | [pentest-tools](https://github.com/gwen001/pentest-tools) | Custom pentesting tools | ![](https://img.shields.io/github/stars/gwen001/pentest-tools) | ![](https://img.shields.io/github/languages/top/gwen001/pentest-tools) | -| ToolBox/DNS Rebind | [singularity](https://github.com/nccgroup/singularity) | A DNS rebinding attack framework. | ![](https://img.shields.io/github/stars/nccgroup/singularity) | ![](https://img.shields.io/github/languages/top/nccgroup/singularity) | -| Utility/ANY | [anew](https://github.com/tomnomnom/anew) | A tool for adding new lines to files, skipping duplicates | ![](https://img.shields.io/github/stars/tomnomnom/anew) | ![](https://img.shields.io/github/languages/top/tomnomnom/anew) | -| Utility/ANY | [bat](https://github.com/sharkdp/bat) | A cat(1) clone with wings. | ![](https://img.shields.io/github/stars/sharkdp/bat) | ![](https://img.shields.io/github/languages/top/sharkdp/bat) | -| Utility/ANY | [fzf](https://github.com/junegunn/fzf) | A command-line fuzzy finder | ![](https://img.shields.io/github/stars/junegunn/fzf) | ![](https://img.shields.io/github/languages/top/junegunn/fzf) | -| Utility/ANY | [gee](https://github.com/hahwul/gee) | 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go | ![](https://img.shields.io/github/stars/hahwul/gee) | ![](https://img.shields.io/github/languages/top/hahwul/gee) | -| Utility/ANY | [grc](https://github.com/garabik/grc) | generic colouriser | ![](https://img.shields.io/github/stars/garabik/grc) | ![](https://img.shields.io/github/languages/top/garabik/grc) | -| Utility/ANY | [pet](https://github.com/knqyf263/pet) | Simple command-line snippet manager, written in Go. | ![](https://img.shields.io/github/stars/knqyf263/pet) | ![](https://img.shields.io/github/languages/top/knqyf263/pet) | -| Utility/B-ADDON | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) | -| Utility/BRIDGE | [Atlas](https://github.com/m4ll0k/Atlas) | Quick SQLMap Tamper Suggester | ![](https://img.shields.io/github/stars/m4ll0k/Atlas) | ![](https://img.shields.io/github/languages/top/m4ll0k/Atlas) | -| Utility/CRACK | [hashcat](https://github.com/hashcat/hashcat/) | World's fastest and most advanced password recovery utility | ![](https://img.shields.io/github/stars/hashcat/hashcat/) | ![](https://img.shields.io/github/languages/top/hashcat/hashcat/) | -| Utility/CSP | [CSP Evaluator](https://csp-evaluator.withgoogle.com) | Online CSP Evaluator from google|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Utility/ENV | [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) | GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep | ![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns) | ![](https://img.shields.io/github/languages/top/1ndianl33t/Gf-Patterns) | -| Utility/ENV | [recon_profile](https://github.com/nahamsec/recon_profile) | Recon profile (bash profile) for bugbounty | ![](https://img.shields.io/github/stars/nahamsec/recon_profile) | ![](https://img.shields.io/github/languages/top/nahamsec/recon_profile) | -| Utility/ETC | [Phoenix](https://www.hahwul.com/p/phoenix.html) | hahwul's online tools|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Utility/FLOW | [SequenceDiagram](https://sequencediagram.org) | Online tool for creating UML sequence diagrams|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| -| Utility/GIT | [gitls](https://github.com/hahwul/gitls) | Listing git repository from URL/User/Org | ![](https://img.shields.io/github/stars/hahwul/gitls) | ![](https://img.shields.io/github/languages/top/hahwul/gitls) | -| Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things | ![](https://img.shields.io/github/stars/tomnomnom/gf) | ![](https://img.shields.io/github/languages/top/tomnomnom/gf) | -| Utility/HTTP | [curl](https://github.com/curl/curl) | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features | ![](https://img.shields.io/github/stars/curl/curl) | ![](https://img.shields.io/github/languages/top/curl/curl) | -| Utility/HTTP | [httpie](https://github.com/httpie/httpie) | As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie | ![](https://img.shields.io/github/stars/httpie/httpie) | ![](https://img.shields.io/github/languages/top/httpie/httpie) | -| Utility/HTTP | [hurl](https://github.com/Orange-OpenSource/hurl) | Hurl, run and test HTTP requests. | ![](https://img.shields.io/github/stars/Orange-OpenSource/hurl) | ![](https://img.shields.io/github/languages/top/Orange-OpenSource/hurl) | -| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! | ![](https://img.shields.io/github/stars/tomnomnom/gron) | ![](https://img.shields.io/github/languages/top/tomnomnom/gron) | -| Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C | ![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker) | ![](https://img.shields.io/github/languages/top/brendan-rius/c-jwt-cracker) | -| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker | ![](https://img.shields.io/github/stars/lmammino/jwt-cracker) | ![](https://img.shields.io/github/languages/top/lmammino/jwt-cracker) | -| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) | ![](https://img.shields.io/github/stars/hahwul/jwt-hack) | ![](https://img.shields.io/github/languages/top/hahwul/jwt-hack) | -| Utility/NOTIFY | [Emissary](https://github.com/BountyStrike/Emissary) | Send notifications on different channels such as Slack, Telegram, Discord etc. | ![](https://img.shields.io/github/stars/BountyStrike/Emissary) | ![](https://img.shields.io/github/languages/top/BountyStrike/Emissary) | -| Utility/NOTIFY | [ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack) | Hacky Slack - a bash script that sends beautiful messages to Slack | ![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack) | ![](https://img.shields.io/github/languages/top/openbridge/ob_hacky_slack) | -| Utility/NOTIFY | [slackcat](https://github.com/bcicen/slackcat) | CLI utility to post files and command output to slack | ![](https://img.shields.io/github/stars/bcicen/slackcat) | ![](https://img.shields.io/github/languages/top/bcicen/slackcat) | -| Utility/OAST | [TukTuk](https://github.com/ArturSS7/TukTuk) | Tool for catching and logging different types of requests. | ![](https://img.shields.io/github/stars/ArturSS7/TukTuk) | ![](https://img.shields.io/github/languages/top/ArturSS7/TukTuk) | -| Utility/OAST | [boast](https://github.com/marcoagner/boast) | The BOAST Outpost for AppSec Testing (v0.1.0) | ![](https://img.shields.io/github/stars/marcoagner/boast) | ![](https://img.shields.io/github/languages/top/marcoagner/boast) | -| Utility/OAST | [dnsobserver](https://github.com/allyomalley/dnsobserver) | A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. | ![](https://img.shields.io/github/stars/allyomalley/dnsobserver) | ![](https://img.shields.io/github/languages/top/allyomalley/dnsobserver) | -| Utility/OAST | [interactsh](https://github.com/projectdiscovery/interactsh) | An OOB interaction gathering server and client library | ![](https://img.shields.io/github/stars/projectdiscovery/interactsh) | ![](https://img.shields.io/github/languages/top/projectdiscovery/interactsh) | -| Utility/PAYLOAD | [230-OOB](https://github.com/lc/230-OOB) | An Out-of-Band XXE server for retrieving file contents over FTP. | ![](https://img.shields.io/github/stars/lc/230-OOB) | ![](https://img.shields.io/github/languages/top/lc/230-OOB) | -| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r | ![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r) | ![](https://img.shields.io/github/languages/top/NotSoSecure/Blacklist3r) | -| Utility/PAYLOAD | [Findsploit](https://github.com/1N3/Findsploit) | Find exploits in local and online databases instantly | ![](https://img.shields.io/github/stars/1N3/Findsploit) | ![](https://img.shields.io/github/languages/top/1N3/Findsploit) | -| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | ![](https://img.shields.io/github/stars/tarunkant/Gopherus) | ![](https://img.shields.io/github/languages/top/tarunkant/Gopherus) | -| Utility/PAYLOAD | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. | ![](https://img.shields.io/github/stars/1N3/IntruderPayloads) | ![](https://img.shields.io/github/languages/top/1N3/IntruderPayloads) | -| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF | ![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings) | ![](https://img.shields.io/github/languages/top/swisskyrepo/PayloadsAllTheThings) | -| Utility/PAYLOAD | [PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) | 📡 PoC auto collect from GitHub. Be careful malware. | ![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub) | ![](https://img.shields.io/github/languages/top/nomi-sec/PoC-in-GitHub) | -| Utility/PAYLOAD | [XXEinjector](https://github.com/enjoiz/XXEinjector) | Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods. | ![](https://img.shields.io/github/stars/enjoiz/XXEinjector) | ![](https://img.shields.io/github/languages/top/enjoiz/XXEinjector) | -| Utility/PAYLOAD | [docem](https://github.com/whitel1st/docem) | Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids) | ![](https://img.shields.io/github/stars/whitel1st/docem) | ![](https://img.shields.io/github/languages/top/whitel1st/docem) | -| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker | ![](https://img.shields.io/github/stars/dwisiswant0/hinject) | ![](https://img.shields.io/github/languages/top/dwisiswant0/hinject) | -| Utility/PAYLOAD | [jsfuck](https://github.com/aemkei/jsfuck) | Write any JavaScript with 6 Characters | ![](https://img.shields.io/github/stars/aemkei/jsfuck) | ![](https://img.shields.io/github/languages/top/aemkei/jsfuck) | -| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes | ![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe) | ![](https://img.shields.io/github/languages/top/BuffaloWill/oxml_xxe) | -| Utility/PAYLOAD | [quickjack](https://github.com/samyk/quickjack) | Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks. | ![](https://img.shields.io/github/stars/samyk/quickjack) | ![](https://img.shields.io/github/languages/top/samyk/quickjack) | -| Utility/PAYLOAD | [security-research-pocs](https://github.com/google/security-research-pocs) | Proof-of-concept codes created as part of security research done by Google Security Team. | ![](https://img.shields.io/github/stars/google/security-research-pocs) | ![](https://img.shields.io/github/languages/top/google/security-research-pocs) | -| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 | ![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads) | ![](https://img.shields.io/github/languages/top/hakluke/weaponised-XSS-payloads) | -| Utility/PAYLOAD | [xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data) | This repository contains all the XSS cheatsheet data to allow contributions from the community. | ![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data) | ![](https://img.shields.io/github/languages/top/PortSwigger/xss-cheatsheet-data) | -| Utility/PAYLOAD | [xssor2](https://github.com/evilcos/xssor2) | XSS'OR - Hack with JavaScript. | ![](https://img.shields.io/github/stars/evilcos/xssor2) | ![](https://img.shields.io/github/languages/top/evilcos/xssor2) | -| Utility/PAYLOAD | [xxeserv](https://github.com/staaldraad/xxeserv) | A mini webserver with FTP support for XXE payloads | ![](https://img.shields.io/github/stars/staaldraad/xxeserv) | ![](https://img.shields.io/github/languages/top/staaldraad/xxeserv) | -| Utility/PAYLOAD | [ysoserial](https://github.com/frohoff/ysoserial) | A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | ![](https://img.shields.io/github/stars/frohoff/ysoserial) | ![](https://img.shields.io/github/languages/top/frohoff/ysoserial) | -| Utility/PAYLOAD | [ysoserial.net](https://github.com/pwntester/ysoserial.net) | Deserialization payload generator for a variety of .NET formatters | ![](https://img.shields.io/github/stars/pwntester/ysoserial.net) | ![](https://img.shields.io/github/languages/top/pwntester/ysoserial.net) | -| Utility/PENTEST | [axiom](https://github.com/pry0cc/axiom) | A dynamic infrastructure toolkit for red teamers and bug bounty hunters! | ![](https://img.shields.io/github/stars/pry0cc/axiom) | ![](https://img.shields.io/github/languages/top/pry0cc/axiom) | -| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) | ![](https://img.shields.io/github/stars/cytopia/pwncat) | ![](https://img.shields.io/github/languages/top/cytopia/pwncat) | -| Utility/S3 | [s3reverse](https://github.com/hahwul/s3reverse) | The format of various s3 buckets is convert in one format. for bugbounty and security testing. | ![](https://img.shields.io/github/stars/hahwul/s3reverse) | ![](https://img.shields.io/github/languages/top/hahwul/s3reverse) | -| Utility/SETUP | [autochrome](https://github.com/nccgroup/autochrome) | This tool downloads, installs, and configures a shiny new copy of Chromium. | ![](https://img.shields.io/github/stars/nccgroup/autochrome) | ![](https://img.shields.io/github/languages/top/nccgroup/autochrome) | -| Utility/SHOT | [gowitness](https://github.com/sensepost/gowitness) | 🔍 gowitness - a golang, web screenshot utility using Chrome Headless | ![](https://img.shields.io/github/stars/sensepost/gowitness) | ![](https://img.shields.io/github/languages/top/sensepost/gowitness) | -| Utility/Scripts | [tiscripts](https://github.com/defparam/tiscripts) | Turbo Intruder Scripts | ![](https://img.shields.io/github/stars/defparam/tiscripts) | ![](https://img.shields.io/github/languages/top/defparam/tiscripts) | -| Utility/TEMPLATE | [bountyplz](https://github.com/fransr/bountyplz) | Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) | ![](https://img.shields.io/github/stars/fransr/bountyplz) | ![](https://img.shields.io/github/languages/top/fransr/bountyplz) | -| Utility/TEMPLATE | [template-generator](https://github.com/fransr/template-generator) | A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. | ![](https://img.shields.io/github/stars/fransr/template-generator) | ![](https://img.shields.io/github/languages/top/fransr/template-generator) | -| Utility/URL | [burl](https://github.com/tomnomnom/burl) | A Broken-URL Checker | ![](https://img.shields.io/github/stars/tomnomnom/burl) | ![](https://img.shields.io/github/languages/top/tomnomnom/burl) | -| Utility/URL | [cf-check](https://github.com/dwisiswant0/cf-check) | Cloudflare Checker written in Go | ![](https://img.shields.io/github/stars/dwisiswant0/cf-check) | ![](https://img.shields.io/github/languages/top/dwisiswant0/cf-check) | -| Utility/URL | [grex](https://github.com/pemistahl/grex) | A command-line tool and library for generating regular expressions from user-provided test cases | ![](https://img.shields.io/github/stars/pemistahl/grex) | ![](https://img.shields.io/github/languages/top/pemistahl/grex) | -| Utility/URL | [hakcheckurl](https://github.com/hakluke/hakcheckurl) | Takes a list of URLs and returns their HTTP response codes | ![](https://img.shields.io/github/stars/hakluke/hakcheckurl) | ![](https://img.shields.io/github/languages/top/hakluke/hakcheckurl) | -| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value | ![](https://img.shields.io/github/stars/tomnomnom/qsreplace) | ![](https://img.shields.io/github/languages/top/tomnomnom/qsreplace) | -| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin | ![](https://img.shields.io/github/stars/tomnomnom/unfurl) | ![](https://img.shields.io/github/languages/top/tomnomnom/unfurl) | -| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code & content length checker | ![](https://img.shields.io/github/stars/1ndianl33t/urlprobe) | ![](https://img.shields.io/github/languages/top/1ndianl33t/urlprobe) | -| Utility/URL | [uro](https://github.com/s0md3v/uro) | declutters url lists for crawling/pentesting | ![](https://img.shields.io/github/stars/s0md3v/uro) | ![](https://img.shields.io/github/languages/top/s0md3v/uro) | -| Utility/WAF | [gotestwaf](https://github.com/wallarm/gotestwaf) | An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses | ![](https://img.shields.io/github/stars/wallarm/gotestwaf) | ![](https://img.shields.io/github/languages/top/wallarm/gotestwaf) | -| Utility/WORD | [wordlists](https://github.com/assetnote/wordlists) | Automated & Manual Wordlists provided by Assetnote | ![](https://img.shields.io/github/stars/assetnote/wordlists) | ![](https://img.shields.io/github/languages/top/assetnote/wordlists) | -| Utility/WORD | [CT_subdomains](https://github.com/internetwache/CT_subdomains) | An hourly updated list of subdomains gathered from certificate transparency logs | ![](https://img.shields.io/github/stars/internetwache/CT_subdomains) | ![](https://img.shields.io/github/languages/top/internetwache/CT_subdomains) | -| Utility/WORD | [SecLists](https://github.com/danielmiessler/SecLists) | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. | ![](https://img.shields.io/github/stars/danielmiessler/SecLists) | ![](https://img.shields.io/github/languages/top/danielmiessler/SecLists) | -| Utility/WORD | [longtongue](https://github.com/edoardottt/longtongue) | Customized Password/Passphrase List inputting Target Info | ![](https://img.shields.io/github/stars/edoardottt/longtongue) | ![](https://img.shields.io/github/languages/top/edoardottt/longtongue) | -| Utility/WORD | [subs_all](https://github.com/emadshanab/subs_all) | Subdomain Enumeration Wordlist. 8956437 unique words. Updated. | ![](https://img.shields.io/github/stars/emadshanab/subs_all) | ![](https://img.shields.io/github/languages/top/emadshanab/subs_all) | -| Utility/WORDLIST | [gotator](https://github.com/Josue87/gotator) | Gotator is a tool to generate DNS wordlists through permutations. | ![](https://img.shields.io/github/stars/Josue87/gotator) | ![](https://img.shields.io/github/languages/top/Josue87/gotator) | -| Utility/XS-Leaks | [xsinator.com](https://github.com/RUB-NDS/xsinator.com) | XS-Leak Browser Test Suite | ![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com) | ![](https://img.shields.io/github/languages/top/RUB-NDS/xsinator.com) | +*Attributes* +| | Attributes | +|-------|---------------------------------------------------| +| Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| +| Tags | `infra` `param` `subdomains` `dns` `domain` `apk` `jwt` `ssrf` `s3` `sqli` `aaa` `403` `xss` `ssl` `csp` `xxe` `url` `oast` `wordlist` `report` | +| Langs | `Go` `Shell` `Java` `Python` `Rust` `C` `Ruby` `JavaScript` `Perl` `PHP` `C#` `TypeScript` `BlitzBasic` `Kotlin` `Typescript` `HTML` `CSS` `C++` `Kotiln` | + +### Tools +| Type | Name | Description | Star | Tags | Badges | +| --- | --- | --- | --- | --- | --- | +|Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[Chaos Web](https://chaos.projectdiscovery.io)| actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |![](https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Recon|[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|![](https://img.shields.io/github/stars/hakluke/haktrails?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |![](https://img.shields.io/github/stars/tomnomnom/meg?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|![](https://img.shields.io/github/stars/opsdisk/pagodo?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|`domain`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |![](https://img.shields.io/github/stars/EdOverflow/megplus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |![](https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |![](https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |![](https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |![](https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|![](https://img.shields.io/github/stars/six2dez/reconftw?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|![](https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |![](https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |![](https://img.shields.io/github/stars/michenriksen/gitrob?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |![](https://img.shields.io/github/stars/htcat/htcat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|![](https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|![](https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|`apk`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs |![](https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|![](https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|![](https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |![](https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Fuzzer|[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|![](https://img.shields.io/github/stars/assetnote/kiterunner?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Fuzzer|[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |![](https://img.shields.io/github/stars/riza/medusa?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Fuzzer|[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |![](https://img.shields.io/github/stars/ffuf/ffuf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|`ssrf`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/perl.png)| +|Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |![](https://img.shields.io/github/stars/hashcat/hashcat/?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Fuzzer|[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|![](https://img.shields.io/github/stars/epi052/feroxbuster?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. |![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|![](https://img.shields.io/github/stars/1N3/BruteX?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Fuzzer|[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |![](https://img.shields.io/github/stars/xmendez/wfuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/perl.png)| +|Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|`sqli`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|`403`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[fockcache](https://github.com/tismayil/fockcache)|FockCache - Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |![](https://img.shields.io/github/stars/s0md3v/Striker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|![](https://img.shields.io/github/stars/neex/http2smugl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |![](https://img.shields.io/github/stars/Grunny/zap-cli?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|`ssl`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |![](https://img.shields.io/github/stars/codingo/VHostScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|![](https://img.shields.io/github/stars/epinna/tplmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|`ssl`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |![](https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|`403`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |![](https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|![](https://img.shields.io/github/stars/blackcrw/wprecon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |![](https://img.shields.io/github/stars/sullo/nikto?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/perl.png)| +|Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |![](https://img.shields.io/github/stars/gwen001/github-search?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner|![](https://img.shields.io/github/stars/enkomio/Taipan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Exploit|[SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja)|SQL Injection scanner|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)| SQL Injection scanner|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|`xxe`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|`url`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[SequenceDiagram](https://sequencediagram.org)| Online tool for creating UML sequence diagrams|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[grc](https://github.com/garabik/grc)|generic colouriser|![](https://img.shields.io/github/stars/garabik/grc?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/php.png)| +|Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |![](https://img.shields.io/github/stars/tomnomnom/hacks?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| +|Utils|[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|![](https://img.shields.io/github/stars/hahwul/gitls?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |![](https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[httptoolkit](https://github.com/httptoolkit/httptoolkit)|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac|![](https://img.shields.io/github/stars/httptoolkit/httptoolkit?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|![](https://img.shields.io/github/stars/curl/curl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| +|Utils|[Phoenix](https://www.hahwul.com/p/phoenix.html)| hahwul's online tools|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|![](https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/typescript.png)| +|Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|`oast` `dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |![](https://img.shields.io/github/stars/cytopia/pwncat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |![](https://img.shields.io/github/stars/fransr/template-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|`xxe` `xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/html.png)| +|Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|`xxe`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|![](https://img.shields.io/github/stars/knqyf263/pet?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|![](https://img.shields.io/github/stars/hahwul/gee?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|![](https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|`wordlist`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/css.png)| +|Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|`report`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| +|Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. |![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |![](https://img.shields.io/github/stars/gchq/CyberChef?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|![](https://img.shields.io/github/stars/google/security-research-pocs?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c++.png)| +|Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable! |![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|![](https://img.shields.io/github/stars/samyk/quickjack?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |![](https://img.shields.io/github/stars/tomnomnom/gf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/html.png)| +|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/php.png)| +|Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.|![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|![](https://img.shields.io/github/stars/sharkdp/bat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|![](https://img.shields.io/github/stars/defparam/tiscripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|![](https://img.shields.io/github/stars/pemistahl/grex?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| +|Utils|[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| +|Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| + +### Bookmarklets +| Type | Name | Description | Star | Tags | Badges | +| --- | --- | --- | --- | --- | --- | + +### Browser Addons +| Type | Name | Description | Star | Tags | Badges | +| --- | --- | --- | --- | --- | --- | +|Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/typescript.png)| +|Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae)|quick and easy way to switch between user-agents.|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh)|Dark mode to any site|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| + +### Burpsuite and ZAP Addons +| Type | Name | Description | Star | Tags | Badges | +| --- | --- | --- | --- | --- | --- | +|Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/blitzbasic.png)| +|Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotlin.png)| +|Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/blitzbasic.png)| +|Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotiln.png)| +|utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotlin.png)| +|Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| +|Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| ## Thanks to (Contributor) I would like to thank everyone who helped with this project 👍😎 -![](/CONTRIBUTORS.svg) +![](/images/CONTRIBUTORS.svg) + diff --git a/add-tool.go b/add-tool.go deleted file mode 100644 index b21f485..0000000 --- a/add-tool.go +++ /dev/null @@ -1,214 +0,0 @@ -package main - -import ( - "bufio" - "encoding/json" - "flag" - "fmt" - "golang.org/x/net/html" - "io" - "io/ioutil" - "net/http" - "net/url" - "os" - "strconv" - "strings" -) - -/* -template -| [WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons) | template | ![](https://img.shields.io/github/stars/hahwul/WebHackersWeapons) | ![](https://img.shields.io/github/languages/top/hahwul/WebHackersWeapons) | ![](https://img.shields.io/github/repo-size/hahwul/WebHackersWeapons)
![](https://img.shields.io/github/license/hahwul/WebHackersWeapons)
![](https://img.shields.io/github/forks/hahwul/WebHackersWeapons)
![](https://img.shields.io/github/watchers/hahwul/WebHackersWeapons) | -*/ - -type Tools struct { - Type, Data, Method, Description string - Install, Update map[string]string -} - -func isTitleElement(n *html.Node) bool { - return n.Type == html.ElementNode && n.Data == "title" -} - -func traverse(n *html.Node) (string, bool) { - if isTitleElement(n) { - return n.FirstChild.Data, true - } - - for c := n.FirstChild; c != nil; c = c.NextSibling { - result, ok := traverse(c) - if ok { - return result, ok - } - } - - return "", false -} - -func GetHtmlTitle(r io.Reader) (string, bool) { - doc, err := html.Parse(r) - if err != nil { - panic("Fail to parse html") - } - - return traverse(doc) -} - -func writeJSON(category, name, method, data, udesc string) { - jsonFile, err := os.Open("data.json") - // if we os.Open returns an error then handle it - if err != nil { - fmt.Println(err) - } - fmt.Println("Successfully Opened data.json") - // defer the closing of our jsonFile so that we can parse it later on - defer jsonFile.Close() - byteValue, _ := ioutil.ReadAll(jsonFile) - var result map[string]interface{} - install := map[string]string{ - "MacOS":"", - "Linux":"", - "Windows":"", - } - update := map[string]string{ - "MacOS":"", - "Linux":"", - "Windows":"", - } - json.Unmarshal([]byte(byteValue), &result) - tool := Tools{ - Type: category, - Data: data, - Method: method, - Description: udesc, - Install: install, - Update: update, - } - if result[name] != nil { - resultData := result[name].(map[string]interface{}) - resultInstall := resultData["Install"].(map[string]interface{}) - resultUpdate := resultData["Update"].(map[string]interface{}) - tool.Install["MacOS"] = resultInstall["MacOS"].(string) - tool.Install["Linux"] = resultInstall["Linux"].(string) - tool.Install["Windows"] = resultInstall["Windows"].(string) - tool.Update["MacOS"] = resultUpdate["MacOS"].(string) - tool.Update["Linux"] = resultUpdate["Linux"].(string) - tool.Update["Windows"] = resultUpdate["Windows"].(string) - } - result[name] = tool - file, _ := json.MarshalIndent(result, "", " ") - _ = ioutil.WriteFile("data.json", file, 0644) -} - -func main() { - repourl := flag.String("url", "", "any url") - first := flag.Bool("isFirst", false, "if you add new type, it use") - flag.Parse() - if flag.NFlag() == 0 { - flag.Usage() - return - } - u, err := url.Parse(*repourl) - if err != nil { - panic(err) - } - - if u.Host == "github.com" { - //fmt.Println(u.Path) - name := strings.Split(u.Path, "/")[2] - //fmt.Println(name) - desc := "asdf" - resp, err := http.Get(*repourl) - if err != nil { - panic(err) - } - defer resp.Body.Close() - - if title, ok := GetHtmlTitle(resp.Body); ok { - if strings.Contains(string(title), ": ") { - desc = strings.Split(string(title), ": ")[1] - } else { - reader1 := bufio.NewReader(os.Stdin) - fmt.Println("[+] Don't have descriptions / input description") - a, _ := reader1.ReadString('\n') - desc = strings.TrimRight(a, "\r\n") - - } - } else { - println("Fail to get HTML title") - } - - typeFile, err := os.Open("type.lst") - // if we os.Open returns an error then handle it - if err != nil { - fmt.Println(err) - } - fmt.Println("Successfully Opened type.lst") - // defer the closing of our jsonFile so that we can parse it later on - defer typeFile.Close() - index := 0 - m := make(map[int]string) - reader := bufio.NewReader(typeFile) - for { - line, isPrefix, err := reader.ReadLine() - if isPrefix || err != nil { - break - } - m[index] = string(line) - fmt.Println("[" + strconv.Itoa(index) + "] " + string(line)) - index = index + 1 - } - var choicetype int - fmt.Println("[+] What is type?") - _, err = fmt.Scan(&choicetype) - fmt.Println(m[choicetype]) - reader1 := bufio.NewReader(os.Stdin) - fmt.Println("[+] What is method(e.g XSS, WVS, SSL, ETC..)?") - method, _ := reader1.ReadString('\n') - method = strings.TrimRight(method, "\r\n") - writeJSON(m[choicetype], name, method, "| "+m[choicetype]+"/"+method+" | ["+name+"]("+*repourl+") | "+desc+" | ![](https://img.shields.io/github/stars"+u.Path+") | ![](https://img.shields.io/github/languages/top"+u.Path+") |", desc) - } else { - reader := bufio.NewReader(os.Stdin) - fmt.Println("[+] What is name?") - name, _ := reader.ReadString('\n') - name = strings.TrimRight(name, "\r\n") - fmt.Println("[+] Input Description?") - udesc, _ := reader.ReadString('\n') - udesc = strings.TrimRight(udesc, "\r\n") - - typeFile, err := os.Open("type.lst") - // if we os.Open returns an error then handle it - if err != nil { - fmt.Println(err) - } - fmt.Println("Successfully Opened type.lst") - // defer the closing of our jsonFile so that we can parse it later on - defer typeFile.Close() - index := 0 - m := make(map[int]string) - readerF := bufio.NewReader(typeFile) - for { - line, isPrefix, err := readerF.ReadLine() - if isPrefix || err != nil { - break - } - m[index] = string(line) - fmt.Println("[" + strconv.Itoa(index) + "] " + string(line)) - index = index + 1 - } - var choicetype int - fmt.Println("What is type?") - _, err = fmt.Scan(&choicetype) - fmt.Println(m[choicetype]) - reader1 := bufio.NewReader(os.Stdin) - fmt.Println("[+] What is method(e.g XSS, WVS, SSL, ETC..)?") - method, _ := reader1.ReadString('\n') - method = strings.TrimRight(method, "\r\n") - writeJSON(m[choicetype], name, method, "| "+m[choicetype]+"/"+method+" | ["+name+"]("+*repourl+") | "+udesc+"|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)",udesc) - } - - if *first { - fmt.Println("| Type | Name | Description | Popularity | Language |") - fmt.Println("| ---------- | :---------- | :----------: | :----------: | :----------: |") - } - //fmt.Println("| [" + name + "](" + *repourl + ") | " + desc + " | ![](https://img.shields.io/github/stars" + u.Path + ") | ![](https://img.shields.io/github/languages/top" + u.Path + ") | ![](https://img.shields.io/github/repo-size" + u.Path + ")
![](https://img.shields.io/github/license" + u.Path + ")
![](https://img.shields.io/github/forks" + u.Path + ")
![](https://img.shields.io/github/watchers" + u.Path + ") |") -} diff --git a/data.json b/data.json deleted file mode 100644 index 5fdf16a..0000000 --- a/data.json +++ /dev/null @@ -1,4034 +0,0 @@ -{ - "230-OOB": { - "Data": "| Utility/PAYLOAD | [230-OOB](https://github.com/lc/230-OOB) | An Out-of-Band XXE server for retrieving file contents over FTP. | ![](https://img.shields.io/github/stars/lc/230-OOB) | ![](https://img.shields.io/github/languages/top/lc/230-OOB) |", - "Description": "An Out-of-Band XXE server for retrieving file contents over FTP.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "3klCon": { - "Data": "| Discovery/ALL | [3klCon](https://github.com/eslam3kl/3klCon) | Automation Recon tool which works with Large \u0026 Medium scopes. It performs more than 20 tasks and gets back all the results in separated files. | ![](https://img.shields.io/github/stars/eslam3kl/3klCon) | ![](https://img.shields.io/github/languages/top/eslam3kl/3klCon) |", - "Description": "Automation Recon tool which works with Large \u0026 Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "AWSBucketDump": { - "Data": "| Scanner/S3 | [AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump) | Security Tool to Look For Interesting Files in S3 Buckets | ![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump) | ![](https://img.shields.io/github/languages/top/jordanpotti/AWSBucketDump) |", - "Description": "Security Tool to Look For Interesting Files in S3 Buckets", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "S3", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Amass": { - "Data": "| Discovery/DOMAIN | [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery | ![](https://img.shields.io/github/stars/OWASP/Amass) | ![](https://img.shields.io/github/languages/top/OWASP/Amass) |", - "Description": "In-depth Attack Surface Mapping and Asset Discovery ", - "Install": { - "Linux": "sudo snap install amass", - "MacOS": "brew tap caffix/amass; brew install amass", - "Windows": "" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "sudo snap refresh amass", - "MacOS": "brew upgrade amass", - "Windows": "" - } - }, - "Arjun": { - "Data": "| Discovery/HTTP | [Arjun](https://github.com/s0md3v/Arjun) | HTTP parameter discovery suite. | ![](https://img.shields.io/github/stars/s0md3v/Arjun) | ![](https://img.shields.io/github/languages/top/s0md3v/Arjun) |", - "Description": "HTTP parameter discovery suite. ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Arjun ; cd Arjun; pip3 install requests", - "MacOS": "git clone https://github.com/s0md3v/Arjun ; cd Arjun; pip3 install requests", - "Windows": "git clone https://github.com/s0md3v/Arjun ; cd Arjun; pip3 install requests" - }, - "Method": "HTTP", - "Type": "Discovery", - "Update": { - "Linux": "cd Arjun; git pull -v ", - "MacOS": "cd Arjun; git pull -v ", - "Windows": "cd Arjun; git pull -v " - } - }, - "Assetnote Wordlists": { - "Data": "| Utility/WORD | [wordlists](https://github.com/assetnote/wordlists) | Automated \u0026 Manual Wordlists provided by Assetnote | ![](https://img.shields.io/github/stars/assetnote/wordlists) | ![](https://img.shields.io/github/languages/top/assetnote/wordlists) |", - "Description": "Automated \u0026 Manual Wordlists provided by Assetnote", - "Install": { - "Linux": "git clone https://github.com/assetnote/wordlists", - "MacOS": "git clone https://github.com/assetnote/wordlists", - "Windows": "git clone https://github.com/assetnote/wordlists" - }, - "Method": "WORD", - "Type": "Utility", - "Update": { - "Linux": "cd wordlists ; git pull -v", - "MacOS": "cd wordlists ; git pull -v", - "Windows": "cd wordlists ; git pull -v" - } - }, - "Atlas": { - "Data": "| Utility/BRIDGE | [Atlas](https://github.com/m4ll0k/Atlas) | Quick SQLMap Tamper Suggester | ![](https://img.shields.io/github/stars/m4ll0k/Atlas) | ![](https://img.shields.io/github/languages/top/m4ll0k/Atlas) |", - "Description": "Quick SQLMap Tamper Suggester ", - "Install": { - "Linux": "git clone https://github.com/m4ll0k/Atlas ; cd Atlas; pip3 install pretty", - "MacOS": "git clone https://github.com/m4ll0k/Atlas ; cd Atlas; pip3 install pretty", - "Windows": "git clone https://github.com/m4ll0k/Atlas ; cd Atlas; pip3 install pretty" - }, - "Method": "BRIDGE", - "Type": "Utility", - "Update": { - "Linux": "cd Atlas; git pull -v", - "MacOS": "cd Atlas; git pull -v", - "Windows": "cd Atlas; git pull -v" - } - }, - "Blacklist3r": { - "Data": "| Utility/PAYLOAD | [Blacklist3r](https://github.com/NotSoSecure/Blacklist3r) | project-blacklist3r | ![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r) | ![](https://img.shields.io/github/languages/top/NotSoSecure/Blacklist3r) |", - "Description": "project-blacklist3r ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "BruteX": { - "Data": "| Scanner/FUZZ | [BruteX](https://github.com/1N3/BruteX) | Automatically brute force all services running on a target. | ![](https://img.shields.io/github/stars/1N3/BruteX) | ![](https://img.shields.io/github/languages/top/1N3/BruteX) |", - "Description": "Automatically brute force all services running on a target.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Bug-Bounty-Toolz": { - "Data": "| ToolBox/ALL | [Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz) | BBT - Bug Bounty Tools | ![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz) | ![](https://img.shields.io/github/languages/top/m4ll0k/Bug-Bounty-Toolz) |", - "Description": "BBT - Bug Bounty Tools ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "ToolBox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "BurpSuite": { - "Data": "| Army-Knife/PROXY | [BurpSuite](https://portswigger.net/burp) | the BurpSuite Project|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "the BurpSuite Project", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PROXY", - "Type": "Army-Knife", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "CSP Evaluator": { - "Data": "| Utility/CSP | [CSP Evaluator](https://csp-evaluator.withgoogle.com) | Online CSP Evaluator from google|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " Online CSP Evaluator from google|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CSP", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "CT_subdomains": { - "Data": "| Utility/WORD | [CT_subdomains](https://github.com/internetwache/CT_subdomains) | An hourly updated list of subdomains gathered from certificate transparency logs | ![](https://img.shields.io/github/stars/internetwache/CT_subdomains) | ![](https://img.shields.io/github/languages/top/internetwache/CT_subdomains) |", - "Description": "An hourly updated list of subdomains gathered from certificate transparency logs ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WORD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Chaos Web": { - "Data": "| Discovery/DOMAIN | [Chaos Web](https://chaos.projectdiscovery.io) | actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)", - "Description": " actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Chromium-based-XSS-Taint-Tracking": { - "Data": "| Scanner/XSS | [Cyclops](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking) | Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink. | ![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking) | ![](https://img.shields.io/github/languages/top/v8blink/Chromium-based-XSS-Taint-Tracking) |", - "Description": "Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "CorsMe": { - "Data": "| Scanner/CORS | [CorsMe](https://github.com/Shivangx01b/CorsMe) | Cross Origin Resource Sharing MisConfiguration Scanner | ![](https://img.shields.io/github/stars/Shivangx01b/CorsMe) | ![](https://img.shields.io/github/languages/top/Shivangx01b/CorsMe) |", - "Description": "Cross Origin Resource Sharing MisConfiguration Scanner ", - "Install": { - "Linux": "go get -u -v github.com/shivangx01b/CorsMe", - "MacOS": "go get -u -v github.com/shivangx01b/CorsMe", - "Windows": "go get -u -v github.com/shivangx01b/CorsMe" - }, - "Method": "CORS", - "Type": "Scanner", - "Update": { - "Linux": "go get -u -v github.com/shivangx01b/CorsMe", - "MacOS": "go get -u -v github.com/shivangx01b/CorsMe", - "Windows": "go get -u -v github.com/shivangx01b/CorsMe" - } - }, - "Corsy": { - "Data": "| Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner | ![](https://img.shields.io/github/stars/s0md3v/Corsy) | ![](https://img.shields.io/github/languages/top/s0md3v/Corsy) |", - "Description": "CORS Misconfiguration Scanner ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Corsy; cd Corsy ; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/s0md3v/Corsy; cd Corsy ; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/s0md3v/Corsy; cd Corsy ; pip3 install -r requirements.txt" - }, - "Method": "CORS", - "Type": "Scanner", - "Update": { - "Linux": "git pull -v ; pip install -r requirements.txt", - "MacOS": "git pull -v ; pip install -r requirements.txt", - "Windows": "git pull -v ; pip install -r requirements.txt" - } - }, - "CyberChef": { - "Data": "| ToolBox/ALL | [CyberChef](https://github.com/gchq/CyberChef) | The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis | ![](https://img.shields.io/github/stars/gchq/CyberChef) | ![](https://img.shields.io/github/languages/top/gchq/CyberChef) |", - "Description": "The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "ToolBox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DNSDumpster": { - "Data": "| Discovery/DNS | [DNSDumpster](https://dnsdumpster.com) | Online dns recon \u0026 research, find \u0026 lookup dns records|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " Online dns recon \u0026 research, find \u0026 lookup dns records|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DOMPurify": { - "Data": "| Scanner/XSS | [DOMPurify](https://github.com/cure53/DOMPurify) | DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo: | ![](https://img.shields.io/github/stars/cure53/DOMPurify) | ![](https://img.shields.io/github/languages/top/cure53/DOMPurify) |", - "Description": "DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DSSS": { - "Data": "| Scanner/SQLi | [DSSS](https://github.com/stamparm/DSSS) | Damn Small SQLi Scanner | ![](https://img.shields.io/github/stars/stamparm/DSSS) | ![](https://img.shields.io/github/languages/top/stamparm/DSSS) |", - "Description": "Damn Small SQLi Scanner", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SQLi", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DeepViolet": { - "Data": "| Scanner/SSL | [DeepViolet](https://github.com/spoofzu/DeepViolet) | Tool for introspection of SSL\\TLS sessions | ![](https://img.shields.io/github/stars/spoofzu/DeepViolet) | ![](https://img.shields.io/github/languages/top/spoofzu/DeepViolet) |", - "Description": "Tool for introspection of SSL\\TLS sessions", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SSL", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "DirDar": { - "Data": "| Discovery/FUZZ | [DirDar](https://github.com/M4DM0e/DirDar) | DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it | ![](https://img.shields.io/github/stars/M4DM0e/DirDar) | ![](https://img.shields.io/github/languages/top/M4DM0e/DirDar) |", - "Description": "DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Emissary": { - "Data": "| Utility/NOTIFY | [Emissary](https://github.com/BountyStrike/Emissary) | Send notifications on different channels such as Slack, Telegram, Discord etc. | ![](https://img.shields.io/github/stars/BountyStrike/Emissary) | ![](https://img.shields.io/github/languages/top/BountyStrike/Emissary) |", - "Description": "Send notifications on different channels such as Slack, Telegram, Discord etc.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "NOTIFY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "FavFreak": { - "Data": "| Discovery/FAVICON | [FavFreak](https://github.com/devanshbatham/FavFreak) | Making Favicon.ico based Recon Great again ! | ![](https://img.shields.io/github/stars/devanshbatham/FavFreak) | ![](https://img.shields.io/github/languages/top/devanshbatham/FavFreak) |", - "Description": "Making Favicon.ico based Recon Great again ! ", - "Install": { - "Linux": "git clone https://github.com/devanshbatham/FavFreak ; cd FavFreak; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/devanshbatham/FavFreak ; cd FavFreak; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/devanshbatham/FavFreak ; cd FavFreak; pip3 install -r requirements.txt" - }, - "Method": "FAVICON", - "Type": "Discovery", - "Update": { - "Linux": "cd FavFreak; git pull -v ; pip install -r requirements.txt", - "MacOS": "cd FavFreak; git pull -v ; pip install -r requirements.txt", - "Windows": "cd FavFreak; git pull -v ; pip install -r requirements.txt" - } - }, - "Findsploit": { - "Data": "| Utility/PAYLOAD | [Findsploit](https://github.com/1N3/Findsploit) | Find exploits in local and online databases instantly | ![](https://img.shields.io/github/stars/1N3/Findsploit) | ![](https://img.shields.io/github/languages/top/1N3/Findsploit) |", - "Description": "Find exploits in local and online databases instantly", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Gf-Patterns": { - "Data": "| Utility/ENV | [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) | GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep | ![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns) | ![](https://img.shields.io/github/languages/top/1ndianl33t/Gf-Patterns) |", - "Description": "GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep ", - "Install": { - "Linux": "git clone https://github.com/1ndianl33t/Gf-Patterns", - "MacOS": "git clone https://github.com/1ndianl33t/Gf-Patterns", - "Windows": "git clone https://github.com/1ndianl33t/Gf-Patterns" - }, - "Method": "ENV", - "Type": "Utility", - "Update": { - "Linux": "cd Gf-Patterns; git pull -v", - "MacOS": "cd Gf-Patterns; git pull -v", - "Windows": "cd Gf-Patterns; git pull -v" - } - }, - "GitMiner": { - "Data": "| Discovery/GIT | [GitMiner](https://github.com/UnkL4b/GitMiner) | Tool for advanced mining for content on Github | ![](https://img.shields.io/github/stars/UnkL4b/GitMiner) | ![](https://img.shields.io/github/languages/top/UnkL4b/GitMiner) |", - "Description": "Tool for advanced mining for content on Github ", - "Install": { - "Linux": "git clone http://github.com/UnkL4b/GitMiner; cd GitMiner ; pip3 install -r requirements.txt", - "MacOS": "git clone http://github.com/UnkL4b/GitMiner; cd GitMiner ; pip3 install -r requirements.txt", - "Windows": "git clone http://github.com/UnkL4b/GitMiner; cd GitMiner ; pip3 install -r requirements.txt" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "cd GitMiner ; git pull -v ; pip install -r requirements.txt", - "MacOS": "cd GitMiner ; git pull -v ; pip install -r requirements.txt", - "Windows": "cd GitMiner ; git pull -v ; pip install -r requirements.txt" - } - }, - "Gopherus": { - "Data": "| Utility/PAYLOAD | [Gopherus](https://github.com/tarunkant/Gopherus) | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | ![](https://img.shields.io/github/stars/tarunkant/Gopherus) | ![](https://img.shields.io/github/languages/top/tarunkant/Gopherus) |", - "Description": "This tool generates gopher link for exploiting SSRF and gaining RCE in various servers ", - "Install": { - "Linux": "git clone https://github.com/tarunkant/Gopherus ; cd Gopherus; ./install.sh", - "MacOS": "git clone https://github.com/tarunkant/Gopherus ; cd Gopherus; ./install.sh", - "Windows": "git clone https://github.com/tarunkant/Gopherus ; cd Gopherus; ./install.sh" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "cd Gopherus; git pull -v", - "MacOS": "cd Gopherus; git pull -v", - "Windows": "cd Gopherus; git pull -v" - } - }, - "GraphQLmap": { - "Data": "| Scanner/GQL | [GraphQLmap](https://github.com/swisskyrepo/GraphQLmap) | GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. | ![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/GraphQLmap) |", - "Description": "GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. ", - "Install": { - "Linux": "git clone https://github.com/swisskyrepo/GraphQLmap ; cd GraphQLmap; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/swisskyrepo/GraphQLmap ; cd GraphQLmap; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/swisskyrepo/GraphQLmap ; cd GraphQLmap; pip3 install -r requirements.txt" - }, - "Method": "GQL", - "Type": "Scanner", - "Update": { - "Linux": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt", - "MacOS": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt", - "Windows": "cd GraphQLmap; git pull -v ; pip install -r requirements.txt" - } - }, - "HRS": { - "Data": "| Scanner/SMUGGLE | [HRS](https://github.com/SafeBreach-Labs/HRS) | HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. | ![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS) | ![](https://img.shields.io/github/languages/top/SafeBreach-Labs/HRS) |", - "Description": "HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "HydraRecon": { - "Data": "| Discovery/ALL | [HydraRecon](https://github.com/aufzayed/HydraRecon) | All In One, Fast, Easy Recon Tool | ![](https://img.shields.io/github/stars/aufzayed/HydraRecon) | ![](https://img.shields.io/github/languages/top/aufzayed/HydraRecon) |", - "Description": "All In One, Fast, Easy Recon Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "IntruderPayloads": { - "Data": "| Utility/PAYLOAD | [IntruderPayloads](https://github.com/1N3/IntruderPayloads) | A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists. | ![](https://img.shields.io/github/stars/1N3/IntruderPayloads) | ![](https://img.shields.io/github/languages/top/1N3/IntruderPayloads) |", - "Description": "A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "JSFScan.sh": { - "Data": "| Discovery/JS | [JSFScan.sh](https://github.com/KathanP19/JSFScan.sh) | Automation for javascript recon in bug bounty. | ![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh) | ![](https://img.shields.io/github/languages/top/KathanP19/JSFScan.sh) |", - "Description": "Automation for javascript recon in bug bounty. ", - "Install": { - "Linux": "git clone https://github.com/KathanP19/JSFScan.sh ; cd JSFScan.sh; chmod +x install.sh ; ./install.sh", - "MacOS": "git clone https://github.com/KathanP19/JSFScan.sh ; cd JSFScan.sh; chmod +x install.sh ; ./install.sh", - "Windows": "" - }, - "Method": "JS", - "Type": "Discovery", - "Update": { - "Linux": "cd JSFScan.sh; git pull -v", - "MacOS": "cd JSFScan.sh; git pull -v", - "Windows": "" - } - }, - "LFISuite": { - "Data": "| Scanner/LFI | [LFISuite](https://github.com/D35m0nd142/LFISuite) | Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner | ![](https://img.shields.io/github/stars/D35m0nd142/LFISuite) | ![](https://img.shields.io/github/languages/top/D35m0nd142/LFISuite) |", - "Description": "Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner ", - "Install": { - "Linux": "git clone https://github.com/D35m0nd142/LFISuite", - "MacOS": "git clone https://github.com/D35m0nd142/LFISuite", - "Windows": "git clone https://github.com/D35m0nd142/LFISuite" - }, - "Method": "LFI", - "Type": "Scanner", - "Update": { - "Linux": "cd LFISuite; git pull -v", - "MacOS": "cd LFISuite; git pull -v", - "Windows": "cd LFISuite; git pull -v" - } - }, - "LinkFinder": { - "Data": "| Discovery/JS | [LinkFinder](https://github.com/GerbenJavado/LinkFinder) | A python script that finds endpoints in JavaScript files | ![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder) | ![](https://img.shields.io/github/languages/top/GerbenJavado/LinkFinder) |", - "Description": "A python script that finds endpoints in JavaScript files ", - "Install": { - "Linux": "git clone https://github.com/GerbenJavado/LinkFinder ; cd LinkFinder; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/GerbenJavado/LinkFinder ; cd LinkFinder; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/GerbenJavado/LinkFinder ; cd LinkFinder; pip3 install -r requirements.txt" - }, - "Method": "JS", - "Type": "Discovery", - "Update": { - "Linux": "cd LinkFinder; git pull -v ; pip3 install -r requirements.txt; python setup.py install", - "MacOS": "cd LinkFinder; git pull -v ; pip3 install -r requirements.txt; python setup.py install", - "Windows": "cd LinkFinder; git pull -v ; pip3 install -r requirements.txt; python setup.py install" - } - }, - "NoSQLMap": { - "Data": "| Scanner/NOSQL | [NoSQLMap](https://github.com/codingo/NoSQLMap) | Automated NoSQL database enumeration and web application exploitation tool. | ![](https://img.shields.io/github/stars/codingo/NoSQLMap) | ![](https://img.shields.io/github/languages/top/codingo/NoSQLMap) |", - "Description": "Automated NoSQL database enumeration and web application exploitation tool. ", - "Install": { - "Linux": "git clone https://github.com/codingo/NoSQLMap ; cd NoSQLMap; python setup.py install", - "MacOS": "git clone https://github.com/codingo/NoSQLMap ; cd NoSQLMap; python setup.py install", - "Windows": "git clone https://github.com/codingo/NoSQLMap ; cd NoSQLMap; python setup.py install" - }, - "Method": "NOSQL", - "Type": "Scanner", - "Update": { - "Linux": "cd NoSQLMap; git pull -v", - "MacOS": "cd NoSQLMap; git pull -v", - "Windows": "cd NoSQLMap; git pull -v" - } - }, - "OneForAll": { - "Data": "| Discovery/ALL | [OneForAll](https://github.com/shmilylty/OneForAll) | OneForAll是一款功能强大的子域收集工具 | ![](https://img.shields.io/github/stars/shmilylty/OneForAll) | ![](https://img.shields.io/github/languages/top/shmilylty/OneForAll) |", - "Description": "OneForAll是一款功能强大的子域收集工具 ", - "Install": { - "Linux": "git clone https://github.com/shmilylty/OneForAll ; cd OneForAll; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/shmilylty/OneForAll ; cd OneForAll; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/shmilylty/OneForAll ; cd OneForAll; pip3 install -r requirements.txt" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "cd OneForAll; git pull -v; pip3 install -r requirements.txt", - "MacOS": "cd OneForAll; git pull -v; pip3 install -r requirements.txt", - "Windows": "cd OneForAll; git pull -v; pip3 install -r requirements.txt" - } - }, - "OpenRedireX": { - "Data": "| Scanner/REDIRECT | [OpenRedireX](https://github.com/devanshbatham/OpenRedireX) | A Fuzzer for OpenRedirect issues | ![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX) | ![](https://img.shields.io/github/languages/top/devanshbatham/OpenRedireX) |", - "Description": "A Fuzzer for OpenRedirect issues", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "REDIRECT", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Osmedeus": { - "Data": "| Scanner/RECON | [Osmedeus](https://github.com/j3ssie/Osmedeus) | Fully automated offensive security framework for reconnaissance and vulnerability scanning | ![](https://img.shields.io/github/stars/j3ssie/Osmedeus) | ![](https://img.shields.io/github/languages/top/j3ssie/Osmedeus) |", - "Description": "Fully automated offensive security framework for reconnaissance and vulnerability scanning ", - "Install": { - "Linux": "git clone https://github.com/j3ssie/Osmedeus ; cd Osmedeus; pip3 install -r requirements.txt; ./install.sh", - "MacOS": "git clone https://github.com/j3ssie/Osmedeus ; cd Osmedeus; pip3 install -r requirements.txt; ./install.sh", - "Windows": "git clone https://github.com/j3ssie/Osmedeus ; cd Osmedeus; pip3 install -r requirements.txt; ./install.sh" - }, - "Method": "RECON", - "Type": "Scanner", - "Update": { - "Linux": "cd Osmedeus; git pull -v; pip3 install -r requirements.txt", - "MacOS": "cd Osmedeus; git pull -v; pip3 install -r requirements.txt", - "Windows": "cd Osmedeus; git pull -v; pip3 install -r requirements.txt" - } - }, - "PPScan": { - "Data": "| Scanner/FUZZ | [PPScan](https://github.com/msrkp/PPScan) | Client Side Prototype Pollution Scanner | ![](https://img.shields.io/github/stars/msrkp/PPScan) | ![](https://img.shields.io/github/languages/top/msrkp/PPScan) |", - "Description": "Client Side Prototype Pollution Scanner", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "ParamSpider": { - "Data": "| Discovery/PARAM | [ParamSpider](https://github.com/devanshbatham/ParamSpider) | Mining parameters from dark corners of Web Archives | ![](https://img.shields.io/github/stars/devanshbatham/ParamSpider) | ![](https://img.shields.io/github/languages/top/devanshbatham/ParamSpider) |", - "Description": "Mining parameters from dark corners of Web Archives ", - "Install": { - "Linux": "git clone https://github.com/devanshbatham/ParamSpider ; cd ParamSpider; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/devanshbatham/ParamSpider ; cd ParamSpider; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/devanshbatham/ParamSpider ; cd ParamSpider; pip3 install -r requirements.txt" - }, - "Method": "PARAM", - "Type": "Discovery", - "Update": { - "Linux": "cd ParamSpider; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd ParamSpider; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd ParamSpider; git pull -v ; pip3 install -r requirements.txt" - } - }, - "Parth": { - "Data": "| Discovery/PARAM | [Parth](https://github.com/s0md3v/Parth) | Heuristic Vulnerable Parameter Scanner | ![](https://img.shields.io/github/stars/s0md3v/Parth) | ![](https://img.shields.io/github/languages/top/s0md3v/Parth) |", - "Description": "Heuristic Vulnerable Parameter Scanner ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Parth", - "MacOS": "git clone https://github.com/s0md3v/Parth", - "Windows": "git clone https://github.com/s0md3v/Parth" - }, - "Method": "PARAM", - "Type": "Discovery", - "Update": { - "Linux": "cd Parth; git pull -v", - "MacOS": "cd Parth; git pull -v", - "Windows": "cd Parth; git pull -v" - } - }, - "PayloadsAllTheThings": { - "Data": "| Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF | ![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings) | ![](https://img.shields.io/github/languages/top/swisskyrepo/PayloadsAllTheThings) |", - "Description": "A list of useful payloads and bypass for Web Application Security and Pentest/CTF ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Phoenix": { - "Data": "| Utility/ETC | [Phoenix](https://www.hahwul.com/p/phoenix.html) | hahwul's online tools|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " hahwul's online tools|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ETC", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Photon": { - "Data": "| Discovery/URL | [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. | ![](https://img.shields.io/github/stars/s0md3v/Photon) | ![](https://img.shields.io/github/languages/top/s0md3v/Photon) |", - "Description": "Incredibly fast crawler designed for OSINT. ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Photon ; cd Photon; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/s0md3v/Photon ; cd Photon; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/s0md3v/Photon ; cd Photon; pip3 install -r requirements.txt" - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "cd Photon; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd Photon; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd Photon; git pull -v ; pip3 install -r requirements.txt" - } - }, - "PoC-in-GitHub": { - "Data": "| Utility/PAYLOAD | [PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub) | 📡 PoC auto collect from GitHub. Be careful malware. | ![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub) | ![](https://img.shields.io/github/languages/top/nomi-sec/PoC-in-GitHub) |", - "Description": "📡 PoC auto collect from GitHub. Be careful malware.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "RustScan": { - "Data": "| Discovery/PORT | [RustScan](https://github.com/brandonskerritt/RustScan) | Faster Nmap Scanning with Rust | ![](https://img.shields.io/github/stars/brandonskerritt/RustScan) | ![](https://img.shields.io/github/languages/top/brandonskerritt/RustScan) |", - "Description": "Faster Nmap Scanning with Rust ", - "Install": { - "Linux": "cargo install rustsca", - "MacOS": "brew install rustscan", - "Windows": "cargo install rustsca" - }, - "Method": "PORT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "brew upgrade rustscan", - "Windows": "" - } - }, - "S3Scanner": { - "Data": "| Scanner/S3 | [S3Scanner](https://github.com/sa7mon/S3Scanner) | Scan for open AWS S3 buckets and dump the contents | ![](https://img.shields.io/github/stars/sa7mon/S3Scanner) | ![](https://img.shields.io/github/languages/top/sa7mon/S3Scanner) |", - "Description": "Scan for open AWS S3 buckets and dump the contents ", - "Install": { - "Linux": "git clone https://github.com/sa7mon/S3Scanner ; cd S3Scanner; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/sa7mon/S3Scanner ; cd S3Scanner; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/sa7mon/S3Scanner ; cd S3Scanner; pip3 install -r requirements.txt" - }, - "Method": "S3", - "Type": "Scanner", - "Update": { - "Linux": "cd S3Scanner; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd S3Scanner; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd S3Scanner; git pull -v ; pip3 install -r requirements.txt" - } - }, - "SQL Ninja": { - "Data": "| Scanner/SQLi | [SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)|![](https://img.shields.io/static/v1?label=\u0026message=it's%20not%20github\u0026color=gray)", - "Description": "SQL Injection scanner", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SQLi", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "SQLNinja": { - "Data": "| Scanner/SQL | [SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " SQL Injection scanner|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SQL", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "SSRFmap": { - "Data": "| Scanner/SSRF | [SSRFmap](https://github.com/swisskyrepo/SSRFmap) | Automatic SSRF fuzzer and exploitation tool | ![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap) | ![](https://img.shields.io/github/languages/top/swisskyrepo/SSRFmap) |", - "Description": "Automatic SSRF fuzzer and exploitation tool ", - "Install": { - "Linux": "git clone https://github.com/swisskyrepo/SSRFmap ; cd SSRFmap; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/swisskyrepo/SSRFmap ; cd SSRFmap; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/swisskyrepo/SSRFmap ; cd SSRFmap; pip3 install -r requirements.txt" - }, - "Method": "SSRF", - "Type": "Scanner", - "Update": { - "Linux": "cd SSRFmap; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd SSRFmap; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd SSRFmap; git pull -v ; pip3 install -r requirements.txt" - } - }, - "STEWS": { - "Data": "| Discovery/WEBSOCK | [STEWS](https://github.com/PalindromeLabs/STEWS) | A Security Tool for Enumerating WebSockets | ![](https://img.shields.io/github/stars/PalindromeLabs/STEWS) | ![](https://img.shields.io/github/languages/top/PalindromeLabs/STEWS) |", - "Description": "A Security Tool for Enumerating WebSockets", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WEBSOCK", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "SecLists": { - "Data": "| Utility/WORD | [SecLists](https://github.com/danielmiessler/SecLists) | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. | ![](https://img.shields.io/github/stars/danielmiessler/SecLists) | ![](https://img.shields.io/github/languages/top/danielmiessler/SecLists) |", - "Description": "SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. ", - "Install": { - "Linux": "git clone https://github.com/danielmiessler/SecLists", - "MacOS": "git clone https://github.com/danielmiessler/SecLists", - "Windows": "git clone https://github.com/danielmiessler/SecLists" - }, - "Method": "WORD", - "Type": "Utility", - "Update": { - "Linux": "cd SecLists; git pull -v", - "MacOS": "cd SecLists; git pull -v", - "Windows": "cd SecLists; git pull -v" - } - }, - "SecretFinder": { - "Data": "| Discovery/JS | [SecretFinder](https://github.com/m4ll0k/SecretFinder) | SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files | ![](https://img.shields.io/github/stars/m4ll0k/SecretFinder) | ![](https://img.shields.io/github/languages/top/m4ll0k/SecretFinder) |", - "Description": "SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files ", - "Install": { - "Linux": "git clone https://github.com/m4ll0k/SecretFinder ; cd SecretFinder ; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/m4ll0k/SecretFinder ; cd SecretFinder ; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/m4ll0k/SecretFinder ; cd SecretFinder ; pip3 install -r requirements.txt" - }, - "Method": "JS", - "Type": "Discovery", - "Update": { - "Linux": "cd SecretFinder ; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd SecretFinder ; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd SecretFinder ; git pull -v ; pip3 install -r requirements.txt" - } - }, - "SecurityTrails": { - "Data": "| Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " Online dns / subdomain / recon tool|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "SequenceDiagram": { - "Data": "| Utility/FLOW | [SequenceDiagram](https://sequencediagram.org) | Online tool for creating UML sequence diagrams|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " Online tool for creating UML sequence diagrams|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FLOW", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Shodan": { - "Data": "| Discovery/PORT | [Shodan](https://www.shodan.io/) | World's first search engine for Internet-connected devices|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) | ![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray)|", - "Description": " World's first search engine for Internet-connected devices|![](https://img.shields.io/static/v1?label=\u0026message=it%27s%20not%20github\u0026color=gray) ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PORT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Silver": { - "Data": "| Discovery/VULN | [Silver](https://github.com/s0md3v/Silver) | Mass scan IPs for vulnerable services | ![](https://img.shields.io/github/stars/s0md3v/Silver) | ![](https://img.shields.io/github/languages/top/s0md3v/Silver) |", - "Description": "Mass scan IPs for vulnerable services ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Silver ; cd Silver; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/s0md3v/Silver ; cd Silver; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/s0md3v/Silver ; cd Silver; pip3 install -r requirements.txt" - }, - "Method": "VULN", - "Type": "Discovery", - "Update": { - "Linux": "cd Silver; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd Silver; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd Silver; git pull -v ; pip3 install -r requirements.txt" - } - }, - "Sn1per": { - "Data": "| Scanner/RECON | [Sn1per](https://github.com/1N3/Sn1per) | Automated pentest framework for offensive security experts | ![](https://img.shields.io/github/stars/1N3/Sn1per) | ![](https://img.shields.io/github/languages/top/1N3/Sn1per) |", - "Description": "Automated pentest framework for offensive security experts ", - "Install": { - "Linux": "git clone https://github.com/1N3/Sn1per ; cd Sn1per; ./install.sh", - "MacOS": "git clone https://github.com/1N3/Sn1per ; cd Sn1per; ./install.sh", - "Windows": "git clone https://github.com/1N3/Sn1per ; cd Sn1per; ./install.sh" - }, - "Method": "RECON", - "Type": "Scanner", - "Update": { - "Linux": "cd Sn1per; git pull -v", - "MacOS": "cd Sn1per; git pull -v", - "Windows": "cd Sn1per; git pull -v" - } - }, - "Striker": { - "Data": "| Scanner/WVS | [Striker](https://github.com/s0md3v/Striker) | Striker is an offensive information and vulnerability scanner. | ![](https://img.shields.io/github/stars/s0md3v/Striker) | ![](https://img.shields.io/github/languages/top/s0md3v/Striker) |", - "Description": "Striker is an offensive information and vulnerability scanner. ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/Striker; cd Striker; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/s0md3v/Striker; cd Striker; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/s0md3v/Striker; cd Striker; pip3 install -r requirements.txt" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "cd Striker; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd Striker; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd Striker; git pull -v ; pip3 install -r requirements.txt" - } - }, - "SubOver": { - "Data": "| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool | ![](https://img.shields.io/github/stars/Ice3man543/SubOver) | ![](https://img.shields.io/github/languages/top/Ice3man543/SubOver) |", - "Description": "A Powerful Subdomain Takeover Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "TKOV", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "Sublist3r": { - "Data": "| Discovery/DOMAIN | [Sublist3r](https://github.com/aboul3la/Sublist3r) | Fast subdomains enumeration tool for penetration testers | ![](https://img.shields.io/github/stars/aboul3la/Sublist3r) | ![](https://img.shields.io/github/languages/top/aboul3la/Sublist3r) |", - "Description": "Fast subdomains enumeration tool for penetration testers ", - "Install": { - "Linux": "git clone https://github.com/aboul3la/Sublist3r ; cd Sublist3r ; pip3 instal -r requirements.txt", - "MacOS": "git clone https://github.com/aboul3la/Sublist3r ; cd Sublist3r ; pip3 instal -r requirements.txt", - "Windows": "git clone https://github.com/aboul3la/Sublist3r ; cd Sublist3r ; pip3 instal -r requirements.txt" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "cd Sublist3r ; git pull -v ; pip3 instal -r requirements.txt", - "MacOS": "cd Sublist3r ; git pull -v ; pip3 instal -r requirements.txt", - "Windows": "cd Sublist3r ; git pull -v ; pip3 instal -r requirements.txt" - } - }, - "Taipan": { - "Data": "| Scanner/WVS | [Taipan](https://github.com/enkomio/Taipan) | Web application vulnerability scanner | ![](https://img.shields.io/github/stars/enkomio/Taipan) | ![](https://img.shields.io/github/languages/top/enkomio/Taipan) |", - "Description": "Web application vulnerability scanner", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "TukTuk": { - "Data": "| Utility/OAST | [TukTuk](https://github.com/ArturSS7/TukTuk) | Tool for catching and logging different types of requests. | ![](https://img.shields.io/github/stars/ArturSS7/TukTuk) | ![](https://img.shields.io/github/languages/top/ArturSS7/TukTuk) |", - "Description": "Tool for catching and logging different types of requests. ", - "Install": { - "Linux": "git clone https://github.com/ArturSS7/TukTuk ; cd TukTuk; ./install.sh", - "MacOS": "git clone https://github.com/ArturSS7/TukTuk ; cd TukTuk; ./install.sh", - "Windows": "git clone https://github.com/ArturSS7/TukTuk ; cd TukTuk; ./install.sh" - }, - "Method": "OAST", - "Type": "Utility", - "Update": { - "Linux": "cd TukTuk; git pull -v ", - "MacOS": "cd TukTuk; git pull -v ", - "Windows": "cd TukTuk; git pull -v " - } - }, - "VHostScan": { - "Data": "| Scanner/FUZZ | [VHostScan](https://github.com/codingo/VHostScan) | A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. | ![](https://img.shields.io/github/stars/codingo/VHostScan) | ![](https://img.shields.io/github/languages/top/codingo/VHostScan) |", - "Description": "A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. ", - "Install": { - "Linux": "git clone https://github.com/codingo/VHostScan ; cd VHostScan ; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/codingo/VHostScan ; cd VHostScan ; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/codingo/VHostScan ; cd VHostScan ; pip3 install -r requirements.txt" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "cd VHostScan ; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd VHostScan ; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd VHostScan ; git pull -v ; pip3 install -r requirements.txt" - } - }, - "Web-Cache-Vulnerability-Scanner": { - "Data": "| Scanner/CACHE | [Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner) | Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/). | ![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner) | ![](https://img.shields.io/github/languages/top/Hackmanit/Web-Cache-Vulnerability-Scanner) |", - "Description": "Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CACHE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "XSRFProbe": { - "Data": "| Scanner/CSRF | [XSRFProbe](https://github.com/0xInfection/XSRFProbe) | The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. | ![](https://img.shields.io/github/stars/0xInfection/XSRFProbe) | ![](https://img.shields.io/github/languages/top/0xInfection/XSRFProbe) |", - "Description": "The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CSRF", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "XSStrike": { - "Data": "| Scanner/XSS | [XSStrike](https://github.com/s0md3v/XSStrike) | Most advanced XSS scanner. | ![](https://img.shields.io/github/stars/s0md3v/XSStrike) | ![](https://img.shields.io/github/languages/top/s0md3v/XSStrike) |", - "Description": "Most advanced XSS scanner. ", - "Install": { - "Linux": "git clone https://github.com/s0md3v/XSStrike ; cd XSStrike; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/s0md3v/XSStrike ; cd XSStrike; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/s0md3v/XSStrike ; cd XSStrike; pip3 install -r requirements.txt" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "cd XSStrike; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd XSStrike; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd XSStrike; git pull -v ; pip3 install -r requirements.txt" - } - }, - "XSpear": { - "Data": "| Scanner/XSS | [XSpear](https://github.com/hahwul/XSpear) | Powerfull XSS Scanning and Parameter analysis tool\u0026gem | ![](https://img.shields.io/github/stars/hahwul/XSpear) | ![](https://img.shields.io/github/languages/top/hahwul/XSpear) |", - "Description": "Powerfull XSS Scanning and Parameter analysis tool\u0026gem ", - "Install": { - "Linux": "gem install XSpear", - "MacOS": "gem install XSpear", - "Windows": "gem install XSpear" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "gem update XSpear", - "MacOS": "gem update XSpear", - "Windows": "gem update XSpear" - } - }, - "XXEinjector": { - "Data": "| Utility/PAYLOAD | [XXEinjector](https://github.com/enjoiz/XXEinjector) | Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods. | ![](https://img.shields.io/github/stars/enjoiz/XXEinjector) | ![](https://img.shields.io/github/languages/top/enjoiz/XXEinjector) |", - "Description": "Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "a2sv": { - "Data": "| Scanner/SSL | [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability | ![](https://img.shields.io/github/stars/hahwul/a2sv) | ![](https://img.shields.io/github/languages/top/hahwul/a2sv) |", - "Description": "Auto Scanning to SSL Vulnerability ", - "Install": { - "Linux": "git clone https://github.com/hahwul/a2sv; cd a2sv; pip2 install -r requirements.txt", - "MacOS": "git clone https://github.com/hahwul/a2sv; cd a2sv; pip2 install -r requirements.txt", - "Windows": "git clone https://github.com/hahwul/a2sv; cd a2sv; pip2 install -r requirements.txt" - }, - "Method": "SSL", - "Type": "Scanner", - "Update": { - "Linux": "cd a2sv; git pull -v", - "MacOS": "cd a2sv; git pull -v", - "Windows": "cd a2sv; git pull -v" - } - }, - "altdns": { - "Data": "| Discovery/DOMAIN | [altdns](https://github.com/infosec-au/altdns) | Generates permutations, alterations and mutations of subdomains and then resolves them | ![](https://img.shields.io/github/stars/infosec-au/altdns) | ![](https://img.shields.io/github/languages/top/infosec-au/altdns) |", - "Description": "Generates permutations, alterations and mutations of subdomains and then resolves them ", - "Install": { - "Linux": "git clone https://github.com/infosec-au/altdns ; cd altdns; python setup.py install", - "MacOS": "git clone https://github.com/infosec-au/altdns ; cd altdns; python setup.py install", - "Windows": "git clone https://github.com/infosec-au/altdns ; cd altdns; python setup.py install" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "cd altdns ; git pull -v", - "MacOS": "cd altdns ; git pull -v", - "Windows": "cd altdns ; git pull -v" - } - }, - "anew": { - "Data": "| Utility/ANY | [anew](https://github.com/tomnomnom/anew) | A tool for adding new lines to files, skipping duplicates | ![](https://img.shields.io/github/stars/tomnomnom/anew) | ![](https://img.shields.io/github/languages/top/tomnomnom/anew) |", - "Description": "A tool for adding new lines to files, skipping duplicates", - "Install": { - "Linux": "go get -u github.com/tomnomnom/anew", - "MacOS": "go get -u github.com/tomnomnom/anew", - "Windows": "go get -u github.com/tomnomnom/anew" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/tomnomnom/anew", - "MacOS": "go get -u github.com/tomnomnom/anew", - "Windows": "go get -u github.com/tomnomnom/anew" - } - }, - "apkleaks": { - "Data": "| Discovery/APK | [apkleaks](https://github.com/dwisiswant0/apkleaks) | Scanning APK file for URIs, endpoints \u0026 secrets. | ![](https://img.shields.io/github/stars/dwisiswant0/apkleaks) | ![](https://img.shields.io/github/languages/top/dwisiswant0/apkleaks) |", - "Description": "Scanning APK file for URIs, endpoints \u0026 secrets. ", - "Install": { - "Linux": "git clone https://github.com/dwisiswant0/apkleaks ; cd apkleaks ; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/dwisiswant0/apkleaks ; cd apkleaks ; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/dwisiswant0/apkleaks ; cd apkleaks ; pip3 install -r requirements.txt" - }, - "Method": "APK", - "Type": "Discovery", - "Update": { - "Linux": "cd apkleaks ; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd apkleaks ; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd apkleaks ; git pull -v ; pip3 install -r requirements.txt" - } - }, - "aquatone": { - "Data": "| Discovery/ALL | [aquatone](https://github.com/michenriksen/aquatone) | A Tool for Domain Flyovers | ![](https://img.shields.io/github/stars/michenriksen/aquatone) | ![](https://img.shields.io/github/languages/top/michenriksen/aquatone) |", - "Description": "A Tool for Domain Flyovers ", - "Install": { - "Linux": "go get -u github.com/michenriksen/aquatone", - "MacOS": "go get -u github.com/michenriksen/aquatone", - "Windows": "go get -u github.com/michenriksen/aquatone" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "go get -u github.com/michenriksen/aquatone", - "MacOS": "go get -u github.com/michenriksen/aquatone", - "Windows": "go get -u github.com/michenriksen/aquatone" - } - }, - "arachni": { - "Data": "| Scanner/WVS | [arachni](https://github.com/Arachni/arachni) | Web Application Security Scanner Framework | ![](https://img.shields.io/github/stars/Arachni/arachni) | ![](https://img.shields.io/github/languages/top/Arachni/arachni) |", - "Description": "Web Application Security Scanner Framework ", - "Install": { - "Linux": "mkdir arachni; cd arachni; wget https://github.com/Arachni/arachni/releases/download/v1.5.1/arachni-1.5.1-0.5.12-linux-x86_64.tar.gz; tar -xvf arachni-1.5.1-0.5.12-linux-x86_64.tar.gz", - "MacOS": "mkdir arachni; cd arachni; wget https://github.com/Arachni/arachni/releases/download/v1.5.1/arachni-1.5.1-0.5.12-linux-x86_64.tar.gz; tar -xvf arachni-1.5.1-0.5.12-linux-x86_64.tar.gz", - "Windows": "" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "assetfinder": { - "Data": "| Discovery/DOMAIN | [assetfinder](https://github.com/tomnomnom/assetfinder) | Find domains and subdomains related to a given domain | ![](https://img.shields.io/github/stars/tomnomnom/assetfinder) | ![](https://img.shields.io/github/languages/top/tomnomnom/assetfinder) |", - "Description": "Find domains and subdomains related to a given domain ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/assetfinder", - "MacOS": "go get -u github.com/tomnomnom/assetfinder", - "Windows": "go get -u github.com/tomnomnom/assetfinder" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "go get -u github.com/tomnomnom/assetfinder", - "MacOS": "go get -u github.com/tomnomnom/assetfinder", - "Windows": "go get -u github.com/tomnomnom/assetfinder" - } - }, - "autochrome": { - "Data": "| Utility/SETUP | [autochrome](https://github.com/nccgroup/autochrome) | This tool downloads, installs, and configures a shiny new copy of Chromium. | ![](https://img.shields.io/github/stars/nccgroup/autochrome) | ![](https://img.shields.io/github/languages/top/nccgroup/autochrome) |", - "Description": "This tool downloads, installs, and configures a shiny new copy of Chromium.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SETUP", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "axiom": { - "Data": "| Utility/PENTEST | [axiom](https://github.com/pry0cc/axiom) | A dynamic infrastructure toolkit for red teamers and bug bounty hunters! | ![](https://img.shields.io/github/stars/pry0cc/axiom) | ![](https://img.shields.io/github/languages/top/pry0cc/axiom) |", - "Description": "A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ", - "Install": { - "Linux": "bash \u003c(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)", - "MacOS": "bash \u003c(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)", - "Windows": "" - }, - "Method": "PENTEST", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "bat": { - "Data": "| Utility/ANY | [bat](https://github.com/sharkdp/bat) | A cat(1) clone with wings. | ![](https://img.shields.io/github/stars/sharkdp/bat) | ![](https://img.shields.io/github/languages/top/sharkdp/bat) |", - "Description": "A cat(1) clone with wings.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "boast": { - "Data": "| Utility/OAST | [boast](https://github.com/marcoagner/boast) | The BOAST Outpost for AppSec Testing (v0.1.0) | ![](https://img.shields.io/github/stars/marcoagner/boast) | ![](https://img.shields.io/github/languages/top/marcoagner/boast) |", - "Description": "The BOAST Outpost for AppSec Testing (v0.1.0)", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "OAST", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "bountyplz": { - "Data": "| Utility/TEMPLATE | [bountyplz](https://github.com/fransr/bountyplz) | Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) | ![](https://img.shields.io/github/stars/fransr/bountyplz) | ![](https://img.shields.io/github/languages/top/fransr/bountyplz) |", - "Description": "Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) ", - "Install": { - "Linux": "", - "MacOS": "git clone https://github.com/fransr/bountyplz; brew install jq; brew install gnu-sed; brew install coreutils", - "Windows": "" - }, - "Method": "TEMPLATE", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "cd bountyplz; git pull -v", - "Windows": "" - } - }, - "burl": { - "Data": "| Utility/URL | [burl](https://github.com/tomnomnom/burl) | A Broken-URL Checker | ![](https://img.shields.io/github/stars/tomnomnom/burl) | ![](https://img.shields.io/github/languages/top/tomnomnom/burl) |", - "Description": "A Broken-URL Checker ", - "Install": { - "Linux": "go get github.com/tomnomnom/burl", - "MacOS": "go get github.com/tomnomnom/burl", - "Windows": "go get github.com/tomnomnom/burl" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "go get github.com/tomnomnom/burl", - "MacOS": "go get github.com/tomnomnom/burl", - "Windows": "go get github.com/tomnomnom/burl" - } - }, - "c-jwt-cracker": { - "Data": "| Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C | ![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker) | ![](https://img.shields.io/github/languages/top/brendan-rius/c-jwt-cracker) |", - "Description": "JWT brute force cracker written in C ", - "Install": { - "Linux": "git clone https://github.com/brendan-rius/c-jwt-cracker ; cd c-jwt-cracker ; make", - "MacOS": "git clone https://github.com/brendan-rius/c-jwt-cracker ; cd c-jwt-cracker ; make", - "Windows": "git clone https://github.com/brendan-rius/c-jwt-cracker ; cd c-jwt-cracker ; make" - }, - "Method": "JWT", - "Type": "Utility", - "Update": { - "Linux": "cd c-jwt-cracker ; git pull -v ; make", - "MacOS": "cd c-jwt-cracker ; git pull -v ; make", - "Windows": "cd c-jwt-cracker ; git pull -v ; make" - } - }, - "can-i-take-over-xyz": { - "Data": "| Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | \"Can I take over XYZ?\" — a list of services and how to claim (sub)domains with dangling DNS records. | ![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz) | ![](https://img.shields.io/github/languages/top/EdOverflow/can-i-take-over-xyz) |", - "Description": "\"Can I take over XYZ?\" — a list of services and how to claim (sub)domains with dangling DNS records.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "TKOV", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "cariddi": { - "Data": "| Discovery/URL | [cariddi](https://github.com/edoardottt/cariddi) | Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more... | ![](https://img.shields.io/github/stars/edoardottt/cariddi) | ![](https://img.shields.io/github/languages/top/edoardottt/cariddi) |", - "Description": "Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "cc.py": { - "Data": "| Discovery/URL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of \"commoncrawl.org\" | ![](https://img.shields.io/github/stars/si9int/cc.py) | ![](https://img.shields.io/github/languages/top/si9int/cc.py) |", - "Description": "Extracting URLs of a specific target based on the results of \"commoncrawl.org\" ", - "Install": { - "Linux": "git clone https://github.com/si9int/cc.py", - "MacOS": "git clone https://github.com/si9int/cc.py", - "Windows": "git clone https://github.com/si9int/cc.py" - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "cd cc.py ; git pull -v", - "MacOS": "cd cc.py ; git pull -v", - "Windows": "cd cc.py ; git pull -v" - } - }, - "cf-check": { - "Data": "| Utility/URL | [cf-check](https://github.com/dwisiswant0/cf-check) | Cloudflare Checker written in Go | ![](https://img.shields.io/github/stars/dwisiswant0/cf-check) | ![](https://img.shields.io/github/languages/top/dwisiswant0/cf-check) |", - "Description": "Cloudflare Checker written in Go ", - "Install": { - "Linux": "go get -u github.com/dwisiswant0/cf-check", - "MacOS": "go get -u github.com/dwisiswant0/cf-check", - "Windows": "go get -u github.com/dwisiswant0/cf-check" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/dwisiswant0/cf-check", - "MacOS": "go get -u github.com/dwisiswant0/cf-check", - "Windows": "go get -u github.com/dwisiswant0/cf-check" - } - }, - "chaos-client": { - "Data": "| Discovery/DOMAIN | [chaos-client](https://github.com/projectdiscovery/chaos-client) | Go client to communicate with Chaos DNS API. | ![](https://img.shields.io/github/stars/projectdiscovery/chaos-client) | ![](https://img.shields.io/github/languages/top/projectdiscovery/chaos-client) |", - "Description": "Go client to communicate with Chaos DNS API. ", - "Install": { - "Linux": "GO111MODULE=on go get -u github.com/projectdiscovery/chaos-client/cmd/chaos", - "MacOS": "GO111MODULE=on go get -u github.com/projectdiscovery/chaos-client/cmd/chaos", - "Windows": "go get -u github.com/projectdiscovery/chaos-client/cmd/chaos" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u github.com/projectdiscovery/chaos-client/cmd/chaos", - "MacOS": "GO111MODULE=on go get -u github.com/projectdiscovery/chaos-client/cmd/chaos", - "Windows": "go get -u github.com/projectdiscovery/chaos-client/cmd/chaos" - } - }, - "commix": { - "Data": "| Scanner/RCE | [commix](https://github.com/commixproject/commix) | Automated All-in-One OS Command Injection Exploitation Tool. | ![](https://img.shields.io/github/stars/commixproject/commix) | ![](https://img.shields.io/github/languages/top/commixproject/commix) |", - "Description": "Automated All-in-One OS Command Injection Exploitation Tool.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "RCE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "confused": { - "Data": "| Scanner/CONFUSE | [confused](https://github.com/visma-prodsec/confused) | Tool to check for dependency confusion vulnerabilities in multiple package management systems | ![](https://img.shields.io/github/stars/visma-prodsec/confused) | ![](https://img.shields.io/github/languages/top/visma-prodsec/confused) |", - "Description": "Tool to check for dependency confusion vulnerabilities in multiple package management systems", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CONFUSE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "corsair_scan": { - "Data": "| Scanner/CORS | [corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan) | Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS). | ![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan) | ![](https://img.shields.io/github/languages/top/Santandersecurityresearch/corsair_scan) |", - "Description": "Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CORS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "crawlergo": { - "Data": "| Discovery/URL | [crawlergo](https://github.com/Qianlitp/crawlergo) | A powerful browser crawler for web vulnerability scanners | ![](https://img.shields.io/github/stars/Qianlitp/crawlergo) | ![](https://img.shields.io/github/languages/top/Qianlitp/crawlergo) |", - "Description": "A powerful browser crawler for web vulnerability scanners", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "crlfuzz": { - "Data": "| Scanner/CRLF | [crlfuzz](https://github.com/dwisiswant0/crlfuzz) | A fast tool to scan CRLF vulnerability written in Go | ![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/crlfuzz) |", - "Description": "A fast tool to scan CRLF vulnerability written in Go ", - "Install": { - "Linux": "GO111MODULE=on go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz", - "MacOS": "GO111MODULE=on go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz", - "Windows": "go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz" - }, - "Method": "CRLF", - "Type": "Scanner", - "Update": { - "Linux": "GO111MODULE=on go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz", - "MacOS": "GO111MODULE=on go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz", - "Windows": "go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz" - } - }, - "curl": { - "Data": "| Utility/HTTP | [curl](https://github.com/curl/curl) | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features | ![](https://img.shields.io/github/stars/curl/curl) | ![](https://img.shields.io/github/languages/top/curl/curl) |", - "Description": "A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HTTP", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dalfox": { - "Data": "| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | ![](https://img.shields.io/github/stars/hahwul/dalfox) | ![](https://img.shields.io/github/languages/top/hahwul/dalfox) |", - "Description": "🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang ", - "Install": { - "Linux": "go get -u github.com/hahwul/dalfox", - "MacOS": "brew install dalfox", - "Windows": "go get -u github.com/hahwul/dalfox" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "go get -u github.com/hahwul/dalfox", - "MacOS": "brew upgrade dalfox", - "Windows": "go get -u github.com/hahwul/dalfox" - } - }, - "dirsearch": { - "Data": "| Discovery/FUZZ | [dirsearch](https://github.com/maurosoria/dirsearch) | Web path scanner | ![](https://img.shields.io/github/stars/maurosoria/dirsearch) | ![](https://img.shields.io/github/languages/top/maurosoria/dirsearch) |", - "Description": "Web path scanner ", - "Install": { - "Linux": "git clone https://github.com/maurosoria/dirsearch", - "MacOS": "git clone https://github.com/maurosoria/dirsearch", - "Windows": "git clone https://github.com/maurosoria/dirsearch" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "cd dirsearch ; git pull -v", - "MacOS": "cd dirsearch ; git pull -v", - "Windows": "cd dirsearch ; git pull -v" - } - }, - "ditto": { - "Data": "| Discovery/DOMAIN | [ditto](https://github.com/evilsocket/ditto) | A tool for IDN homograph attacks and detection. | ![](https://img.shields.io/github/stars/evilsocket/ditto) | ![](https://img.shields.io/github/languages/top/evilsocket/ditto) |", - "Description": "A tool for IDN homograph attacks and detection.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dmut": { - "Data": "| Discovery/DOMAIN | [dmut](https://github.com/bp0lr/dmut) | A tool to perform permutations, mutations and alteration of subdomains in golang. | ![](https://img.shields.io/github/stars/bp0lr/dmut) | ![](https://img.shields.io/github/languages/top/bp0lr/dmut) |", - "Description": "A tool to perform permutations, mutations and alteration of subdomains in golang.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dnsobserver": { - "Data": "| Utility/OAST | [dnsobserver](https://github.com/allyomalley/dnsobserver) | A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. | ![](https://img.shields.io/github/stars/allyomalley/dnsobserver) | ![](https://img.shields.io/github/languages/top/allyomalley/dnsobserver) |", - "Description": "A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "OAST", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dnsprobe": { - "Data": "| Discovery/DNS | [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsprobe) |", - "Description": "DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. ", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe", - "Windows": "go get -u -v github.com/projectdiscovery/dnsprobe" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/dnsprobe", - "Windows": "go get -u -v github.com/projectdiscovery/dnsprobe" - } - }, - "dnsvalidator": { - "Data": "| Discovery/DNS | [dnsvalidator](https://github.com/vortexau/dnsvalidator) | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | ![](https://img.shields.io/github/stars/vortexau/dnsvalidator) | ![](https://img.shields.io/github/languages/top/vortexau/dnsvalidator) |", - "Description": "Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dnsx": { - "Data": "| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsx) |", - "Description": "dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "docem": { - "Data": "| Utility/PAYLOAD | [docem](https://github.com/whitel1st/docem) | Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids) | ![](https://img.shields.io/github/stars/whitel1st/docem) | ![](https://img.shields.io/github/languages/top/whitel1st/docem) |", - "Description": "Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "domdig": { - "Data": "| Scanner/XSS | [domdig](https://github.com/fcavallarin/domdig) | DOM XSS scanner for Single Page Applications | ![](https://img.shields.io/github/stars/fcavallarin/domdig) | ![](https://img.shields.io/github/languages/top/fcavallarin/domdig) |", - "Description": "DOM XSS scanner for Single Page Applications ", - "Install": { - "Linux": "git clone https://github.com/fcavallarin/domdig ; cd domdig ; npm i", - "MacOS": "git clone https://github.com/fcavallarin/domdig ; cd domdig ; npm i", - "Windows": "git clone https://github.com/fcavallarin/domdig ; cd domdig ; npm i" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "cd domdig ; npm i", - "MacOS": "cd domdig ; npm i", - "Windows": "cd domdig ; npm i" - } - }, - "dontgo403": { - "Data": "| Discovery/FUZZ | [dontgo403](https://github.com/devploit/dontgo403) | Tool to bypass 40X response codes. | ![](https://img.shields.io/github/stars/devploit/dontgo403) | ![](https://img.shields.io/github/languages/top/devploit/dontgo403) |", - "Description": "Tool to bypass 40X response codes.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "dotdotpwn": { - "Data": "| Scanner/LFI | [dotdotpwn](https://github.com/wireghoul/dotdotpwn) | DotDotPwn - The Directory Traversal Fuzzer | ![](https://img.shields.io/github/stars/wireghoul/dotdotpwn) | ![](https://img.shields.io/github/languages/top/wireghoul/dotdotpwn) |", - "Description": "DotDotPwn - The Directory Traversal Fuzzer ", - "Install": { - "Linux": "git clone https://github.com/wireghoul/dotdotpwn ; ", - "MacOS": "git clone https://github.com/wireghoul/dotdotpwn", - "Windows": "git clone https://github.com/wireghoul/dotdotpwn" - }, - "Method": "LFI", - "Type": "Scanner", - "Update": { - "Linux": "cd dotdotpwn ; git pull -v", - "MacOS": "cd dotdotpwn ; git pull -v", - "Windows": "cd dotdotpwn ; git pull -v" - } - }, - "ezXSS": { - "Data": "| Scanner/XSS | [ezXSS](https://github.com/ssl/ezXSS) | ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. | ![](https://img.shields.io/github/stars/ssl/ezXSS) | ![](https://img.shields.io/github/languages/top/ssl/ezXSS) |", - "Description": "ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. ", - "Install": { - "Linux": "git clone https://github.com/ssl/ezXSS", - "MacOS": "git clone https://github.com/ssl/ezXSS", - "Windows": "git clone https://github.com/ssl/ezXSS" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "cd ezXSS ; git pull -v", - "MacOS": "cd ezXSS ; git pull -v", - "Windows": "cd ezXSS ; git pull -v" - } - }, - "feroxbuster": { - "Data": "| Discovery/FUZZ | [feroxbuster](https://github.com/epi052/feroxbuster) | A fast, simple, recursive content discovery tool written in Rust. | ![](https://img.shields.io/github/stars/epi052/feroxbuster) | ![](https://img.shields.io/github/languages/top/epi052/feroxbuster) |", - "Description": "A fast, simple, recursive content discovery tool written in Rust.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "ffuf": { - "Data": "| Scanner/FUZZ | [ffuf](https://github.com/ffuf/ffuf) | Fast web fuzzer written in Go | ![](https://img.shields.io/github/stars/ffuf/ffuf) | ![](https://img.shields.io/github/languages/top/ffuf/ffuf) |", - "Description": "Fast web fuzzer written in Go ", - "Install": { - "Linux": "go get -u github.com/ffuf/ffuf", - "MacOS": "go get -u github.com/ffuf/ffuf", - "Windows": "go get -u github.com/ffuf/ffuf" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "go get -u github.com/ffuf/ffuf", - "MacOS": "go get -u github.com/ffuf/ffuf", - "Windows": "go get -u github.com/ffuf/ffuf" - } - }, - "fhc": { - "Data": "| Fetch/HTTP | [fhc](https://github.com/Edu4rdSHL/fhc) | Fast HTTP Checker. | ![](https://img.shields.io/github/stars/Edu4rdSHL/fhc) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/fhc) |", - "Description": "Fast HTTP Checker.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "findom-xss": { - "Data": "| Scanner/XSS | [findom-xss](https://github.com/dwisiswant0/findom-xss) | A fast DOM based XSS vulnerability scanner with simplicity. | ![](https://img.shields.io/github/stars/dwisiswant0/findom-xss) | ![](https://img.shields.io/github/languages/top/dwisiswant0/findom-xss) |", - "Description": "A fast DOM based XSS vulnerability scanner with simplicity. ", - "Install": { - "Linux": "git clone https://github.com/dwisiswant0/findom-xss.git --recurse-submodules", - "MacOS": "git clone https://github.com/dwisiswant0/findom-xss.git --recurse-submodules", - "Windows": "git clone https://github.com/dwisiswant0/findom-xss.git --recurse-submodules" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "cd findom-xss ; git pull -v", - "MacOS": "cd findom-xss ; git pull -v", - "Windows": "cd findom-xss ; git pull -v" - } - }, - "findomain": { - "Data": "| Discovery/DOMAIN | [findomain](https://github.com/Edu4rdSHL/findomain) | The fastest and cross-platform subdomain enumerator, do not waste your time. | ![](https://img.shields.io/github/stars/Edu4rdSHL/findomain) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/findomain) |", - "Description": "The fastest and cross-platform subdomain enumerator, do not waste your time. ", - "Install": { - "Linux": "mkdir findomain; cd findomain; wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux ; chmod +x findomain-linux", - "MacOS": "brew install findomain", - "Windows": "mkdir findomain; cd findomain; wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "cd findomain; wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux ; chmod +x findomain-linux", - "MacOS": "brew upgrade findomain", - "Windows": "cd findomain; wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe" - } - }, - "fockcache": { - "Data": "| Scanner/CACHE-POISON | [fockcache](https://github.com/tismayil/fockcache) | FockCache - Minimalized Test Cache Poisoning | ![](https://img.shields.io/github/stars/tismayil/fockcache) | ![](https://img.shields.io/github/languages/top/tismayil/fockcache) |", - "Description": "FockCache - Minimalized Test Cache Poisoning", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CACHE-POISON", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "fuzzparam": { - "Data": "| Discovery/PARAM | [fuzzparam](https://github.com/0xsapra/fuzzparam) | A fast go based param miner to fuzz possible parameters a URL can have. | ![](https://img.shields.io/github/stars/0xsapra/fuzzparam) | ![](https://img.shields.io/github/languages/top/0xsapra/fuzzparam) |", - "Description": "A fast go based param miner to fuzz possible parameters a URL can have.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PARAM", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "fzf": { - "Data": "| Utility/ANY | [fzf](https://github.com/junegunn/fzf) | A command-line fuzzy finder | ![](https://img.shields.io/github/stars/junegunn/fzf) | ![](https://img.shields.io/github/languages/top/junegunn/fzf) |", - "Description": "A command-line fuzzy finder", - "Install": { - "Linux": "git clone --depth 1 https://github.com/junegunn/fzf.git ; cd fzf ; ./install", - "MacOS": "brew install fzf", - "Windows": "choco install fzf" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "cd fzf ; git pull -v ; ./install", - "MacOS": "brew upgrade fzf", - "Windows": "choco update fzf" - } - }, - "gau": { - "Data": "| Discovery/URL | [gau](https://github.com/lc/gau) | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | ![](https://img.shields.io/github/stars/lc/gau) | ![](https://img.shields.io/github/languages/top/lc/gau) |", - "Description": "Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/lc/gau", - "MacOS": "GO111MODULE=on go get -u -v github.com/lc/gau", - "Windows": "go get -u -v github.com/lc/gau" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/lc/gau", - "MacOS": "GO111MODULE=on go get -u -v github.com/lc/gau", - "Windows": "go get -u -v github.com/lc/gau" - } - }, - "gauplus": { - "Data": "| Discovery/URL | [gauplus](https://github.com/bp0lr/gauplus) | A modified version of gau for personal usage. Support workers, proxies and some extra things. | ![](https://img.shields.io/github/stars/bp0lr/gauplus) | ![](https://img.shields.io/github/languages/top/bp0lr/gauplus) |", - "Description": "A modified version of gau for personal usage. Support workers, proxies and some extra things.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gee": { - "Data": "| Utility/ANY | [gee](https://github.com/hahwul/gee) | 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go | ![](https://img.shields.io/github/stars/hahwul/gee) | ![](https://img.shields.io/github/languages/top/hahwul/gee) |", - "Description": "🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "getJS": { - "Data": "| Fetch/JS | [getJS](https://github.com/003random/getJS) | A tool to fastly get all javascript sources/files | ![](https://img.shields.io/github/stars/003random/getJS) | ![](https://img.shields.io/github/languages/top/003random/getJS) |", - "Description": "A tool to fastly get all javascript sources/files", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "JS", - "Type": "Fetch", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gf": { - "Data": "| Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things | ![](https://img.shields.io/github/stars/tomnomnom/gf) | ![](https://img.shields.io/github/languages/top/tomnomnom/gf) |", - "Description": "A wrapper around grep, to help you grep for things ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/gf; cp -r $GOPATH/src/github.com/tomnomnom/gf/examples ~/.gf", - "MacOS": "go get -u github.com/tomnomnom/gf; cp -r $GOPATH/src/github.com/tomnomnom/gf/examples ~/.gf", - "Windows": "go get -u github.com/tomnomnom/gf" - }, - "Method": "GREP", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/tomnomnom/gf", - "MacOS": "go get -u github.com/tomnomnom/gf", - "Windows": "go get -u github.com/tomnomnom/gf" - } - }, - "gitGraber": { - "Data": "| Discovery/GIT | [gitGraber](https://github.com/hisxo/gitGraber) | gitGraber | ![](https://img.shields.io/github/stars/hisxo/gitGraber) | ![](https://img.shields.io/github/languages/top/hisxo/gitGraber) |", - "Description": "gitGraber ", - "Install": { - "Linux": "git clone https://github.com/hisxo/gitGraber ; cd gitGraber; pip3 install -r requirements.txt", - "MacOS": "git clone https://github.com/hisxo/gitGraber ; cd gitGraber; pip3 install -r requirements.txt", - "Windows": "git clone https://github.com/hisxo/gitGraber ; cd gitGraber; pip3 install -r requirements.txt" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "cd gitGraber; git pull -v ; pip3 install -r requirements.txt", - "MacOS": "cd gitGraber; git pull -v ; pip3 install -r requirements.txt", - "Windows": "cd gitGraber; git pull -v ; pip3 install -r requirements.txt" - } - }, - "github-endpoints": { - "Data": "| Discovery/GIT | [github-endpoints](https://github.com/gwen001/github-endpoints) | Find endpoints on GitHub. | ![](https://img.shields.io/github/stars/gwen001/github-endpoints) | ![](https://img.shields.io/github/languages/top/gwen001/github-endpoints) |", - "Description": "Find endpoints on GitHub.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "github-regexp": { - "Data": "| Discovery/GIT | [github-regexp](https://github.com/gwen001/github-regexp) | Basically a regexp over a GitHub search. | ![](https://img.shields.io/github/stars/gwen001/github-regexp) | ![](https://img.shields.io/github/languages/top/gwen001/github-regexp) |", - "Description": "Basically a regexp over a GitHub search.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "github-search": { - "Data": "| Discovery/GIT | [github-search](https://github.com/gwen001/github-search) | Tools to perform basic search on GitHub. | ![](https://img.shields.io/github/stars/gwen001/github-search) | ![](https://img.shields.io/github/languages/top/gwen001/github-search) |", - "Description": "Tools to perform basic search on GitHub. ", - "Install": { - "Linux": "git clone https://github.com/gwen001/github-search", - "MacOS": "git clone https://github.com/gwen001/github-search", - "Windows": "git clone https://github.com/gwen001/github-search" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "cd github-search ; git pull -v", - "MacOS": "cd github-search ; git pull -v", - "Windows": "cd github-search ; git pull -v" - } - }, - "github-subdomains": { - "Data": "| Discovery/GIT | [github-subdomains](https://github.com/gwen001/github-subdomains) | Find subdomains on GitHub | ![](https://img.shields.io/github/stars/gwen001/github-subdomains) | ![](https://img.shields.io/github/languages/top/gwen001/github-subdomains) |", - "Description": "Find subdomains on GitHub", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gitleaks": { - "Data": "| Discovery/GIT | [gitleaks](https://github.com/zricethezav/gitleaks) | Scan git repos (or files) for secrets using regex and entropy 🔑 | ![](https://img.shields.io/github/stars/zricethezav/gitleaks) | ![](https://img.shields.io/github/languages/top/zricethezav/gitleaks) |", - "Description": "Scan git repos (or files) for secrets using regex and entropy 🔑", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gitls": { - "Data": "| Utility/GIT | [gitls](https://github.com/hahwul/gitls) | Listing git repository from URL/User/Org | ![](https://img.shields.io/github/stars/hahwul/gitls) | ![](https://img.shields.io/github/languages/top/hahwul/gitls) |", - "Description": "Listing git repository from URL/User/Org", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GIT", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gitrob": { - "Data": "| Discovery/GIT | [gitrob](https://github.com/michenriksen/gitrob) | Reconnaissance tool for GitHub organizations | ![](https://img.shields.io/github/stars/michenriksen/gitrob) | ![](https://img.shields.io/github/languages/top/michenriksen/gitrob) |", - "Description": "Reconnaissance tool for GitHub organizations ", - "Install": { - "Linux": "go get github.com/michenriksen/gitrob", - "MacOS": "go get github.com/michenriksen/gitrob", - "Windows": "go get github.com/michenriksen/gitrob" - }, - "Method": "GIT", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/michenriksen/gitrob", - "MacOS": "go get github.com/michenriksen/gitrob", - "Windows": "go get github.com/michenriksen/gitrob" - } - }, - "go-dork": { - "Data": "| Discovery/URL | [go-dork](https://github.com/dwisiswant0/go-dork) | The fastest dork scanner written in Go. | ![](https://img.shields.io/github/stars/dwisiswant0/go-dork) | ![](https://img.shields.io/github/languages/top/dwisiswant0/go-dork) |", - "Description": "The fastest dork scanner written in Go. ", - "Install": { - "Linux": "GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/...", - "MacOS": "GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/...", - "Windows": "go get -v github.com/dwisiswant0/go-dork/..." - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/...", - "MacOS": "GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/...", - "Windows": "go get -v github.com/dwisiswant0/go-dork/..." - } - }, - "gobuster": { - "Data": "| Discovery/FUZZ | [gobuster](https://github.com/OJ/gobuster) | Directory/File, DNS and VHost busting tool written in Go | ![](https://img.shields.io/github/stars/OJ/gobuster) | ![](https://img.shields.io/github/languages/top/OJ/gobuster) |", - "Description": "Directory/File, DNS and VHost busting tool written in Go ", - "Install": { - "Linux": "go get github.com/OJ/gobuster", - "MacOS": "go get github.com/OJ/gobuster", - "Windows": "go get github.com/OJ/gobuster" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/OJ/gobuster", - "MacOS": "go get github.com/OJ/gobuster", - "Windows": "go get github.com/OJ/gobuster" - } - }, - "gospider": { - "Data": "| Discovery/URL | [gospider](https://github.com/jaeles-project/gospider) | Gospider - Fast web spider written in Go | ![](https://img.shields.io/github/stars/jaeles-project/gospider) | ![](https://img.shields.io/github/languages/top/jaeles-project/gospider) |", - "Description": "Gospider - Fast web spider written in Go ", - "Install": { - "Linux": "go get -u github.com/jaeles-project/gospider", - "MacOS": "go get -u github.com/jaeles-project/gospider", - "Windows": "go get -u github.com/jaeles-project/gospider" - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "go get -u github.com/jaeles-project/gospider", - "MacOS": "go get -u github.com/jaeles-project/gospider", - "Windows": "go get -u github.com/jaeles-project/gospider" - } - }, - "gotator": { - "Data": "| Utility/WORDLIST | [gotator](https://github.com/Josue87/gotator) | Gotator is a tool to generate DNS wordlists through permutations. | ![](https://img.shields.io/github/stars/Josue87/gotator) | ![](https://img.shields.io/github/languages/top/Josue87/gotator) |", - "Description": "Gotator is a tool to generate DNS wordlists through permutations.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WORDLIST", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gotestwaf": { - "Data": "| Utility/WAF | [gotestwaf](https://github.com/wallarm/gotestwaf) | An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses | ![](https://img.shields.io/github/stars/wallarm/gotestwaf) | ![](https://img.shields.io/github/languages/top/wallarm/gotestwaf) |", - "Description": "An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WAF", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gowitness": { - "Data": "| Utility/SHOT | [gowitness](https://github.com/sensepost/gowitness) | 🔍 gowitness - a golang, web screenshot utility using Chrome Headless | ![](https://img.shields.io/github/stars/sensepost/gowitness) | ![](https://img.shields.io/github/languages/top/sensepost/gowitness) |", - "Description": "🔍 gowitness - a golang, web screenshot utility using Chrome Headless ", - "Install": { - "Linux": "go get -u github.com/sensepost/gowitness", - "MacOS": "go get -u github.com/sensepost/gowitness", - "Windows": "go get -u github.com/sensepost/gowitness" - }, - "Method": "SHOT", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/sensepost/gowitness", - "MacOS": "go get -u github.com/sensepost/gowitness", - "Windows": "go get -u github.com/sensepost/gowitness" - } - }, - "graphql-voyager": { - "Data": "| Discovery/GQL | [graphql-voyager](https://github.com/APIs-guru/graphql-voyager) | 🛰️ Represent any GraphQL API as an interactive graph | ![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager) | ![](https://img.shields.io/github/languages/top/APIs-guru/graphql-voyager) |", - "Description": "🛰️ Represent any GraphQL API as an interactive graph ", - "Install": { - "Linux": "git clone https://github.com/APIs-guru/graphql-voyager", - "MacOS": "git clone https://github.com/APIs-guru/graphql-voyager", - "Windows": "git clone https://github.com/APIs-guru/graphql-voyager" - }, - "Method": "GQL", - "Type": "Discovery", - "Update": { - "Linux": "cd graphql-voyager ; git pull -v", - "MacOS": "cd graphql-voyager ; git pull -v", - "Windows": "cd graphql-voyager ; git pull -v" - } - }, - "grc": { - "Data": "| Utility/ANY | [grc](https://github.com/garabik/grc) | generic colouriser | ![](https://img.shields.io/github/stars/garabik/grc) | ![](https://img.shields.io/github/languages/top/garabik/grc) |", - "Description": "generic colouriser", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "grex": { - "Data": "| Utility/URL | [grex](https://github.com/pemistahl/grex) | A command-line tool and library for generating regular expressions from user-provided test cases | ![](https://img.shields.io/github/stars/pemistahl/grex) | ![](https://img.shields.io/github/languages/top/pemistahl/grex) |", - "Description": "A command-line tool and library for generating regular expressions from user-provided test cases", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "gron": { - "Data": "| Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! | ![](https://img.shields.io/github/stars/tomnomnom/gron) | ![](https://img.shields.io/github/languages/top/tomnomnom/gron) |", - "Description": "Make JSON greppable! ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/gron", - "MacOS": "go get -u github.com/tomnomnom/gron", - "Windows": "go get -u github.com/tomnomnom/gron" - }, - "Method": "JSON", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/tomnomnom/gron", - "MacOS": "go get -u github.com/tomnomnom/gron", - "Windows": "go get -u github.com/tomnomnom/gron" - } - }, - "h2csmuggler": { - "Data": "| Scanner/SMUGGLE | [h2csmuggler](https://github.com/assetnote/h2csmuggler) | HTTP Request Smuggling Detection Tool | ![](https://img.shields.io/github/stars/assetnote/h2csmuggler) | ![](https://img.shields.io/github/languages/top/assetnote/h2csmuggler) |", - "Description": "HTTP Request Smuggling Detection Tool", - "Install": { - "Linux": "git clone https://github.com/BishopFox/h2csmuggler; cd h2csmuggler; pip3 install h2", - "MacOS": "git clone https://github.com/BishopFox/h2csmuggler; cd h2csmuggler; pip3 install h2", - "Windows": "git clone https://github.com/BishopFox/h2csmuggler; cd h2csmuggler; pip3 install h2" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "cd h2csmuggler ; git pull -v", - "MacOS": "cd h2csmuggler ; git pull -v", - "Windows": "cd h2csmuggler ; git pull -v" - } - }, - "hacks": { - "Data": "| ToolBox/ALL | [hacks](https://github.com/tomnomnom/hacks) | A collection of hacks and one-off scripts | ![](https://img.shields.io/github/stars/tomnomnom/hacks) | ![](https://img.shields.io/github/languages/top/tomnomnom/hacks) |", - "Description": "A collection of hacks and one-off scripts ", - "Install": { - "Linux": "git clone https://github.com/tomnomnom/hacks;", - "MacOS": "git clone https://github.com/tomnomnom/hacks;", - "Windows": "git clone https://github.com/tomnomnom/hacks;" - }, - "Method": "ALL", - "Type": "ToolBox", - "Update": { - "Linux": "cd hacks ; git pull -v", - "MacOS": "cd hacks ; git pull -v", - "Windows": "cd hacks ; git pull -v" - } - }, - "hakcheckurl": { - "Data": "| Utility/URL | [hakcheckurl](https://github.com/hakluke/hakcheckurl) | Takes a list of URLs and returns their HTTP response codes | ![](https://img.shields.io/github/stars/hakluke/hakcheckurl) | ![](https://img.shields.io/github/languages/top/hakluke/hakcheckurl) |", - "Description": "Takes a list of URLs and returns their HTTP response codes", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "hakrawler": { - "Data": "| Discovery/URL | [hakrawler](https://github.com/hakluke/hakrawler) | Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application | ![](https://img.shields.io/github/stars/hakluke/hakrawler) | ![](https://img.shields.io/github/languages/top/hakluke/hakrawler) |", - "Description": "Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application ", - "Install": { - "Linux": "go get github.com/hakluke/hakrawler", - "MacOS": "go get github.com/hakluke/hakrawler", - "Windows": "go get github.com/hakluke/hakrawler" - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/hakluke/hakrawler", - "MacOS": "go get github.com/hakluke/hakrawler", - "Windows": "go get github.com/hakluke/hakrawler" - } - }, - "hakrevdns": { - "Data": "| Discovery/DNS | [hakrevdns](https://github.com/hakluke/hakrevdns) | Small, fast tool for performing reverse DNS lookups en masse. | ![](https://img.shields.io/github/stars/hakluke/hakrevdns) | ![](https://img.shields.io/github/languages/top/hakluke/hakrevdns) |", - "Description": "Small, fast tool for performing reverse DNS lookups en masse. ", - "Install": { - "Linux": "go get github.com/hakluke/hakrevdns", - "MacOS": "go get github.com/hakluke/hakrevdns", - "Windows": "go get github.com/hakluke/hakrevdns" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/hakluke/hakrevdns", - "MacOS": "go get github.com/hakluke/hakrevdns", - "Windows": "go get github.com/hakluke/hakrevdns" - } - }, - "haktrails": { - "Data": "| Discovery/DNS | [haktrails](https://github.com/hakluke/haktrails) | Golang client for querying SecurityTrails API data | ![](https://img.shields.io/github/stars/hakluke/haktrails) | ![](https://img.shields.io/github/languages/top/hakluke/haktrails) |", - "Description": "Golang client for querying SecurityTrails API data", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "hashcat": { - "Data": "| Utility/CRACK | [hashcat](https://github.com/hashcat/hashcat/) | World's fastest and most advanced password recovery utility | ![](https://img.shields.io/github/stars/hashcat/hashcat/) | ![](https://img.shields.io/github/languages/top/hashcat/hashcat/) |", - "Description": "World's fastest and most advanced password recovery utility ", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CRACK", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "headi": { - "Data": "| Discovery/HTTP | [headi](https://github.com/mlcsec/headi) | Customisable and automated HTTP header injection | ![](https://img.shields.io/github/stars/mlcsec/headi) | ![](https://img.shields.io/github/languages/top/mlcsec/headi) |", - "Description": "Customisable and automated HTTP header injection", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HTTP", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "hetty": { - "Data": "| Army-Knife/PROXY | [hetty](https://github.com/dstotijn/hetty) | Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. | ![](https://img.shields.io/github/stars/dstotijn/hetty) | ![](https://img.shields.io/github/languages/top/dstotijn/hetty) |", - "Description": "Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.", - "Install": { - "Linux": "GO111MODULE=auto go get -u -v github.com/dstotijn/hetty/cmd/hetty", - "MacOS": "GO111MODULE=auto go get -u -v github.com/dstotijn/hetty/cmd/hetty", - "Windows": "go get -u -v github.com/dstotijn/hetty/cmd/hetty" - }, - "Method": "PROXY", - "Type": "Army-Knife", - "Update": { - "Linux": "GO111MODULE=auto go get -u -v github.com/dstotijn/hetty/cmd/hetty", - "MacOS": "GO111MODULE=auto go get -u -v github.com/dstotijn/hetty/cmd/hetty", - "Windows": "go get -u -v github.com/dstotijn/hetty/cmd/hetty" - } - }, - "hinject": { - "Data": "| Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker | ![](https://img.shields.io/github/stars/dwisiswant0/hinject) | ![](https://img.shields.io/github/languages/top/dwisiswant0/hinject) |", - "Description": "Host Header Injection Checker ", - "Install": { - "Linux": "go get -u github.com/dwisiswant0/hinject", - "MacOS": "go get -u github.com/dwisiswant0/hinject", - "Windows": "go get -u github.com/dwisiswant0/hinject" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/dwisiswant0/hinject", - "MacOS": "go get -u github.com/dwisiswant0/hinject", - "Windows": "go get -u github.com/dwisiswant0/hinject" - } - }, - "htcat": { - "Data": "| Fetch/HTTP | [htcat](https://github.com/htcat/htcat) | Parallel and Pipelined HTTP GET Utility | ![](https://img.shields.io/github/stars/htcat/htcat) | ![](https://img.shields.io/github/languages/top/htcat/htcat) |", - "Description": "Parallel and Pipelined HTTP GET Utility ", - "Install": { - "Linux": "go get github.com/htcat/htcat/cmd/htcat", - "MacOS": "go get github.com/htcat/htcat/cmd/htcat", - "Windows": "go get github.com/htcat/htcat/cmd/htcat" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "go get github.com/htcat/htcat/cmd/htcat", - "MacOS": "go get github.com/htcat/htcat/cmd/htcat", - "Windows": "go get github.com/htcat/htcat/cmd/htcat" - } - }, - "http-request-smuggler": { - "Data": "| Scanner/SMUGGLE | [http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler) | This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs. | ![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler) | ![](https://img.shields.io/github/languages/top/PortSwigger/http-request-smuggler) |", - "Description": "This extension should not be confused with Burp Suite HTTP Smuggler, which uses similar techniques but is focused exclusively bypassing WAFs.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "http-request-smuggling": { - "Data": "| Scanner/SMUGGLE | [http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling) | HTTP Request Smuggling Detection Tool | ![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling) | ![](https://img.shields.io/github/languages/top/anshumanpattnaik/http-request-smuggling) |", - "Description": "HTTP Request Smuggling Detection Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "http2smugl": { - "Data": "| Scanner/SMUGGLE | [http2smugl](https://github.com/neex/http2smugl) | This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server. | ![](https://img.shields.io/github/stars/neex/http2smugl) | ![](https://img.shields.io/github/languages/top/neex/http2smugl) |", - "Description": "This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -\u003e HTTP/1.1 conversion by the frontend server.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "httpie": { - "Data": "| Utility/HTTP | [httpie](https://github.com/httpie/httpie) | As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins \u0026 more. https://twitter.com/httpie | ![](https://img.shields.io/github/stars/httpie/httpie) | ![](https://img.shields.io/github/languages/top/httpie/httpie) |", - "Description": "As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins \u0026 more. https://twitter.com/httpie", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HTTP", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "httprobe": { - "Data": "| Fetch/HTTP | [httprobe](https://github.com/tomnomnom/httprobe) | Take a list of domains and probe for working HTTP and HTTPS servers | ![](https://img.shields.io/github/stars/tomnomnom/httprobe) | ![](https://img.shields.io/github/languages/top/tomnomnom/httprobe) |", - "Description": "Take a list of domains and probe for working HTTP and HTTPS servers ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/httprobe", - "MacOS": "go get -u github.com/tomnomnom/httprobe", - "Windows": "go get -u github.com/tomnomnom/httprobe" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "go get -u github.com/tomnomnom/httprobe", - "MacOS": "go get -u github.com/tomnomnom/httprobe", - "Windows": "go get -u github.com/tomnomnom/httprobe" - } - }, - "httptoolkit": { - "Data": "| Army-Knife/PROXY | [httptoolkit](https://github.com/httptoolkit/httptoolkit) | HTTP Toolkit is a beautiful \u0026 open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux \u0026 Mac | ![](https://img.shields.io/github/stars/httptoolkit/httptoolkit) | ![](https://img.shields.io/github/languages/top/httptoolkit/httptoolkit) |", - "Description": "HTTP Toolkit is a beautiful \u0026 open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux \u0026 Mac", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PROXY", - "Type": "Army-Knife", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "httpx": { - "Data": "| Fetch/HTTP | [httpx](https://github.com/projectdiscovery/httpx) | httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. | ![](https://img.shields.io/github/stars/projectdiscovery/httpx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/httpx) |", - "Description": "httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. ", - "Install": { - "Linux": "GO111MODULE=auto go get -u -v github.com/projectdiscovery/httpx/cmd/httpx", - "MacOS": "GO111MODULE=auto go get -u -v github.com/projectdiscovery/httpx/cmd/httpx", - "Windows": "go get -u -v github.com/projectdiscovery/httpx/cmd/httpx" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "GO111MODULE=auto go get -u -v github.com/projectdiscovery/httpx/cmd/httpx", - "MacOS": "GO111MODULE=auto go get -u -v github.com/projectdiscovery/httpx/cmd/httpx", - "Windows": "go get -u -v github.com/projectdiscovery/httpx/cmd/httpx" - } - }, - "hurl": { - "Data": "| Utility/HTTP | [hurl](https://github.com/Orange-OpenSource/hurl) | Hurl, run and test HTTP requests. | ![](https://img.shields.io/github/stars/Orange-OpenSource/hurl) | ![](https://img.shields.io/github/languages/top/Orange-OpenSource/hurl) |", - "Description": "Hurl, run and test HTTP requests.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HTTP", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "inql": { - "Data": "| Discovery/GQL | [inql](https://github.com/doyensec/inql) | InQL - A Burp Extension for GraphQL Security Testing | ![](https://img.shields.io/github/stars/doyensec/inql) | ![](https://img.shields.io/github/languages/top/doyensec/inql) |", - "Description": "InQL - A Burp Extension for GraphQL Security Testing ", - "Install": { - "Linux": "git clone https://github.com/doyensec/inql ; cd inql ; pip3 install -r requirements.txt ; python setup.py install", - "MacOS": "git clone https://github.com/doyensec/inql ; cd inql ; pip3 install -r requirements.txt ; python setup.py install", - "Windows": "git clone https://github.com/doyensec/inql ; cd inql ; pip3 install -r requirements.txt ; python setup.py install" - }, - "Method": "GQL", - "Type": "Discovery", - "Update": { - "Linux": "cd inql ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install", - "MacOS": "cd inql ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install", - "Windows": "cd inql ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install" - } - }, - "interactsh": { - "Data": "| Utility/OAST | [interactsh](https://github.com/projectdiscovery/interactsh) | An OOB interaction gathering server and client library | ![](https://img.shields.io/github/stars/projectdiscovery/interactsh) | ![](https://img.shields.io/github/languages/top/projectdiscovery/interactsh) |", - "Description": "An OOB interaction gathering server and client library", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "OAST", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "intrigue-core": { - "Data": "| Discovery/ALL | [intrigue-core](https://github.com/intrigueio/intrigue-core) | Discover Your Attack Surface | ![](https://img.shields.io/github/stars/intrigueio/intrigue-core) | ![](https://img.shields.io/github/languages/top/intrigueio/intrigue-core) |", - "Description": "Discover Your Attack Surface ", - "Install": { - "Linux": "git clone https://github.com/intrigueio/intrigue-core ; cd intrigue-core ; bundle install", - "MacOS": "git clone https://github.com/intrigueio/intrigue-core ; cd intrigue-core ; bundle install", - "Windows": "git clone https://github.com/intrigueio/intrigue-core ; cd intrigue-core ; bundle install" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "cd intrigue-core ; git pull -v ; bundle install", - "MacOS": "cd intrigue-core ; git pull -v ; bundle install", - "Windows": "cd intrigue-core ; git pull -v ; bundle install" - } - }, - "jaeles": { - "Data": "| Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing | ![](https://img.shields.io/github/stars/jaeles-project/jaeles) | ![](https://img.shields.io/github/languages/top/jaeles-project/jaeles) |", - "Description": "The Swiss Army knife for automated Web Application Testing ", - "Install": { - "Linux": "GO111MODULE=on go get github.com/jaeles-project/jaeles", - "MacOS": "GO111MODULE=on go get github.com/jaeles-project/jaeles", - "Windows": "go get github.com/jaeles-project/jaeles" - }, - "Method": "JAELES", - "Type": "Army-Knife", - "Update": { - "Linux": "GO111MODULE=on go get github.com/jaeles-project/jaeles", - "MacOS": "GO111MODULE=on go get github.com/jaeles-project/jaeles", - "Windows": "go get github.com/jaeles-project/jaeles" - } - }, - "jsfuck": { - "Data": "| Utility/PAYLOAD | [jsfuck](https://github.com/aemkei/jsfuck) | Write any JavaScript with 6 Characters | ![](https://img.shields.io/github/stars/aemkei/jsfuck) | ![](https://img.shields.io/github/languages/top/aemkei/jsfuck) |", - "Description": "Write any JavaScript with 6 Characters", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "jsprime": { - "Data": "| Scanner/JS | [jsprime](https://github.com/dpnishant/jsprime) | a javascript static security analysis tool | ![](https://img.shields.io/github/stars/dpnishant/jsprime) | ![](https://img.shields.io/github/languages/top/dpnishant/jsprime) |", - "Description": "a javascript static security analysis tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "JS", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "jwt-cracker": { - "Data": "| Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker | ![](https://img.shields.io/github/stars/lmammino/jwt-cracker) | ![](https://img.shields.io/github/languages/top/lmammino/jwt-cracker) |", - "Description": "Simple HS256 JWT token brute force cracker ", - "Install": { - "Linux": "npm install --global jwt-cracker", - "MacOS": "npm install --global jwt-cracker", - "Windows": "npm install --global jwt-cracker" - }, - "Method": "JWT", - "Type": "Utility", - "Update": { - "Linux": "npm install --global jwt-cracker", - "MacOS": "npm install --global jwt-cracker", - "Windows": "npm install --global jwt-cracker" - } - }, - "jwt-hack": { - "Data": "| Utility/JWT | [jwt-hack](https://github.com/hahwul/jwt-hack) | 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) | ![](https://img.shields.io/github/stars/hahwul/jwt-hack) | ![](https://img.shields.io/github/languages/top/hahwul/jwt-hack) |", - "Description": "🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)", - "Install": { - "Linux": "go get -u github.com/hahwul/jwt-hack", - "MacOS": "go get -u github.com/hahwul/jwt-hack", - "Windows": "go get -u github.com/hahwul/jwt-hack" - }, - "Method": "JWT", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/hahwul/jwt-hack", - "MacOS": "go get -u github.com/hahwul/jwt-hack", - "Windows": "go get -u github.com/hahwul/jwt-hack" - } - }, - "kiterunner": { - "Data": "| Discovery/API | [kiterunner](https://github.com/assetnote/kiterunner) | Contextual Content Discovery Tool | ![](https://img.shields.io/github/stars/assetnote/kiterunner) | ![](https://img.shields.io/github/languages/top/assetnote/kiterunner) |", - "Description": "Contextual Content Discovery Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "API", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "knock": { - "Data": "| Discovery/DOMAIN | [knock](https://github.com/guelfoweb/knock) | Knock Subdomain Scan | ![](https://img.shields.io/github/stars/guelfoweb/knock) | ![](https://img.shields.io/github/languages/top/guelfoweb/knock) |", - "Description": "Knock Subdomain Scan ", - "Install": { - "Linux": "git clone https://github.com/guelfoweb/knock ; cd knock ; pip3 install -r requirements.txt ; python setup.py install", - "MacOS": "git clone https://github.com/guelfoweb/knock ; cd knock ; pip3 install -r requirements.txt ; python setup.py install", - "Windows": "git clone https://github.com/guelfoweb/knock ; cd knock ; pip3 install -r requirements.txt ; python setup.py install" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "cd knock ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install", - "MacOS": "cd knock ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install", - "Windows": "cd knock ; git pull -v ; pip3 install -r requirements.txt ; python setup.py install" - } - }, - "lazyrecon": { - "Data": "| Discovery/ALL | [lazyrecon](https://github.com/nahamsec/lazyrecon) | This script is intended to automate your reconnaissance process in an organized fashion | ![](https://img.shields.io/github/stars/nahamsec/lazyrecon) | ![](https://img.shields.io/github/languages/top/nahamsec/lazyrecon) |", - "Description": "This script is intended to automate your reconnaissance process in an organized fashion ", - "Install": { - "Linux": "git clone https://github.com/nahamsec/lazyrecon", - "MacOS": "git clone https://github.com/nahamsec/lazyrecon", - "Windows": "git clone https://github.com/nahamsec/lazyrecon" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "cd lazyrecon ; git pull -v", - "MacOS": "cd lazyrecon ; git pull -v", - "Windows": "cd lazyrecon ; git pull -v" - } - }, - "longtongue": { - "Data": "| Utility/WORD | [longtongue](https://github.com/edoardottt/longtongue) | Customized Password/Passphrase List inputting Target Info | ![](https://img.shields.io/github/stars/edoardottt/longtongue) | ![](https://img.shields.io/github/languages/top/edoardottt/longtongue) |", - "Description": "Customized Password/Passphrase List inputting Target Info", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WORD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "masscan": { - "Data": "| Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ![](https://img.shields.io/github/stars/robertdavidgraham/masscan) | ![](https://img.shields.io/github/languages/top/robertdavidgraham/masscan) |", - "Description": "TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. ", - "Install": { - "Linux": "git clone https://github.com/robertdavidgraham/masscan ; cd masscan ; apt-get install git gcc make libpcap-dev; make", - "MacOS": "git clone https://github.com/robertdavidgraham/masscan ; cd masscan ; make", - "Windows": "git clone https://github.com/robertdavidgraham/masscan ; cd masscan ; make " - }, - "Method": "PORT", - "Type": "Discovery", - "Update": { - "Linux": "cd masscan ; git pull -v ; make", - "MacOS": "cd masscan ; git pull -v ; make", - "Windows": "cd masscan ; git pull -v ; make" - } - }, - "medusa": { - "Data": "| Discovery/FUZZ | [medusa](https://github.com/riza/medusa) | Fastest recursive HTTP fuzzer, like a Ferrari. | ![](https://img.shields.io/github/stars/riza/medusa) | ![](https://img.shields.io/github/languages/top/riza/medusa) |", - "Description": "Fastest recursive HTTP fuzzer, like a Ferrari. ", - "Install": { - "Linux": "go get -u github.com/riza/medusa", - "MacOS": "go get -u github.com/riza/medusa", - "Windows": "go get -u github.com/riza/medusa" - }, - "Method": "FUZZ", - "Type": "Discovery", - "Update": { - "Linux": "go get -u github.com/riza/medusa", - "MacOS": "go get -u github.com/riza/medusa", - "Windows": "go get -u github.com/riza/medusa" - } - }, - "meg": { - "Data": "| Fetch/HTTP | [meg](https://github.com/tomnomnom/meg) | Fetch many paths for many hosts - without killing the hosts | ![](https://img.shields.io/github/stars/tomnomnom/meg) | ![](https://img.shields.io/github/languages/top/tomnomnom/meg) |", - "Description": "Fetch many paths for many hosts - without killing the hosts ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/meg", - "MacOS": "go get -u github.com/tomnomnom/meg", - "Windows": "go get -u github.com/tomnomnom/meg" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "go get -u github.com/tomnomnom/meg", - "MacOS": "go get -u github.com/tomnomnom/meg", - "Windows": "go get -u github.com/tomnomnom/meg" - } - }, - "megplus": { - "Data": "| Scanner/RECON | [megplus](https://github.com/EdOverflow/megplus) | Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] | ![](https://img.shields.io/github/stars/EdOverflow/megplus) | ![](https://img.shields.io/github/languages/top/EdOverflow/megplus) |", - "Description": "Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] ", - "Install": { - "Linux": "git clone https://github.com/EdOverflow/megplus", - "MacOS": "git clone https://github.com/EdOverflow/megplus", - "Windows": "git clone https://github.com/EdOverflow/megplus" - }, - "Method": "RECON", - "Type": "Scanner", - "Update": { - "Linux": "cd megplus ; git pull -v", - "MacOS": "cd megplus ; git pull -v", - "Windows": "cd megplus ; git pull -v" - } - }, - "naabu": { - "Data": "| Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests | ![](https://img.shields.io/github/stars/projectdiscovery/naabu) | ![](https://img.shields.io/github/languages/top/projectdiscovery/naabu) |", - "Description": "A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests ", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu", - "Windows": "go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu" - }, - "Method": "PORT", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu", - "Windows": "go get -u -v github.com/projectdiscovery/naabu/v2/cmd/naabu" - } - }, - "nikto": { - "Data": "| Scanner/WVS | [nikto](https://github.com/sullo/nikto) | Nikto web server scanner | ![](https://img.shields.io/github/stars/sullo/nikto) | ![](https://img.shields.io/github/languages/top/sullo/nikto) |", - "Description": "Nikto web server scanner ", - "Install": { - "Linux": "git clone https://github.com/sullo/nikto", - "MacOS": "git clone https://github.com/sullo/nikto", - "Windows": "git clone https://github.com/sullo/nikto" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "cd nikto ; git pull -v", - "MacOS": "cd nikto ; git pull -v", - "Windows": "cd nikto ; git pull -v" - } - }, - "nmap": { - "Data": "| Discovery/PORT | [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. | ![](https://img.shields.io/github/stars/nmap/nmap) | ![](https://img.shields.io/github/languages/top/nmap/nmap) |", - "Description": "Nmap - the Network Mapper. Github mirror of official SVN repository. ", - "Install": { - "Linux": "sudo apt install nmap", - "MacOS": "brew install nmap", - "Windows": "" - }, - "Method": "PORT", - "Type": "Discovery", - "Update": { - "Linux": "sudo apt upgrade nmap", - "MacOS": "brew upgrade nmap", - "Windows": "" - } - }, - "nosqli": { - "Data": "| Scanner/NOSQL | [nosqli](https://github.com/Charlie-belmer/nosqli) | NoSql Injection CLI tool | ![](https://img.shields.io/github/stars/Charlie-belmer/nosqli) | ![](https://img.shields.io/github/languages/top/Charlie-belmer/nosqli) |", - "Description": "NoSql Injection CLI tool", - "Install": { - "Linux": "go get -u github.com/Charlie-belmer/nosqli", - "MacOS": "go get -u github.com/Charlie-belmer/nosqli", - "Windows": "go get -u github.com/Charlie-belmer/nosqli" - }, - "Method": "NOSQL", - "Type": "Scanner", - "Update": { - "Linux": "go get -u github.com/Charlie-belmer/nosqli", - "MacOS": "go get -u github.com/Charlie-belmer/nosqli", - "Windows": "go get -u github.com/Charlie-belmer/nosqli" - } - }, - "nuclei": { - "Data": "| Army-Knife/SCAN | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | ![](https://img.shields.io/github/stars/projectdiscovery/nuclei) | ![](https://img.shields.io/github/languages/top/projectdiscovery/nuclei) |", - "Description": "Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. ", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei", - "Windows": "go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei" - }, - "Method": "SCAN", - "Type": "Army-Knife", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei", - "Windows": "go get -u -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei" - } - }, - "ob_hacky_slack": { - "Data": "| Utility/NOTIFY | [ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack) | Hacky Slack - a bash script that sends beautiful messages to Slack | ![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack) | ![](https://img.shields.io/github/languages/top/openbridge/ob_hacky_slack) |", - "Description": "Hacky Slack - a bash script that sends beautiful messages to Slack", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "NOTIFY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "oxml_xxe": { - "Data": "| Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes | ![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe) | ![](https://img.shields.io/github/languages/top/BuffaloWill/oxml_xxe) |", - "Description": "A tool for embedding XXE/XML exploits into different filetypes ", - "Install": { - "Linux": "git clone https://github.com/BuffaloWill/oxml_xxe ; cd oxml_xxe ; bundle install", - "MacOS": "git clone https://github.com/BuffaloWill/oxml_xxe ; cd oxml_xxe ; bundle install", - "Windows": "git clone https://github.com/BuffaloWill/oxml_xxe ; cd oxml_xxe ; bundle install" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "cd oxml_xxe ; git pull -v ; bundle install", - "MacOS": "cd oxml_xxe ; git pull -v ; bundle install", - "Windows": "cd oxml_xxe ; git pull -v ; bundle install" - } - }, - "pagodo": { - "Data": "| Discovery/GH | [pagodo](https://github.com/opsdisk/pagodo) | pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching | ![](https://img.shields.io/github/stars/opsdisk/pagodo) | ![](https://img.shields.io/github/languages/top/opsdisk/pagodo) |", - "Description": "pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "GH", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "parameth": { - "Data": "| Discovery/PARAM | [parameth](https://github.com/maK-/parameth) | This tool can be used to brute discover GET and POST parameters | ![](https://img.shields.io/github/stars/maK-/parameth) | ![](https://img.shields.io/github/languages/top/maK-/parameth) |", - "Description": "This tool can be used to brute discover GET and POST parameters", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PARAM", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "pentest-tools": { - "Data": "| ToolBox/ALL | [pentest-tools](https://github.com/gwen001/pentest-tools) | Custom pentesting tools | ![](https://img.shields.io/github/stars/gwen001/pentest-tools) | ![](https://img.shields.io/github/languages/top/gwen001/pentest-tools) |", - "Description": "Custom pentesting tools ", - "Install": { - "Linux": "git clone https://github.com/gwen001/pentest-tools", - "MacOS": "git clone https://github.com/gwen001/pentest-tools", - "Windows": "git clone https://github.com/gwen001/pentest-tools" - }, - "Method": "ALL", - "Type": "ToolBox", - "Update": { - "Linux": "cd pentest-tools ; git pull -v", - "MacOS": "cd pentest-tools ; git pull -v", - "Windows": "cd pentest-tools ; git pull -v" - } - }, - "pet": { - "Data": "| Utility/ANY | [pet](https://github.com/knqyf263/pet) | Simple command-line snippet manager, written in Go. | ![](https://img.shields.io/github/stars/knqyf263/pet) | ![](https://img.shields.io/github/languages/top/knqyf263/pet) |", - "Description": "Simple command-line snippet manager, written in Go.", - "Install": { - "Linux": "git clone https://github.com/knqyf263/pet.git ; cd pet ; make install", - "MacOS": "brew install knqyf263/pet/pet", - "Windows": "" - }, - "Method": "ANY", - "Type": "Utility", - "Update": { - "Linux": "cd pet ; git pull -v ; make install", - "MacOS": "brew upgrade knqyf263/pet/pet", - "Windows": "" - } - }, - "plution": { - "Data": "| Scanner/FUZZ | [plution](https://github.com/raverrr/plution) | Prototype pollution scanner using headless chrome | ![](https://img.shields.io/github/stars/raverrr/plution) | ![](https://img.shields.io/github/languages/top/raverrr/plution) |", - "Description": "Prototype pollution scanner using headless chrome", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "postMessage-tracker": { - "Data": "| Utility/B-ADDON | [postMessage-tracker](https://github.com/fransr/postMessage-tracker) | A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon | ![](https://img.shields.io/github/stars/fransr/postMessage-tracker) | ![](https://img.shields.io/github/languages/top/fransr/postMessage-tracker) |", - "Description": "A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon ", - "Install": { - "Linux": "git clone https://github.com/fransr/postMessage-tracker", - "MacOS": "git clone https://github.com/fransr/postMessage-tracker", - "Windows": "git clone https://github.com/fransr/postMessage-tracker" - }, - "Method": "B-ADDON", - "Type": "Utility", - "Update": { - "Linux": "cd postMessage-tracker ; git pull -v", - "MacOS": "cd postMessage-tracker ; git pull -v", - "Windows": "cd postMessage-tracker ; git pull -v" - } - }, - "ppfuzz": { - "Data": "| Scanner/FUZZ | [ppfuzz](https://github.com/dwisiswant0/ppfuzz) | A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 | ![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz) | ![](https://img.shields.io/github/languages/top/dwisiswant0/ppfuzz) |", - "Description": "A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "ppmap": { - "Data": "| Scanner/FUZZ | [ppmap](https://github.com/kleiton0x00/ppmap) | A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets. | ![](https://img.shields.io/github/stars/kleiton0x00/ppmap) | ![](https://img.shields.io/github/languages/top/kleiton0x00/ppmap) |", - "Description": "A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "proxify": { - "Data": "| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) |", - "Description": "Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PROXY", - "Type": "Army-Knife", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "puredns": { - "Data": "| Discovery/DNS | [puredns](https://github.com/d3mondev/puredns) | Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. | ![](https://img.shields.io/github/stars/d3mondev/puredns) | ![](https://img.shields.io/github/languages/top/d3mondev/puredns) |", - "Description": "Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "pwncat": { - "Data": "| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) | ![](https://img.shields.io/github/stars/cytopia/pwncat) | ![](https://img.shields.io/github/languages/top/cytopia/pwncat) |", - "Description": "pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) ", - "Install": { - "Linux": "pip3 install pwncat", - "MacOS": "brew install pwncat", - "Windows": "" - }, - "Method": "PENTEST", - "Type": "Utility", - "Update": { - "Linux": "pip3 update pwncat", - "MacOS": "brew upgrade pwncat", - "Windows": "" - } - }, - "qsreplace": { - "Data": "| Utility/URL | [qsreplace](https://github.com/tomnomnom/qsreplace) | Accept URLs on stdin, replace all query string values with a user-supplied value | ![](https://img.shields.io/github/stars/tomnomnom/qsreplace) | ![](https://img.shields.io/github/languages/top/tomnomnom/qsreplace) |", - "Description": "Accept URLs on stdin, replace all query string values with a user-supplied value ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/qsreplace", - "MacOS": "go get -u github.com/tomnomnom/qsreplace", - "Windows": "go get -u github.com/tomnomnom/qsreplace" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/tomnomnom/qsreplace", - "MacOS": "go get -u github.com/tomnomnom/qsreplace", - "Windows": "go get -u github.com/tomnomnom/qsreplace" - } - }, - "quickjack": { - "Data": "| Utility/PAYLOAD | [quickjack](https://github.com/samyk/quickjack) | Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks. | ![](https://img.shields.io/github/stars/samyk/quickjack) | ![](https://img.shields.io/github/languages/top/samyk/quickjack) |", - "Description": "Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "rapidscan": { - "Data": "| Scanner/WVS | [rapidscan](https://github.com/skavngr/rapidscan) | The Multi-Tool Web Vulnerability Scanner. | ![](https://img.shields.io/github/stars/skavngr/rapidscan) | ![](https://img.shields.io/github/languages/top/skavngr/rapidscan) |", - "Description": "The Multi-Tool Web Vulnerability Scanner. ", - "Install": { - "Linux": "git clone https://github.com/skavngr/rapidscan", - "MacOS": "git clone https://github.com/skavngr/rapidscan", - "Windows": "git clone https://github.com/skavngr/rapidscan" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "cd rapidscan ; git pull -v", - "MacOS": "cd rapidscan ; git pull -v", - "Windows": "cd rapidscan ; git pull -v" - } - }, - "recon_profile": { - "Data": "| Utility/ENV | [recon_profile](https://github.com/nahamsec/recon_profile) | Recon profile (bash profile) for bugbounty | ![](https://img.shields.io/github/stars/nahamsec/recon_profile) | ![](https://img.shields.io/github/languages/top/nahamsec/recon_profile) |", - "Description": "Recon profile (bash profile) for bugbounty ", - "Install": { - "Linux": "git cleon https://github.com/nahamsec/recon_profile", - "MacOS": "git cleon https://github.com/nahamsec/recon_profile", - "Windows": "git cleon https://github.com/nahamsec/recon_profile" - }, - "Method": "ENV", - "Type": "Utility", - "Update": { - "Linux": "cd recon_profile ; git pull -v", - "MacOS": "cd recon_profile ; git pull -v", - "Windows": "cd recon_profile ; git pull -v" - } - }, - "reconftw": { - "Data": "| Discovery/ALL | [reconftw](https://github.com/six2dez/reconftw) | reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities | ![](https://img.shields.io/github/stars/six2dez/reconftw) | ![](https://img.shields.io/github/languages/top/six2dez/reconftw) |", - "Description": "reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "rengine": { - "Data": "| Discovery/ALL | [rengine](https://github.com/yogeshojha/rengine) | reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. | ![](https://img.shields.io/github/stars/yogeshojha/rengine) | ![](https://img.shields.io/github/languages/top/yogeshojha/rengine) |", - "Description": "reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. ", - "Install": { - "Linux": "git clone https://github.com/yogeshojha/rengine ; cd rengine ; make build", - "MacOS": "git clone https://github.com/yogeshojha/rengine ; cd rengine ; make build", - "Windows": "git clone https://github.com/yogeshojha/rengine ; cd rengine ; make build" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "cd rengine ; git pull -v ; make build", - "MacOS": "cd rengine ; git pull -v ; make build", - "Windows": "cd rengine ; git pull -v ; make build" - } - }, - "rusolver": { - "Data": "| Discovery/DNS | [rusolver](https://github.com/Edu4rdSHL/rusolver) | Fast and accurate DNS resolver. | ![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver) | ![](https://img.shields.io/github/languages/top/Edu4rdSHL/rusolver) |", - "Description": "Fast and accurate DNS resolver.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "s3reverse": { - "Data": "| Utility/S3 | [s3reverse](https://github.com/hahwul/s3reverse) | The format of various s3 buckets is convert in one format. for bugbounty and security testing. | ![](https://img.shields.io/github/stars/hahwul/s3reverse) | ![](https://img.shields.io/github/languages/top/hahwul/s3reverse) |", - "Description": "The format of various s3 buckets is convert in one format. for bugbounty and security testing. ", - "Install": { - "Linux": "go get -u github.com/hahwul/s3reverse", - "MacOS": "go get -u github.com/hahwul/s3reverse", - "Windows": "go get -u github.com/hahwul/s3reverse" - }, - "Method": "S3", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/hahwul/s3reverse", - "MacOS": "go get -u github.com/hahwul/s3reverse", - "Windows": "go get -u github.com/hahwul/s3reverse" - } - }, - "scilla": { - "Data": "| Discovery/ALL | [scilla](https://github.com/edoardottt/scilla) | 🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration | ![](https://img.shields.io/github/stars/edoardottt/scilla) | ![](https://img.shields.io/github/languages/top/edoardottt/scilla) |", - "Description": "🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration", - "Install": { - "Linux": "go get-u github.com/edoardottt/scilla", - "MacOS": "go get-u github.com/edoardottt/scilla", - "Windows": "go get-u github.com/edoardottt/scilla" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "go get-u github.com/edoardottt/scilla", - "MacOS": "go get-u github.com/edoardottt/scilla", - "Windows": "go get-u github.com/edoardottt/scilla" - } - }, - "security-crawl-maze": { - "Data": "| Discovery/URL | [security-crawl-maze](https://github.com/google/security-crawl-maze) | Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document. | ![](https://img.shields.io/github/stars/google/security-crawl-maze) | ![](https://img.shields.io/github/languages/top/google/security-crawl-maze) |", - "Description": "Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "security-research-pocs": { - "Data": "| Utility/PAYLOAD | [security-research-pocs](https://github.com/google/security-research-pocs) | Proof-of-concept codes created as part of security research done by Google Security Team. | ![](https://img.shields.io/github/stars/google/security-research-pocs) | ![](https://img.shields.io/github/languages/top/google/security-research-pocs) |", - "Description": "Proof-of-concept codes created as part of security research done by Google Security Team.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "shuffledns": { - "Data": "| Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. | ![](https://img.shields.io/github/stars/projectdiscovery/shuffledns) | ![](https://img.shields.io/github/languages/top/projectdiscovery/shuffledns) |", - "Description": "shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. ", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns", - "Windows": "go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns", - "Windows": "go get -u -v github.com/projectdiscovery/shuffledns/cmd/shuffledns" - } - }, - "singularity": { - "Data": "| ToolBox/DNS Rebind | [singularity](https://github.com/nccgroup/singularity) | A DNS rebinding attack framework. | ![](https://img.shields.io/github/stars/nccgroup/singularity) | ![](https://img.shields.io/github/languages/top/nccgroup/singularity) |", - "Description": "A DNS rebinding attack framework.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS Rebind", - "Type": "ToolBox", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "slackcat": { - "Data": "| Utility/NOTIFY | [slackcat](https://github.com/bcicen/slackcat) | CLI utility to post files and command output to slack | ![](https://img.shields.io/github/stars/bcicen/slackcat) | ![](https://img.shields.io/github/languages/top/bcicen/slackcat) |", - "Description": "CLI utility to post files and command output to slack", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "NOTIFY", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "smuggler": { - "Data": "| Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | ![](https://img.shields.io/github/stars/defparam/smuggler) | ![](https://img.shields.io/github/languages/top/defparam/smuggler) |", - "Description": "Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 ", - "Install": { - "Linux": "git clone https://github.com/defparam/smuggler", - "MacOS": "git clone https://github.com/defparam/smuggler", - "Windows": "git clone https://github.com/defparam/smuggler" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "cd smuggler ; git pull -v", - "MacOS": "cd smuggler ; git pull -v", - "Windows": "cd smuggler ; git pull -v" - } - }, - "sn0int": { - "Data": "| Discovery/ALL | [sn0int](https://github.com/kpcyrd/sn0int) | Semi-automatic OSINT framework and package manager | ![](https://img.shields.io/github/stars/kpcyrd/sn0int) | ![](https://img.shields.io/github/languages/top/kpcyrd/sn0int) |", - "Description": "Semi-automatic OSINT framework and package manager", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "ALL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "spiderfoot": { - "Data": "| Discovery/OSINT | [spiderfoot](https://github.com/smicallef/spiderfoot) | SpiderFoot automates OSINT collection so that you can focus on analysis. | ![](https://img.shields.io/github/stars/smicallef/spiderfoot) | ![](https://img.shields.io/github/languages/top/smicallef/spiderfoot) |", - "Description": "SpiderFoot automates OSINT collection so that you can focus on analysis.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "OSINT", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "sqliv": { - "Data": "| Scanner/SQLi | [sqliv](https://github.com/the-robot/sqliv) | massive SQL injection vulnerability scanner | ![](https://img.shields.io/github/stars/the-robot/sqliv) | ![](https://img.shields.io/github/languages/top/the-robot/sqliv) |", - "Description": "massive SQL injection vulnerability scanner", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SQLi", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "sqlmap": { - "Data": "| Scanner/SQLi | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool | ![](https://img.shields.io/github/stars/sqlmapproject/sqlmap) | ![](https://img.shields.io/github/languages/top/sqlmapproject/sqlmap) |", - "Description": "Automatic SQL injection and database takeover tool", - "Install": { - "Linux": "sudo apt install sqlmap", - "MacOS": "brew install sqlmap", - "Windows": "" - }, - "Method": "SQLi", - "Type": "Scanner", - "Update": { - "Linux": "sudo apt upgrade sqlmap", - "MacOS": "brew upgrade sqlmap", - "Windows": "" - } - }, - "ssrf-sheriff": { - "Data": "| Scanner/SSRF | [ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff) | A simple SSRF-testing sheriff written in Go | ![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff) | ![](https://img.shields.io/github/languages/top/teknogeek/ssrf-sheriff) |", - "Description": "A simple SSRF-testing sheriff written in Go ", - "Install": { - "Linux": "go get github.com/teknogeek/ssrf-sheriff", - "MacOS": "go get github.com/teknogeek/ssrf-sheriff", - "Windows": "go get github.com/teknogeek/ssrf-sheriff" - }, - "Method": "SSRF", - "Type": "Scanner", - "Update": { - "Linux": "go get github.com/teknogeek/ssrf-sheriff", - "MacOS": "go get github.com/teknogeek/ssrf-sheriff", - "Windows": "go get github.com/teknogeek/ssrf-sheriff" - } - }, - "subfinder": { - "Data": "| Discovery/DOMAIN | [subfinder](https://github.com/projectdiscovery/subfinder) | Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. | ![](https://img.shields.io/github/stars/projectdiscovery/subfinder) | ![](https://img.shields.io/github/languages/top/projectdiscovery/subfinder) |", - "Description": "Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. ", - "Install": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder", - "Windows": "go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder" - }, - "Method": "DOMAIN", - "Type": "Discovery", - "Update": { - "Linux": "GO111MODULE=on go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder", - "MacOS": "GO111MODULE=on go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder", - "Windows": "go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder" - } - }, - "subgen": { - "Data": "| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) |", - "Description": "A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "subjack": { - "Data": "| Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go | ![](https://img.shields.io/github/stars/haccer/subjack) | ![](https://img.shields.io/github/languages/top/haccer/subjack) |", - "Description": "Subdomain Takeover tool written in Go ", - "Install": { - "Linux": "go get github.com/haccer/subjack", - "MacOS": "go get github.com/haccer/subjack", - "Windows": "go get github.com/haccer/subjack" - }, - "Method": "TKOV", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/haccer/subjack", - "MacOS": "go get github.com/haccer/subjack", - "Windows": "go get github.com/haccer/subjack" - } - }, - "subjs": { - "Data": "| Discovery/JS | [subjs](https://github.com/lc/subjs) | Fetches javascript file from a list of URLS or subdomains. | ![](https://img.shields.io/github/stars/lc/subjs) | ![](https://img.shields.io/github/languages/top/lc/subjs) |", - "Description": "Fetches javascript file from a list of URLS or subdomains.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "JS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "subs_all": { - "Data": "| Utility/WORD | [subs_all](https://github.com/emadshanab/subs_all) | Subdomain Enumeration Wordlist. 8956437 unique words. Updated. | ![](https://img.shields.io/github/stars/emadshanab/subs_all) | ![](https://img.shields.io/github/languages/top/emadshanab/subs_all) |", - "Description": "Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ", - "Install": { - "Linux": "git clone https://github.com/emadshanab/subs_all", - "MacOS": "git clone https://github.com/emadshanab/subs_all", - "Windows": "git clone https://github.com/emadshanab/subs_all" - }, - "Method": "WORD", - "Type": "Utility", - "Update": { - "Linux": "cd subs_all; git pull -v", - "MacOS": "cd subs_all; git pull -v", - "Windows": "cd subs_all; git pull -v" - } - }, - "subzy": { - "Data": "| Discovery/TKOV | [subzy](https://github.com/LukaSikic/subzy) | Subdomain takeover vulnerability checker | ![](https://img.shields.io/github/stars/LukaSikic/subzy) | ![](https://img.shields.io/github/languages/top/LukaSikic/subzy) |", - "Description": "Subdomain takeover vulnerability checker", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "TKOV", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "template-generator": { - "Data": "| Utility/TEMPLATE | [template-generator](https://github.com/fransr/template-generator) | A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. | ![](https://img.shields.io/github/stars/fransr/template-generator) | ![](https://img.shields.io/github/languages/top/fransr/template-generator) |", - "Description": "A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. ", - "Install": { - "Linux": "git clone https://github.com/fransr/template-generator", - "MacOS": "git clone https://github.com/fransr/template-generator", - "Windows": "git clone https://github.com/fransr/template-generator" - }, - "Method": "TEMPLATE", - "Type": "Utility", - "Update": { - "Linux": "cd template-generator ; git pull -v", - "MacOS": "cd template-generator ; git pull -v", - "Windows": "cd template-generator ; git pull -v" - } - }, - "testssl.sh": { - "Data": "| Scanner/SSL | [testssl.sh](https://github.com/drwetter/testssl.sh) | Testing TLS/SSL encryption anywhere on any port | ![](https://img.shields.io/github/stars/drwetter/testssl.sh) | ![](https://img.shields.io/github/languages/top/drwetter/testssl.sh) |", - "Description": "Testing TLS/SSL encryption anywhere on any port ", - "Install": { - "Linux": "git clone https://github.com/drwetter/testssl.sh", - "MacOS": "git clone https://github.com/drwetter/testssl.sh", - "Windows": "git clone https://github.com/drwetter/testssl.sh" - }, - "Method": "SSL", - "Type": "Scanner", - "Update": { - "Linux": "cd testssl.sh ; git pull -v", - "MacOS": "cd testssl.sh ; git pull -v", - "Windows": "cd testssl.sh ; git pull -v" - } - }, - "thc-hydra": { - "Data": "| Scanner/FUZZ | [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) | hydra | ![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra) | ![](https://img.shields.io/github/languages/top/vanhauser-thc/thc-hydra) |", - "Description": "hydra ", - "Install": { - "Linux": "git clone https://github.com/vanhauser-thc/thc-hydra ; cd thc-hydra; ./configure ; make ; make install", - "MacOS": "git clone https://github.com/vanhauser-thc/thc-hydra ; cd thc-hydra; ./configure ; make ; make install", - "Windows": "git clone https://github.com/vanhauser-thc/thc-hydra ; cd thc-hydra; ./configure ; make ; make install" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "cd thc-hydra; git pull -v ; ./configure ; make ; make install", - "MacOS": "cd thc-hydra; git pull -v ; ./configure ; make ; make install", - "Windows": "cd thc-hydra; git pull -v ; ./configure ; make ; make install" - } - }, - "tiscripts": { - "Data": "| Utility/Scripts | [tiscripts](https://github.com/defparam/tiscripts) | Turbo Intruder Scripts | ![](https://img.shields.io/github/stars/defparam/tiscripts) | ![](https://img.shields.io/github/languages/top/defparam/tiscripts) |", - "Description": "Turbo Intruder Scripts", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "Scripts", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "tplmap": { - "Data": "| Scanner/SSTI | [tplmap](https://github.com/epinna/tplmap) | Server-Side Template Injection and Code Injection Detection and Exploitation Tool | ![](https://img.shields.io/github/stars/epinna/tplmap) | ![](https://img.shields.io/github/languages/top/epinna/tplmap) |", - "Description": "Server-Side Template Injection and Code Injection Detection and Exploitation Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SSTI", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "uncover": { - "Data": "| Discovery/HOST | [uncover](https://github.com/projectdiscovery/uncover) | Quickly discover exposed hosts on the internet using multiple search engine. | ![](https://img.shields.io/github/stars/projectdiscovery/uncover) | ![](https://img.shields.io/github/languages/top/projectdiscovery/uncover) |", - "Description": "Quickly discover exposed hosts on the internet using multiple search engine.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "HOST", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "unfurl": { - "Data": "| Utility/URL | [unfurl](https://github.com/tomnomnom/unfurl) | Pull out bits of URLs provided on stdin | ![](https://img.shields.io/github/stars/tomnomnom/unfurl) | ![](https://img.shields.io/github/languages/top/tomnomnom/unfurl) |", - "Description": "Pull out bits of URLs provided on stdin ", - "Install": { - "Linux": "go get -u github.com/tomnomnom/unfurl", - "MacOS": "go get -u github.com/tomnomnom/unfurl", - "Windows": "go get -u github.com/tomnomnom/unfurl" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/tomnomnom/unfurl", - "MacOS": "go get -u github.com/tomnomnom/unfurl", - "Windows": "go get -u github.com/tomnomnom/unfurl" - } - }, - "urlgrab": { - "Data": "| Discovery/URL | [urlgrab](https://github.com/IAmStoxe/urlgrab) | A golang utility to spider through a website searching for additional links. | ![](https://img.shields.io/github/stars/IAmStoxe/urlgrab) | ![](https://img.shields.io/github/languages/top/IAmStoxe/urlgrab) |", - "Description": "A golang utility to spider through a website searching for additional links. ", - "Install": { - "Linux": "go get -u github.com/iamstoxe/urlgrab", - "MacOS": "go get -u github.com/iamstoxe/urlgrab", - "Windows": "go get -u github.com/iamstoxe/urlgrab" - }, - "Method": "CRAWL", - "Type": "Discovery", - "Update": { - "Linux": "go get -u github.com/iamstoxe/urlgrab", - "MacOS": "go get -u github.com/iamstoxe/urlgrab", - "Windows": "go get -u github.com/iamstoxe/urlgrab" - } - }, - "urlhunter": { - "Data": "| Discovery/URL | [urlhunter](https://github.com/utkusen/urlhunter) | a recon tool that allows searching on URLs that are exposed via shortener services | ![](https://img.shields.io/github/stars/utkusen/urlhunter) | ![](https://img.shields.io/github/languages/top/utkusen/urlhunter) |", - "Description": "a recon tool that allows searching on URLs that are exposed via shortener services", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "urlprobe": { - "Data": "| Utility/URL | [urlprobe](https://github.com/1ndianl33t/urlprobe) | Urls status code \u0026 content length checker | ![](https://img.shields.io/github/stars/1ndianl33t/urlprobe) | ![](https://img.shields.io/github/languages/top/1ndianl33t/urlprobe) |", - "Description": "Urls status code \u0026 content length checker ", - "Install": { - "Linux": "go get -u github.com/1ndianl33t/urlprobe", - "MacOS": "go get -u github.com/1ndianl33t/urlprobe", - "Windows": "go get -u github.com/1ndianl33t/urlprobe" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "go get -u github.com/1ndianl33t/urlprobe", - "MacOS": "go get -u github.com/1ndianl33t/urlprobe", - "Windows": "go get -u github.com/1ndianl33t/urlprobe" - } - }, - "uro": { - "Data": "| Utility/URL | [uro](https://github.com/s0md3v/uro) | declutters url lists for crawling/pentesting | ![](https://img.shields.io/github/stars/s0md3v/uro) | ![](https://img.shields.io/github/languages/top/s0md3v/uro) |", - "Description": "declutters url lists for crawling/pentesting", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "URL", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "waybackurls": { - "Data": "| Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain | ![](https://img.shields.io/github/stars/tomnomnom/waybackurls) | ![](https://img.shields.io/github/languages/top/tomnomnom/waybackurls) |", - "Description": "Fetch all the URLs that the Wayback Machine knows about for a domain ", - "Install": { - "Linux": "go get github.com/tomnomnom/waybackurls", - "MacOS": "go get github.com/tomnomnom/waybackurls", - "Windows": "go get github.com/tomnomnom/waybackurls" - }, - "Method": "URL", - "Type": "Discovery", - "Update": { - "Linux": "go get github.com/tomnomnom/waybackurls", - "MacOS": "go get github.com/tomnomnom/waybackurls", - "Windows": "go get github.com/tomnomnom/waybackurls" - } - }, - "weaponised-XSS-payloads": { - "Data": "| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 | ![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads) | ![](https://img.shields.io/github/languages/top/hakluke/weaponised-XSS-payloads) |", - "Description": "XSS payloads designed to turn alert(1) into P1", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "web_cache_poison": { - "Data": "| Scanner/CACHE-POISON | [web_cache_poison](https://github.com/fngoo/web_cache_poison) | web cache poison - Top 1 web hacking technique of 2019 | ![](https://img.shields.io/github/stars/fngoo/web_cache_poison) | ![](https://img.shields.io/github/languages/top/fngoo/web_cache_poison) |", - "Description": "web cache poison - Top 1 web hacking technique of 2019", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "CACHE-POISON", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "websocket-connection-smuggler": { - "Data": "| Scanner/SMUGGLE | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler | ![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/websocket-connection-smuggler) |", - "Description": "websocket-connection-smuggler", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "wfuzz": { - "Data": "| Scanner/FUZZ | [wfuzz](https://github.com/xmendez/wfuzz) | Web application fuzzer | ![](https://img.shields.io/github/stars/xmendez/wfuzz) | ![](https://img.shields.io/github/languages/top/xmendez/wfuzz) |", - "Description": "Web application fuzzer ", - "Install": { - "Linux": "pip3 install wfuzz", - "MacOS": "pip3 install wfuzz", - "Windows": "pip3 install wfuzz" - }, - "Method": "FUZZ", - "Type": "Scanner", - "Update": { - "Linux": "pip3 install wfuzz", - "MacOS": "pip3 install wfuzz", - "Windows": "pip3 install wfuzz" - } - }, - "wprecon": { - "Data": "| Scanner/WP | [wprecon](https://github.com/blackcrw/wprecon) | Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go. | ![](https://img.shields.io/github/stars/blackcrw/wprecon) | ![](https://img.shields.io/github/languages/top/blackcrw/wprecon) |", - "Description": "Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WP", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "wpscan": { - "Data": "| Scanner/WP | [wpscan](https://github.com/wpscanteam/wpscan) | WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. | ![](https://img.shields.io/github/stars/wpscanteam/wpscan) | ![](https://img.shields.io/github/languages/top/wpscanteam/wpscan) |", - "Description": "WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. ", - "Install": { - "Linux": "gem install wpscan", - "MacOS": "gem install wpscan", - "Windows": "gem install wpscan" - }, - "Method": "WP", - "Type": "Scanner", - "Update": { - "Linux": "gem install wpscan", - "MacOS": "gem install wpscan", - "Windows": "gem install wpscan" - } - }, - "ws-smuggler": { - "Data": "| Scanner/SMUGGLE | [ws-smuggler](https://github.com/hahwul/ws-smuggler) | WebSocket Connection Smuggler | ![](https://img.shields.io/github/stars/hahwul/ws-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/ws-smuggler) |", - "Description": "WebSocket Connection Smuggler", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "SMUGGLE", - "Type": "Scanner", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "wssip": { - "Data": "| Discovery/WEBSOCK | [wssip](https://github.com/nccgroup/wssip) | Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa. | ![](https://img.shields.io/github/stars/nccgroup/wssip) | ![](https://img.shields.io/github/languages/top/nccgroup/wssip) |", - "Description": "Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "WEBSOCK", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "wuzz": { - "Data": "| Fetch/HTTP | [wuzz](https://github.com/asciimoo/wuzz) | Interactive cli tool for HTTP inspection | ![](https://img.shields.io/github/stars/asciimoo/wuzz) | ![](https://img.shields.io/github/languages/top/asciimoo/wuzz) |", - "Description": "Interactive cli tool for HTTP inspection ", - "Install": { - "Linux": "go get github.com/asciimoo/wuzz", - "MacOS": "go get github.com/asciimoo/wuzz", - "Windows": "go get github.com/asciimoo/wuzz" - }, - "Method": "HTTP", - "Type": "Fetch", - "Update": { - "Linux": "go get github.com/asciimoo/wuzz", - "MacOS": "go get github.com/asciimoo/wuzz", - "Windows": "go get github.com/asciimoo/wuzz" - } - }, - "x8": { - "Type": "Discovery", - "Data": "| Discovery/PARAM | [x8](https://github.com/Sh1Yo/x8) | Hidden parameters discovery suite | ![](https://img.shields.io/github/stars/Sh1Yo/x8) | ![](https://img.shields.io/github/languages/top/Sh1Yo/x8) |", - "Method": "PARAM", - "Description": "Hidden parameters discovery suite", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "xsinator.com": { - "Data": "| Utility/XS-Leaks | [xsinator.com](https://github.com/RUB-NDS/xsinator.com) | XS-Leak Browser Test Suite | ![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com) | ![](https://img.shields.io/github/languages/top/RUB-NDS/xsinator.com) |", - "Description": "XS-Leak Browser Test Suite", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "XS-Leaks", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "xss-cheatsheet-data": { - "Data": "| Utility/PAYLOAD | [xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data) | This repository contains all the XSS cheatsheet data to allow contributions from the community. | ![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data) | ![](https://img.shields.io/github/languages/top/PortSwigger/xss-cheatsheet-data) |", - "Description": "This repository contains all the XSS cheatsheet data to allow contributions from the community. ", - "Install": { - "Linux": "git clone https://github.com/PortSwigger/xss-cheatsheet-data", - "MacOS": "git clone https://github.com/PortSwigger/xss-cheatsheet-data", - "Windows": "git clone https://github.com/PortSwigger/xss-cheatsheet-data" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "cd xss-cheatsheet-data ; git pull -v", - "MacOS": "cd xss-cheatsheet-data ; git pull -v", - "Windows": "cd xss-cheatsheet-data ; git pull -v" - } - }, - "xsscrapy": { - "Data": "| Scanner/XSS | [xsscrapy](https://github.com/DanMcInerney/xsscrapy) | XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. | ![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy) | ![](https://img.shields.io/github/languages/top/DanMcInerney/xsscrapy) |", - "Description": "XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. ", - "Install": { - "Linux": "git clone https://github.com/DanMcInerney/xsscrapy.git ; cd xsscrapy; pip install -r requirements.txt", - "MacOS": "git clone https://github.com/DanMcInerney/xsscrapy.git ; cd xsscrapy; pip install -r requirements.txt", - "Windows": "git clone https://github.com/DanMcInerney/xsscrapy.git ; cd xsscrapy; pip install -r requirements.txt" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "cd xsscrapy; git pull -v ; pip install -r requirements.txt", - "MacOS": "cd xsscrapy; git pull -v ; pip install -r requirements.txt", - "Windows": "cd xsscrapy; git pull -v ; pip install -r requirements.txt" - } - }, - "xsser": { - "Data": "| Scanner/XSS | [xsser](https://github.com/epsylon/xsser) | Cross Site \"Scripter\" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. | ![](https://img.shields.io/github/stars/epsylon/xsser) | ![](https://img.shields.io/github/languages/top/epsylon/xsser) |", - "Description": "Cross Site \"Scripter\" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. ", - "Install": { - "Linux": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install", - "MacOS": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install", - "Windows": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install" - }, - "Method": "XSS", - "Type": "Scanner", - "Update": { - "Linux": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install", - "MacOS": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install", - "Windows": "git clone https://github.com/epsylon/xsser ; cd xsser ; python3 setup.py install" - } - }, - "xssor2": { - "Data": "| Utility/PAYLOAD | [xssor2](https://github.com/evilcos/xssor2) | XSS'OR - Hack with JavaScript. | ![](https://img.shields.io/github/stars/evilcos/xssor2) | ![](https://img.shields.io/github/languages/top/evilcos/xssor2) |", - "Description": "XSS'OR - Hack with JavaScript.", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "xxeserv": { - "Data": "| Utility/PAYLOAD | [xxeserv](https://github.com/staaldraad/xxeserv) | A mini webserver with FTP support for XXE payloads | ![](https://img.shields.io/github/stars/staaldraad/xxeserv) | ![](https://img.shields.io/github/languages/top/staaldraad/xxeserv) |", - "Description": "A mini webserver with FTP support for XXE payloads", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "ysoserial": { - "Data": "| Utility/PAYLOAD | [ysoserial](https://github.com/frohoff/ysoserial) | A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | ![](https://img.shields.io/github/stars/frohoff/ysoserial) | ![](https://img.shields.io/github/languages/top/frohoff/ysoserial) |", - "Description": "A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. ", - "Install": { - "Linux": "git clone https://github.com/frohoff/ysoserial", - "MacOS": "git clone https://github.com/frohoff/ysoserial", - "Windows": "git clone https://github.com/frohoff/ysoserial" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "cd ysoserial ; git pull -v", - "MacOS": "cd ysoserial ; git pull -v", - "Windows": "cd ysoserial ; git pull -v" - } - }, - "ysoserial.net": { - "Data": "| Utility/PAYLOAD | [ysoserial.net](https://github.com/pwntester/ysoserial.net) | Deserialization payload generator for a variety of .NET formatters | ![](https://img.shields.io/github/stars/pwntester/ysoserial.net) | ![](https://img.shields.io/github/languages/top/pwntester/ysoserial.net) |", - "Description": "Deserialization payload generator for a variety of .NET formatters ", - "Install": { - "Linux": "git clone https://github.com/pwntester/ysoserial.net", - "MacOS": "git clone https://github.com/pwntester/ysoserial.net", - "Windows": "git clone https://github.com/pwntester/ysoserial.net" - }, - "Method": "PAYLOAD", - "Type": "Utility", - "Update": { - "Linux": "cd ysoserial.net ; git pull -v", - "MacOS": "cd ysoserial.net ; git pull -v", - "Windows": "cd ysoserial.net ; git pull -v" - } - }, - "zap-cli": { - "Data": "| Scanner/WVS | [zap-cli](https://github.com/Grunny/zap-cli) | A simple tool for interacting with OWASP ZAP from the commandline. | ![](https://img.shields.io/github/stars/Grunny/zap-cli) | ![](https://img.shields.io/github/languages/top/Grunny/zap-cli) |", - "Description": "A simple tool for interacting with OWASP ZAP from the commandline. ", - "Install": { - "Linux": "pip3 install --upgrade zapcli", - "MacOS": "pip3 install --upgrade zapcli", - "Windows": "pip3 install --upgrade zapcli" - }, - "Method": "WVS", - "Type": "Scanner", - "Update": { - "Linux": "pip3 install --upgrade zapcli", - "MacOS": "pip3 install --upgrade zapcli", - "Windows": "pip3 install --upgrade zapcli" - } - }, - "zaproxy": { - "Data": "| Army-Knife/PROXY | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project | ![](https://img.shields.io/github/stars/zaproxy/zaproxy) | ![](https://img.shields.io/github/languages/top/zaproxy/zaproxy) |", - "Description": "The OWASP ZAP core project", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "PROXY", - "Type": "Army-Knife", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - }, - "zdns": { - "Data": "| Discovery/DNS | [zdns](https://github.com/zmap/zdns) | Fast CLI DNS Lookup Tool | ![](https://img.shields.io/github/stars/zmap/zdns) | ![](https://img.shields.io/github/languages/top/zmap/zdns) |", - "Description": "Fast CLI DNS Lookup Tool", - "Install": { - "Linux": "", - "MacOS": "", - "Windows": "" - }, - "Method": "DNS", - "Type": "Discovery", - "Update": { - "Linux": "", - "MacOS": "", - "Windows": "" - } - } -} \ No newline at end of file diff --git a/distribute-readme.go b/distribute-readme.go deleted file mode 100644 index b7856c1..0000000 --- a/distribute-readme.go +++ /dev/null @@ -1,147 +0,0 @@ -package main - -import ( - "bufio" - "encoding/json" - "fmt" - "io/ioutil" - "os" - "reflect" - "sort" - "strings" - - au "github.com/logrusorgru/aurora" -) - -type mmm = map[string]interface{} - -func mergeKeys(left, right mmm) mmm { - for key, rightVal := range right { - if leftVal, present := left[key]; present { - //then we don't want to replace it - recurse - left[key] = mergeKeys(leftVal.(mmm), rightVal.(mmm)) - } else { - // key not in left so we can just shove it in - left[key] = rightVal - } - } - return left -} - -func main() { - typeFile, err := os.Open("type.lst") - // if we os.Open returns an error then handle it - if err != nil { - fmt.Println(err) - } - fmt.Println("Successfully Opened type.lst") - // defer the closing of our jsonFile so that we can parse it later on - defer typeFile.Close() - index := 0i - m := make(map[string]interface{}) - readerF := bufio.NewReader(typeFile) - for { - line, isPrefix, err := readerF.ReadLine() - if isPrefix || err != nil { - break - } - strings.TrimRight(string(line), "\r\n") - //m[string(line)] = "" - index = index + 1 - } - fmt.Println(m) - dataJson, err := os.Open("data.json") - // if we os.Open returns an error then handle it - if err != nil { - fmt.Println(err) - } - fmt.Println("Successfully Opened data.json") - // defer the closing of our dataJson so that we can parse it later on - defer dataJson.Close() - byteValue, _ := ioutil.ReadAll(dataJson) - var result map[string]interface{} - json.Unmarshal([]byte(byteValue), &result) - //result[name] = tool - for k, v := range result { - myMap := v.(map[string]interface{}) - t := myMap["Type"].(string) - d := myMap["Data"].(string) - mt := myMap["Method"].(string) - _ = d - _ = mt - tool := make(map[string]interface{}) - tool[k] = d - fmt.Println(m[t+"/"+mt]) - //fmt.Println(reflect.TypeOf(m[t+"/"+mt]).String()) - //if reflect.TypeOf(m[t+"/"+mt]).String() == "string" { - if m[t+"/"+mt] == nil { - m[t+"/"+mt] = tool - } else { - tool = mergeKeys(tool, m[t+"/"+mt].(map[string]interface{})) - //fmt.Println(tool) - m[t+"/"+mt] = tool - } - } - readme := "| Type | Name | Description | Popularity | Language |\r\n| ---------- | :---------- | :----------: | :----------: | :----------: | \r\n" - - keys := []string{} - for key := range m { - keys = append(keys, key) - } - sort.Strings(keys) - - for _, dat := range keys { - vv := m[dat] - keys := []string{} - _ = keys - if vv != nil && reflect.TypeOf(vv).String() != "string" { - v := vv.(map[string]interface{}) - for key := range v { - keys = append(keys, key) - } - sort.Strings(keys) - } - for _, val := range keys { - if reflect.TypeOf(val).String() != "string" { - } else { - vd := vv.(map[string]interface{})[val] - readme = readme + vd.(string) + "\r\n" - } - } - } - fmt.Println(readme) - top, err := os.Open("template/head.md") - if err != nil { - fmt.Println(err) - } - defer dataJson.Close() - head_data, _ := ioutil.ReadAll(top) - foot, err := os.Open("template/foot.md") - if err != nil { - fmt.Println(err) - } - defer dataJson.Close() - foot_data, _ := ioutil.ReadAll(foot) - readme = string(head_data) + readme + string(foot_data) - fmt.Println("======================result====================") - //fmt.Println(readme) - - file, err := os.OpenFile( - "README.md", - os.O_CREATE|os.O_RDWR|os.O_TRUNC, - - os.FileMode(0644)) - if err != nil { - fmt.Println(err) - return - } - defer file.Close() - _, err = file.Write([]byte(readme)) - if err != nil { - fmt.Println(err) - return - } - fmt.Println("[+] Patched README.md file") - fmt.Println("[+] Please check README file and git push") - fmt.Println("[ copy/paste this ] ", au.BrightYellow("git add data.json README.md ; git commit -m 'distribute readme'; git push")) -} diff --git a/go.mod b/go.mod deleted file mode 100644 index 8da04db..0000000 --- a/go.mod +++ /dev/null @@ -1,9 +0,0 @@ -module github.com/hahwul/WebHackerWeapons - -go 1.16 - -require ( - github.com/logrusorgru/aurora v2.0.3+incompatible - github.com/logrusorgru/aurora/v3 v3.0.0 // indirect - golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4 -) diff --git a/go.sum b/go.sum deleted file mode 100644 index 9e9461b..0000000 --- a/go.sum +++ /dev/null @@ -1,11 +0,0 @@ -github.com/logrusorgru/aurora v2.0.3+incompatible h1:tOpm7WcpBTn4fjmVfgpQq0EfczGlG91VSDkswnjF5A8= -github.com/logrusorgru/aurora v2.0.3+incompatible/go.mod h1:7rIyQOR62GCctdiQpZ/zOJlFyk6y+94wXzv6RNZgaR4= -github.com/logrusorgru/aurora/v3 v3.0.0 h1:R6zcoZZbvVcGMvDCKo45A9U/lzYyzl5NfYIvznmDfE4= -github.com/logrusorgru/aurora/v3 v3.0.0/go.mod h1:vsR12bk5grlLvLXAYrBsb5Oc/N+LxAlxggSjiwMnCUc= -golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4 h1:b0LrWgu8+q7z4J+0Y3Umo5q1dL7NXBkKBWkaVkAq17E= -golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod h1:RBQZq4jEuRlivfhVLdyRGr576XBO4/greRjx4P4O3yc= -golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20210315160823-c6e025ad8005/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= -golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= -golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= diff --git a/CONTRIBUTORS.svg b/images/CONTRIBUTORS.svg similarity index 100% rename from CONTRIBUTORS.svg rename to images/CONTRIBUTORS.svg diff --git a/images/apple.png b/images/apple.png new file mode 100644 index 0000000..aaeae0b Binary files /dev/null and b/images/apple.png differ diff --git a/images/burp.png b/images/burp.png new file mode 100644 index 0000000..d52f96e Binary files /dev/null and b/images/burp.png differ diff --git a/images/c#.png b/images/c#.png new file mode 100644 index 0000000..46ca24f Binary files /dev/null and b/images/c#.png differ diff --git a/images/c.png b/images/c.png new file mode 100644 index 0000000..02f7326 Binary files /dev/null and b/images/c.png differ diff --git a/images/chrome.png b/images/chrome.png new file mode 100644 index 0000000..59180f0 Binary files /dev/null and b/images/chrome.png differ diff --git a/images/firefox.png b/images/firefox.png new file mode 100644 index 0000000..b5b94a0 Binary files /dev/null and b/images/firefox.png differ diff --git a/images/go.png b/images/go.png new file mode 100644 index 0000000..c8f0c94 Binary files /dev/null and b/images/go.png differ diff --git a/images/html.png b/images/html.png new file mode 100644 index 0000000..1cae86d Binary files /dev/null and b/images/html.png differ diff --git a/images/java.png b/images/java.png new file mode 100644 index 0000000..481d970 Binary files /dev/null and b/images/java.png differ diff --git a/images/javascript.png b/images/javascript.png new file mode 100644 index 0000000..63b2cea Binary files /dev/null and b/images/javascript.png differ diff --git a/images/kotlin.png b/images/kotlin.png new file mode 100644 index 0000000..1dd25d9 Binary files /dev/null and b/images/kotlin.png differ diff --git a/images/linux.png b/images/linux.png new file mode 100644 index 0000000..7e54907 Binary files /dev/null and b/images/linux.png differ diff --git a/images/perl.png b/images/perl.png new file mode 100644 index 0000000..623af4b Binary files /dev/null and b/images/perl.png differ diff --git a/images/php.png b/images/php.png new file mode 100644 index 0000000..ff1cdb0 Binary files /dev/null and b/images/php.png differ diff --git a/images/python.png b/images/python.png new file mode 100644 index 0000000..992962b Binary files /dev/null and b/images/python.png differ diff --git a/images/ruby.png b/images/ruby.png new file mode 100644 index 0000000..fd08300 Binary files /dev/null and b/images/ruby.png differ diff --git a/images/rust.png b/images/rust.png new file mode 100644 index 0000000..9649798 Binary files /dev/null and b/images/rust.png differ diff --git a/images/safari.png b/images/safari.png new file mode 100644 index 0000000..bc90710 Binary files /dev/null and b/images/safari.png differ diff --git a/images/shell.png b/images/shell.png new file mode 100644 index 0000000..e033791 Binary files /dev/null and b/images/shell.png differ diff --git a/images/typescript.png b/images/typescript.png new file mode 100644 index 0000000..cd8ecfb Binary files /dev/null and b/images/typescript.png differ diff --git a/images/windows.png b/images/windows.png new file mode 100644 index 0000000..e8c3161 Binary files /dev/null and b/images/windows.png differ diff --git a/images/zap.png b/images/zap.png new file mode 100644 index 0000000..2b5e3f1 Binary files /dev/null and b/images/zap.png differ diff --git a/scripts/erb.rb b/scripts/erb.rb new file mode 100644 index 0000000..9504878 --- /dev/null +++ b/scripts/erb.rb @@ -0,0 +1,171 @@ +require 'erb' +require 'yaml' + +def generate_badge array + badge = "" + array.each { |t| + case t + when 'linux' + badge = badge + "![linux](./images/linux.png)" + when 'windows' + badge = badge + "![windows](./images/windows.png)" + when 'macos' + badge = badge + "![macos](./images/apple.png)" + when 'firefox' + badge = badge + "![firefox](./images/firefox.png)" + when 'safari' + badge = badge + "![safari](./images/safari.png)" + when 'chrome' + badge = badge + "![chrome](./images/chrome.png)" + when 'burpsuite' + badge = badge + "![burp](./images/burp.png)" + when 'zap' + badge = badge + "![zap](./images/zap.png)" + end + } + return badge +end + +def generate_tags array + tags = "" + array.each { |t| + tags = tags + "`#{t}` " + } + return tags +end + +template = %q{ +

+
+ +
+ + + + +

+A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting + +## Family project +[![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) +[![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) + +## Table of Contents +- [Weapons](#weapons) + - [Tools](#tools) + - [Bookmarklets](#bookmarklets) + - [Browser Addons](#browser-addons) + - [Burp and ZAP Addons](#burpsuite-and-zap-addons) +- [Contribute](CONTRIBUTING.md) +- [Thanks to contributor](#thanks-to-contributor) + +## Weapons +*Attributes* +| | Attributes | +|-------|---------------------------------------------------| +| Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| +| Tags | <%= tags.uniq.join ' ' %> | +| Langs | <%= langs.uniq.join ' ' %> | + +### Tools +<%= tools %> + +### Bookmarklets +<%= bookmarklets %> + +### Browser Addons +<%= browser_addons %> + +### Burpsuite and ZAP Addons +<%= tool_addons %> + +## Thanks to (Contributor) +I would like to thank everyone who helped with this project 👍😎 +![](/images/CONTRIBUTORS.svg) + +}.gsub(/^ /, '') + +tags = [] +langs = [] +head = "| Type | Name | Description | Star | Tags | Badges |\n" +head = head + "| --- | --- | --- | --- | --- | --- |" +tools = head + "\n" +bookmarklets = head + "\n" +browser_addons = head + "\n" +tool_addons = head + "\n" + +weapons = [] +weapons_obj = { + "army-knife" => [], + "recon"=> [], + "fuzzer"=> [], + "scanner"=> [], + "exploit"=> [], + "utils"=> [], + "etc"=> [] +} + +Dir.entries("./weapons/").each do | name | + if name != '.' && name != '..' + begin + data = YAML.load(File.open("./weapons/#{name}")) + if data['type'] != "" && data['type'] != nil + weapons_obj[data['type'].downcase].push data + else + weapons_obj['etc'].push data + end + rescue => e + puts e + end + end +end +weapons_obj.each do |key,value| + weapons.concat value +end + +weapons.each do | data | + begin + name = data['name'] + temp_tags = [] + data['tags'].each do |t| + temp_tags.push "`#{t}`" + end + tags.concat temp_tags + lang_badge = "" + if data['lang'].length > 0 && data['lang'] != "null" + langs.push "`#{data['lang']}`" + lang_badge = "![](./images/#{data['lang'].downcase}.png)" + end + + popularity = "" + + if data['url'].length > 0 + name = "[#{name}](#{data['url']})" + end + + if data['url'].include? "github.com" + split_result = data['url'].split "//github.com/" + popularity = "![](https://img.shields.io/github/stars/#{split_result[1]}?label=%20)" + end + badge = generate_badge(data['platform']) + line = "|#{data['type']}|#{name}|#{data['description']}|#{popularity}|#{temp_tags.join ' '}|#{badge}#{lang_badge}|" + case data['category'].downcase + when 'tool' + tools = tools + line + "\n" + when 'tool-addon' + tool_addons = tool_addons + line + "\n" + when 'browser-addon' + browser_addons = browser_addons + line + "\n" + when 'bookmarklet' + bookmarklets = bookmarklets + line + "\n" + else + puts name + end + rescue => e + puts e + end +end + +markdown = ERB.new(template, trim_mode: "%<>") +#puts markdown.result +File.write './README.md', markdown.result \ No newline at end of file diff --git a/scripts/for_migration/apply_platform.rb b/scripts/for_migration/apply_platform.rb new file mode 100644 index 0000000..3bb8fe1 --- /dev/null +++ b/scripts/for_migration/apply_platform.rb @@ -0,0 +1,14 @@ +require 'yaml' + +Dir.entries("./weapons").each do | name | + if name.strip != "." || name != ".." + begin + data = YAML.load(File.open("./weapons/#{name}")) + data['platform'] = ['linux','macos','windows'] + yaml_data = YAML.dump(data) + File.write("./weapons/#{name}", yaml_data) + rescue => e + puts e + end + end +end \ No newline at end of file diff --git a/scripts/for_migration/fetch_lang.rb b/scripts/for_migration/fetch_lang.rb new file mode 100644 index 0000000..0001a74 --- /dev/null +++ b/scripts/for_migration/fetch_lang.rb @@ -0,0 +1,31 @@ +# https://api.github.com/repos/hahwul/dalfox/languages +# +# +require 'yaml' + +langs = [] +Dir.entries("./weapons").each do | name | + if name.strip != "." || name != ".." + begin + data = YAML.load(File.open("./weapons/#{name}")) + if data['url'].include? "//github.com" + t = data['url'].split("/") + lang = `curl -s https://api.github.com/repos/#{t[3]}/#{t[4]}/languages | jq 'to_entries | max_by(.value) | .key'` + lang_str = lang.gsub("\"","").gsub("\n","") + if lang_str != "documentation_url" + puts "hit #{name}" + data['lang'] = lang_str + yaml_data = YAML.dump(data) + File.write("./weapons/#{name}", yaml_data) + langs.push lang_str + else + puts "denied #{name}" + end + sleep(90) + end + rescue => e + puts e + end + end + end +puts langs.uniq \ No newline at end of file diff --git a/scripts/for_migration/migration.rb b/scripts/for_migration/migration.rb new file mode 100644 index 0000000..c9910b9 --- /dev/null +++ b/scripts/for_migration/migration.rb @@ -0,0 +1,95 @@ +require 'json' +require 'yaml' +require "uri" + +def get_os install + lst = [] + if install['Linux'].length > 1 + lst.push 'linux' + end + if install['MacOS'].length > 1 + lst.push 'macos' + end + if install['Windows'].length > 1 + lst.push 'windows' + end + return lst +end + +def get_browser str + lst = [] + if str.include? 'Chrome' + lst.push 'chrome' + end + if str.include? 'Firefox' + lst.push 'firefox' + end + if str.include? 'Safari' + lst.push 'safari' + end + if str.include? 'Burp' + lst.push 'burpsuite' + end + if str.include? 'ZAP' + lst.push 'zap' + end + if str.include? 'All' + lst.push 'burpsuite' + lst.push 'zap' + end + return lst +end + +def get_url str + urls = URI.extract(str).uniq + urls.each do |url| + if !url.include? "img.shields.io" + return url.gsub(")","") + end + end + return "" +end + +def get_lang url + if url.include? "https://github.com" + + end +end + +def migrate jsonfile, category + file = File.read(jsonfile) + data_hash = JSON.parse(file) + + data_hash.each do | name, obj | + filename = name.gsub(' ','_')+".yaml" + # Make object + new_obj = {} + new_obj['name'] = name + new_obj['description'] = obj['Description'] + new_obj['url'] = get_url obj['Data'] + new_obj['category'] = category + new_obj['types'] = [] + if obj['Install'] != nil + new_obj['platform'] = get_os(obj['Install']) + end + if category.include? 'addon' + if obj['Type'].length > 0 + new_obj['platform'] = get_browser(obj['Type']) + end + end + new_obj['lang'] = [] # parse DATA + new_obj['tags'] = [] + + # Convert to YAML + yaml_data = YAML.dump(new_obj) + + # Save yaml file + puts filename + File.write("./weapons/#{filename}", yaml_data) + end +end + +migrate './data.json', 'tool' +migrate './Bookmarklets/data.json', 'bookmarklet' +migrate './Browser Extensions/data.json', 'browser-addon' +migrate './Burp and ZAP Extensions/data.json', 'tool-addon' \ No newline at end of file diff --git a/scripts/validate_weapons.rb b/scripts/validate_weapons.rb new file mode 100644 index 0000000..27e9aed --- /dev/null +++ b/scripts/validate_weapons.rb @@ -0,0 +1,22 @@ +require 'yaml' + +Dir.entries("./weapons").each do | name | + if name.strip != "." || name != ".." + begin + data = YAML.load(File.open("./weapons/#{name}")) + if data['type'] == "" || data['type'] == nil + puts "./weapons/#{name} :: none-type" + end + if data['lang'] == "" || data['lang'] == nil || data['lang'].length == 0 + if data['url'].include? "github.com" + puts "./weapons/#{name} :: none-lang" + end + end + if data['tags'].length == 0 || data['tags'] == nil + #puts "#{name} :: none-tags" + end + rescue => e + puts e + end + end +end \ No newline at end of file diff --git a/template/foot.md b/template/foot.md deleted file mode 100644 index a79f0ae..0000000 --- a/template/foot.md +++ /dev/null @@ -1,4 +0,0 @@ - -## Thanks to (Contributor) -I would like to thank everyone who helped with this project 👍😎 -![](/CONTRIBUTORS.svg) diff --git a/template/head.md b/template/head.md deleted file mode 100644 index d18def1..0000000 --- a/template/head.md +++ /dev/null @@ -1,32 +0,0 @@ -

-
- -
- - - - - - -

-A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting - -## Family project -[![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) -[![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) - -## Table of Contents -- [WHW-Tools](https://whw-tools.hahwul.com) -- [Weapons](#weapons) -- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) -- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) -- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) -- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) -- [Thanks to contributor](#thanks-to-contributor) - -## WHW-Tools -> Always use the latest tools 😎 - -`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) - -## Weapons diff --git a/tool-template.md b/tool-template.md deleted file mode 100644 index 8c68814..0000000 --- a/tool-template.md +++ /dev/null @@ -1,4 +0,0 @@ -| Type | Method | Name | Description | Popularity | Language | -| ---------- | :---------- | :---------- | :---------- | :----------: | :----------: | -| Army-Knife | WVS | [WebHackersWeapons](https://github.com/hahwul/WebHackersWeapons) | Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting | ![](https://img.shields.io/github/stars/hahwul/WebHackersWeapons) | ![](https://img.shields.io/github/languages/top/hahwul/WebHackersWeapons) | -| Discovery | Clipboard | [Google](https://google.com) | Search engine|it's | github:dog:|" diff --git a/type.lst b/type.lst deleted file mode 100644 index a877478..0000000 --- a/type.lst +++ /dev/null @@ -1,6 +0,0 @@ -Army-Knife -Discovery -Fetch -Scanner -ToolBox -Utility diff --git a/weapons/230-OOB.yaml b/weapons/230-OOB.yaml new file mode 100644 index 0000000..9555b1d --- /dev/null +++ b/weapons/230-OOB.yaml @@ -0,0 +1,13 @@ +--- +name: 230-OOB +description: An Out-of-Band XXE server for retrieving file contents over FTP. +url: https://github.com/lc/230-OOB +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: +- xxe diff --git a/weapons/3klCon.yaml b/weapons/3klCon.yaml new file mode 100644 index 0000000..bdd1647 --- /dev/null +++ b/weapons/3klCon.yaml @@ -0,0 +1,13 @@ +--- +name: 3klCon +description: Automation Recon tool which works with Large & Medium scopes. It performs + more than 20 tasks and gets back all the results in separated files. +url: https://github.com/eslam3kl/3klCon +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/AWSBucketDump.yaml b/weapons/AWSBucketDump.yaml new file mode 100644 index 0000000..e0c7269 --- /dev/null +++ b/weapons/AWSBucketDump.yaml @@ -0,0 +1,13 @@ +--- +name: AWSBucketDump +description: Security Tool to Look For Interesting Files in S3 Buckets +url: https://github.com/jordanpotti/AWSBucketDump +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- s3 diff --git a/weapons/Amass.yaml b/weapons/Amass.yaml new file mode 100644 index 0000000..23faaf2 --- /dev/null +++ b/weapons/Amass.yaml @@ -0,0 +1,13 @@ +--- +name: Amass +description: 'In-depth Attack Surface Mapping and Asset Discovery ' +url: https://github.com/OWASP/Amass +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/Arjun.yaml b/weapons/Arjun.yaml new file mode 100644 index 0000000..ae193f4 --- /dev/null +++ b/weapons/Arjun.yaml @@ -0,0 +1,13 @@ +--- +name: Arjun +description: 'HTTP parameter discovery suite. ' +url: https://github.com/s0md3v/Arjun +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- param diff --git a/weapons/Assetnote_Wordlists.yaml b/weapons/Assetnote_Wordlists.yaml new file mode 100644 index 0000000..cc92dca --- /dev/null +++ b/weapons/Assetnote_Wordlists.yaml @@ -0,0 +1,13 @@ +--- +name: Assetnote Wordlists +description: Automated & Manual Wordlists provided by Assetnote +url: https://github.com/assetnote/wordlists +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: CSS +tags: +- wordlist diff --git a/weapons/Atlas.yaml b/weapons/Atlas.yaml new file mode 100644 index 0000000..b7a216f --- /dev/null +++ b/weapons/Atlas.yaml @@ -0,0 +1,12 @@ +--- +name: Atlas +description: 'Quick SQLMap Tamper Suggester ' +url: https://github.com/m4ll0k/Atlas +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/AuthMatrix.yaml b/weapons/AuthMatrix.yaml new file mode 100644 index 0000000..3196ec1 --- /dev/null +++ b/weapons/AuthMatrix.yaml @@ -0,0 +1,13 @@ +--- +name: AuthMatrix +description: +url: https://github.com/SecurityInnovation/AuthMatrix +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- aaa diff --git a/weapons/Autorize.yaml b/weapons/Autorize.yaml new file mode 100644 index 0000000..708b528 --- /dev/null +++ b/weapons/Autorize.yaml @@ -0,0 +1,13 @@ +--- +name: Autorize +description: +url: https://github.com/Quitten/Autorize +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- aaa diff --git a/weapons/Blacklist3r.yaml b/weapons/Blacklist3r.yaml new file mode 100644 index 0000000..7d980e0 --- /dev/null +++ b/weapons/Blacklist3r.yaml @@ -0,0 +1,12 @@ +--- +name: Blacklist3r +description: 'project-blacklist3r ' +url: https://github.com/NotSoSecure/Blacklist3r +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: C# +tags: [] diff --git a/weapons/BruteX.yaml b/weapons/BruteX.yaml new file mode 100644 index 0000000..bae8821 --- /dev/null +++ b/weapons/BruteX.yaml @@ -0,0 +1,12 @@ +--- +name: BruteX +description: Automatically brute force all services running on a target. +url: https://github.com/1N3/BruteX +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/Bug-Bounty-Toolz.yaml b/weapons/Bug-Bounty-Toolz.yaml new file mode 100644 index 0000000..028db79 --- /dev/null +++ b/weapons/Bug-Bounty-Toolz.yaml @@ -0,0 +1,12 @@ +--- +name: Bug-Bounty-Toolz +description: 'BBT - Bug Bounty Tools ' +url: https://github.com/m4ll0k/Bug-Bounty-Toolz +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/BurpBounty.yaml b/weapons/BurpBounty.yaml new file mode 100644 index 0000000..e7956ec --- /dev/null +++ b/weapons/BurpBounty.yaml @@ -0,0 +1,12 @@ +--- +name: BurpBounty +description: +url: https://github.com/wagiro/BurpBounty +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: BlitzBasic +tags: [] diff --git a/weapons/BurpCustomizer.yaml b/weapons/BurpCustomizer.yaml new file mode 100644 index 0000000..70d5876 --- /dev/null +++ b/weapons/BurpCustomizer.yaml @@ -0,0 +1,12 @@ +--- +name: BurpCustomizer +description: Because just a dark theme wasn't enough! +url: https://github.com/CoreyD97/BurpCustomizer +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/BurpJSLinkFinder.yaml b/weapons/BurpJSLinkFinder.yaml new file mode 100644 index 0000000..e6573f0 --- /dev/null +++ b/weapons/BurpJSLinkFinder.yaml @@ -0,0 +1,12 @@ +--- +name: BurpJSLinkFinder +description: +url: https://github.com/InitRoot/BurpJSLinkFinder +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/BurpSuite-Secret_Finder.yaml b/weapons/BurpSuite-Secret_Finder.yaml new file mode 100644 index 0000000..336cca8 --- /dev/null +++ b/weapons/BurpSuite-Secret_Finder.yaml @@ -0,0 +1,12 @@ +--- +name: BurpSuite-Secret_Finder +description: +url: https://github.com/m4ll0k/BurpSuite-Secret_Finder +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/BurpSuite.yaml b/weapons/BurpSuite.yaml new file mode 100644 index 0000000..85fa8b9 --- /dev/null +++ b/weapons/BurpSuite.yaml @@ -0,0 +1,12 @@ +--- +name: BurpSuite +description: the BurpSuite Project +url: https://portswigger.net/burp +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/BurpSuiteHTTPSmuggler.yaml b/weapons/BurpSuiteHTTPSmuggler.yaml new file mode 100644 index 0000000..f1312ed --- /dev/null +++ b/weapons/BurpSuiteHTTPSmuggler.yaml @@ -0,0 +1,12 @@ +--- +name: BurpSuiteHTTPSmuggler +description: +url: https://github.com/nccgroup/BurpSuiteHTTPSmuggler +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/BurpSuiteLoggerPlusPlus.yaml b/weapons/BurpSuiteLoggerPlusPlus.yaml new file mode 100644 index 0000000..b763350 --- /dev/null +++ b/weapons/BurpSuiteLoggerPlusPlus.yaml @@ -0,0 +1,12 @@ +--- +name: BurpSuiteLoggerPlusPlus +description: +url: https://github.com/nccgroup/BurpSuiteLoggerPlusPlus +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/CSP_Evaluator.yaml b/weapons/CSP_Evaluator.yaml new file mode 100644 index 0000000..4dc9aa4 --- /dev/null +++ b/weapons/CSP_Evaluator.yaml @@ -0,0 +1,12 @@ +--- +name: CSP Evaluator +description: Online CSP Evaluator from google +url: https://csp-evaluator.withgoogle.com +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/CT_subdomains.yaml b/weapons/CT_subdomains.yaml new file mode 100644 index 0000000..f64212d --- /dev/null +++ b/weapons/CT_subdomains.yaml @@ -0,0 +1,13 @@ +--- +name: CT_subdomains +description: 'An hourly updated list of subdomains gathered from certificate transparency + logs ' +url: https://github.com/internetwache/CT_subdomains +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/Chaos_Web.yaml b/weapons/Chaos_Web.yaml new file mode 100644 index 0000000..cf49ebb --- /dev/null +++ b/weapons/Chaos_Web.yaml @@ -0,0 +1,13 @@ +--- +name: Chaos Web +description: " actively scan and maintain internet-wide assets' data. enhance research + and analyse changes around DNS for better insights." +url: https://chaos.projectdiscovery.io +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Chromium-based-XSS-Taint-Tracking.yaml b/weapons/Chromium-based-XSS-Taint-Tracking.yaml new file mode 100644 index 0000000..e5f8f10 --- /dev/null +++ b/weapons/Chromium-based-XSS-Taint-Tracking.yaml @@ -0,0 +1,13 @@ +--- +name: Chromium-based-XSS-Taint-Tracking +description: Cyclops is a web browser with XSS detection feature, it is chromium-based + xss detection that used to find the flows from a source to a sink. +url: https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/CorsMe.yaml b/weapons/CorsMe.yaml new file mode 100644 index 0000000..c0581f7 --- /dev/null +++ b/weapons/CorsMe.yaml @@ -0,0 +1,12 @@ +--- +name: CorsMe +description: 'Cross Origin Resource Sharing MisConfiguration Scanner ' +url: https://github.com/Shivangx01b/CorsMe +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/Corsy.yaml b/weapons/Corsy.yaml new file mode 100644 index 0000000..747f22b --- /dev/null +++ b/weapons/Corsy.yaml @@ -0,0 +1,12 @@ +--- +name: Corsy +description: 'CORS Misconfiguration Scanner ' +url: https://github.com/s0md3v/Corsy +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/CyberChef.yaml b/weapons/CyberChef.yaml new file mode 100644 index 0000000..6782c1a --- /dev/null +++ b/weapons/CyberChef.yaml @@ -0,0 +1,13 @@ +--- +name: CyberChef +description: 'The Cyber Swiss Army Knife - a web app for encryption, encoding, compression + and data analysis ' +url: https://github.com/gchq/CyberChef +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/DNSDumpster.yaml b/weapons/DNSDumpster.yaml new file mode 100644 index 0000000..c91f9e8 --- /dev/null +++ b/weapons/DNSDumpster.yaml @@ -0,0 +1,12 @@ +--- +name: DNSDumpster +description: " Online dns recon & research, find & lookup dns records" +url: https://dnsdumpster.com +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/DOMPurify.yaml b/weapons/DOMPurify.yaml new file mode 100644 index 0000000..15ca57b --- /dev/null +++ b/weapons/DOMPurify.yaml @@ -0,0 +1,15 @@ +--- +name: DOMPurify +description: 'DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for + HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of + configurability and hooks. Demo:' +url: https://github.com/cure53/DOMPurify +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- xss diff --git a/weapons/DSSS.yaml b/weapons/DSSS.yaml new file mode 100644 index 0000000..a4e5903 --- /dev/null +++ b/weapons/DSSS.yaml @@ -0,0 +1,12 @@ +--- +name: DSSS +description: Damn Small SQLi Scanner +url: https://github.com/stamparm/DSSS +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Dark_Reader.yaml b/weapons/Dark_Reader.yaml new file mode 100644 index 0000000..0994c3d --- /dev/null +++ b/weapons/Dark_Reader.yaml @@ -0,0 +1,12 @@ +--- +name: Dark Reader +description: Dark mode to any site +url: https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Dark_Reader_for_Safari.yaml b/weapons/Dark_Reader_for_Safari.yaml new file mode 100644 index 0000000..342be92 --- /dev/null +++ b/weapons/Dark_Reader_for_Safari.yaml @@ -0,0 +1,12 @@ +--- +name: Dark Reader for Safari +description: Dark mode to any site +url: https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180 +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/DeepViolet.yaml b/weapons/DeepViolet.yaml new file mode 100644 index 0000000..059a4e0 --- /dev/null +++ b/weapons/DeepViolet.yaml @@ -0,0 +1,13 @@ +--- +name: DeepViolet +description: Tool for introspection of SSL\TLS sessions +url: https://github.com/spoofzu/DeepViolet +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Java +tags: +- ssl diff --git a/weapons/DirDar.yaml b/weapons/DirDar.yaml new file mode 100644 index 0000000..4a73582 --- /dev/null +++ b/weapons/DirDar.yaml @@ -0,0 +1,14 @@ +--- +name: DirDar +description: DirDar is a tool that searches for (403-Forbidden) directories to break + it and get dir listing on it +url: https://github.com/M4DM0e/DirDar +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: +- 403 diff --git a/weapons/DotGit.yaml b/weapons/DotGit.yaml new file mode 100644 index 0000000..6dcb1f4 --- /dev/null +++ b/weapons/DotGit.yaml @@ -0,0 +1,12 @@ +--- +name: DotGit +description: An extension for checking if .git is exposed in visited websites +url: https://github.com/davtur19/DotGit +category: browser-addon +type: Recon +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/Edit-This-Cookie.yaml b/weapons/Edit-This-Cookie.yaml new file mode 100644 index 0000000..66f54b7 --- /dev/null +++ b/weapons/Edit-This-Cookie.yaml @@ -0,0 +1,13 @@ +--- +name: Edit-This-Cookie +description: EditThisCookie is the famous Google Chrome/Chromium extension for editing + cookies +url: https://github.com/ETCExtensions/Edit-This-Cookie +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/Emissary.yaml b/weapons/Emissary.yaml new file mode 100644 index 0000000..3e6b0f7 --- /dev/null +++ b/weapons/Emissary.yaml @@ -0,0 +1,13 @@ +--- +name: Emissary +description: Send notifications on different channels such as Slack, Telegram, Discord + etc. +url: https://github.com/BountyStrike/Emissary +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/FavFreak.yaml b/weapons/FavFreak.yaml new file mode 100644 index 0000000..32346a8 --- /dev/null +++ b/weapons/FavFreak.yaml @@ -0,0 +1,12 @@ +--- +name: FavFreak +description: 'Making Favicon.ico based Recon Great again ! ' +url: https://github.com/devanshbatham/FavFreak +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Findsploit.yaml b/weapons/Findsploit.yaml new file mode 100644 index 0000000..99d8b03 --- /dev/null +++ b/weapons/Findsploit.yaml @@ -0,0 +1,12 @@ +--- +name: Findsploit +description: Find exploits in local and online databases instantly +url: https://github.com/1N3/Findsploit +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/Gf-Patterns.yaml b/weapons/Gf-Patterns.yaml new file mode 100644 index 0000000..170319e --- /dev/null +++ b/weapons/Gf-Patterns.yaml @@ -0,0 +1,13 @@ +--- +name: Gf-Patterns +description: 'GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) + parameters grep ' +url: https://github.com/1ndianl33t/Gf-Patterns +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/GitMiner.yaml b/weapons/GitMiner.yaml new file mode 100644 index 0000000..082af2a --- /dev/null +++ b/weapons/GitMiner.yaml @@ -0,0 +1,12 @@ +--- +name: GitMiner +description: 'Tool for advanced mining for content on Github ' +url: https://github.com/UnkL4b/GitMiner +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Gopherus.yaml b/weapons/Gopherus.yaml new file mode 100644 index 0000000..8cf9e61 --- /dev/null +++ b/weapons/Gopherus.yaml @@ -0,0 +1,13 @@ +--- +name: Gopherus +description: 'This tool generates gopher link for exploiting SSRF and gaining RCE + in various servers ' +url: https://github.com/tarunkant/Gopherus +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/GraphQLmap.yaml b/weapons/GraphQLmap.yaml new file mode 100644 index 0000000..f5e3fd8 --- /dev/null +++ b/weapons/GraphQLmap.yaml @@ -0,0 +1,13 @@ +--- +name: GraphQLmap +description: 'GraphQLmap is a scripting engine to interact with a graphql endpoint + for pentesting purposes. ' +url: https://github.com/swisskyrepo/GraphQLmap +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/HRS.yaml b/weapons/HRS.yaml new file mode 100644 index 0000000..9de40f2 --- /dev/null +++ b/weapons/HRS.yaml @@ -0,0 +1,13 @@ +--- +name: HRS +description: HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and + 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. +url: https://github.com/SafeBreach-Labs/HRS +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Perl +tags: [] diff --git a/weapons/HUNT.yaml b/weapons/HUNT.yaml new file mode 100644 index 0000000..0939c8e --- /dev/null +++ b/weapons/HUNT.yaml @@ -0,0 +1,12 @@ +--- +name: HUNT +description: +url: https://github.com/bugcrowd/HUNT +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Hack-Tools.yaml b/weapons/Hack-Tools.yaml new file mode 100644 index 0000000..73f9947 --- /dev/null +++ b/weapons/Hack-Tools.yaml @@ -0,0 +1,12 @@ +--- +name: Hack-Tools +description: "The all-in-one Red Team extension for Web Pentester \U0001F6E0" +url: https://github.com/LasCC/Hack-Tools +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: TypeScript +tags: [] diff --git a/weapons/HydraRecon.yaml b/weapons/HydraRecon.yaml new file mode 100644 index 0000000..d001c43 --- /dev/null +++ b/weapons/HydraRecon.yaml @@ -0,0 +1,12 @@ +--- +name: HydraRecon +description: All In One, Fast, Easy Recon Tool +url: https://github.com/aufzayed/HydraRecon +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/IntruderPayloads.yaml b/weapons/IntruderPayloads.yaml new file mode 100644 index 0000000..b12cb54 --- /dev/null +++ b/weapons/IntruderPayloads.yaml @@ -0,0 +1,12 @@ +--- +name: IntruderPayloads +description: +url: https://github.com/1N3/IntruderPayloads +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: BlitzBasic +tags: [] diff --git a/weapons/JSFScan.sh.yaml b/weapons/JSFScan.sh.yaml new file mode 100644 index 0000000..c2da753 --- /dev/null +++ b/weapons/JSFScan.sh.yaml @@ -0,0 +1,12 @@ +--- +name: JSFScan.sh +description: 'Automation for javascript recon in bug bounty. ' +url: https://github.com/KathanP19/JSFScan.sh +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/LFISuite.yaml b/weapons/LFISuite.yaml new file mode 100644 index 0000000..135fb90 --- /dev/null +++ b/weapons/LFISuite.yaml @@ -0,0 +1,12 @@ +--- +name: LFISuite +description: 'Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner ' +url: https://github.com/D35m0nd142/LFISuite +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/LinkFinder.yaml b/weapons/LinkFinder.yaml new file mode 100644 index 0000000..798073b --- /dev/null +++ b/weapons/LinkFinder.yaml @@ -0,0 +1,12 @@ +--- +name: LinkFinder +description: 'A python script that finds endpoints in JavaScript files ' +url: https://github.com/GerbenJavado/LinkFinder +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/MM3_ProxySwitch.yaml b/weapons/MM3_ProxySwitch.yaml new file mode 100644 index 0000000..ab4994a --- /dev/null +++ b/weapons/MM3_ProxySwitch.yaml @@ -0,0 +1,12 @@ +--- +name: MM3 ProxySwitch +description: Proxy Switch in Firefox and Chrome +url: https://proxy-offline-browser.com/ProxySwitch/ +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/NoSQLMap.yaml b/weapons/NoSQLMap.yaml new file mode 100644 index 0000000..16cfa5a --- /dev/null +++ b/weapons/NoSQLMap.yaml @@ -0,0 +1,13 @@ +--- +name: NoSQLMap +description: 'Automated NoSQL database enumeration and web application exploitation + tool. ' +url: https://github.com/codingo/NoSQLMap +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/OneForAll.yaml b/weapons/OneForAll.yaml new file mode 100644 index 0000000..0055c40 --- /dev/null +++ b/weapons/OneForAll.yaml @@ -0,0 +1,12 @@ +--- +name: OneForAll +description: 'OneForAll是一款功能强大的子域收集工具 ' +url: https://github.com/shmilylty/OneForAll +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/OpenRedireX.yaml b/weapons/OpenRedireX.yaml new file mode 100644 index 0000000..c30d23a --- /dev/null +++ b/weapons/OpenRedireX.yaml @@ -0,0 +1,12 @@ +--- +name: OpenRedireX +description: A Fuzzer for OpenRedirect issues +url: https://github.com/devanshbatham/OpenRedireX +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Osmedeus.yaml b/weapons/Osmedeus.yaml new file mode 100644 index 0000000..952f579 --- /dev/null +++ b/weapons/Osmedeus.yaml @@ -0,0 +1,13 @@ +--- +name: Osmedeus +description: 'Fully automated offensive security framework for reconnaissance and + vulnerability scanning ' +url: https://github.com/j3ssie/Osmedeus +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/PPScan.yaml b/weapons/PPScan.yaml new file mode 100644 index 0000000..9c4239b --- /dev/null +++ b/weapons/PPScan.yaml @@ -0,0 +1,12 @@ +--- +name: PPScan +description: Client Side Prototype Pollution Scanner +url: https://github.com/msrkp/PPScan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/ParamSpider.yaml b/weapons/ParamSpider.yaml new file mode 100644 index 0000000..746a4d7 --- /dev/null +++ b/weapons/ParamSpider.yaml @@ -0,0 +1,13 @@ +--- +name: ParamSpider +description: 'Mining parameters from dark corners of Web Archives ' +url: https://github.com/devanshbatham/ParamSpider +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- param diff --git a/weapons/Parth.yaml b/weapons/Parth.yaml new file mode 100644 index 0000000..02a4178 --- /dev/null +++ b/weapons/Parth.yaml @@ -0,0 +1,13 @@ +--- +name: Parth +description: 'Heuristic Vulnerable Parameter Scanner ' +url: https://github.com/s0md3v/Parth +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- param diff --git a/weapons/PayloadsAllTheThings.yaml b/weapons/PayloadsAllTheThings.yaml new file mode 100644 index 0000000..b14d3a6 --- /dev/null +++ b/weapons/PayloadsAllTheThings.yaml @@ -0,0 +1,13 @@ +--- +name: PayloadsAllTheThings +description: 'A list of useful payloads and bypass for Web Application Security and + Pentest/CTF ' +url: https://github.com/swisskyrepo/PayloadsAllTheThings +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Phoenix.yaml b/weapons/Phoenix.yaml new file mode 100644 index 0000000..f029e8b --- /dev/null +++ b/weapons/Phoenix.yaml @@ -0,0 +1,12 @@ +--- +name: Phoenix +description: " hahwul's online tools" +url: https://www.hahwul.com/p/phoenix.html +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Photon.yaml b/weapons/Photon.yaml new file mode 100644 index 0000000..2d8c188 --- /dev/null +++ b/weapons/Photon.yaml @@ -0,0 +1,12 @@ +--- +name: Photon +description: 'Incredibly fast crawler designed for OSINT. ' +url: https://github.com/s0md3v/Photon +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/PoC-in-GitHub.yaml b/weapons/PoC-in-GitHub.yaml new file mode 100644 index 0000000..fd0aca2 --- /dev/null +++ b/weapons/PoC-in-GitHub.yaml @@ -0,0 +1,12 @@ +--- +name: PoC-in-GitHub +description: "\U0001F4E1 PoC auto collect from GitHub. Be careful malware." +url: https://github.com/nomi-sec/PoC-in-GitHub +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/RustScan.yaml b/weapons/RustScan.yaml new file mode 100644 index 0000000..d37116c --- /dev/null +++ b/weapons/RustScan.yaml @@ -0,0 +1,12 @@ +--- +name: RustScan +description: 'Faster Nmap Scanning with Rust ' +url: https://github.com/brandonskerritt/RustScan +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/S3Scanner.yaml b/weapons/S3Scanner.yaml new file mode 100644 index 0000000..4a66cc6 --- /dev/null +++ b/weapons/S3Scanner.yaml @@ -0,0 +1,13 @@ +--- +name: S3Scanner +description: 'Scan for open AWS S3 buckets and dump the contents ' +url: https://github.com/sa7mon/S3Scanner +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- s3 diff --git a/weapons/SQLNinja.yaml b/weapons/SQLNinja.yaml new file mode 100644 index 0000000..ce1365e --- /dev/null +++ b/weapons/SQLNinja.yaml @@ -0,0 +1,12 @@ +--- +name: SQLNinja +description: " SQL Injection scanner" +url: https://gitlab.com/kalilinux/packages/sqlninja +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/SQL_Ninja.yaml b/weapons/SQL_Ninja.yaml new file mode 100644 index 0000000..7fd2ec1 --- /dev/null +++ b/weapons/SQL_Ninja.yaml @@ -0,0 +1,12 @@ +--- +name: SQL Ninja +description: SQL Injection scanner +url: https://gitlab.com/kalilinux/packages/sqlninja +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/SSRFmap.yaml b/weapons/SSRFmap.yaml new file mode 100644 index 0000000..27a8f62 --- /dev/null +++ b/weapons/SSRFmap.yaml @@ -0,0 +1,13 @@ +--- +name: SSRFmap +description: 'Automatic SSRF fuzzer and exploitation tool ' +url: https://github.com/swisskyrepo/SSRFmap +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Python +tags: +- ssrf diff --git a/weapons/STEWS.yaml b/weapons/STEWS.yaml new file mode 100644 index 0000000..9d1c11c --- /dev/null +++ b/weapons/STEWS.yaml @@ -0,0 +1,12 @@ +--- +name: STEWS +description: A Security Tool for Enumerating WebSockets +url: https://github.com/PalindromeLabs/STEWS +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/SecLists.yaml b/weapons/SecLists.yaml new file mode 100644 index 0000000..7e0fab9 --- /dev/null +++ b/weapons/SecLists.yaml @@ -0,0 +1,15 @@ +--- +name: SecLists +description: 'SecLists is the security tester''s companion. It''s a collection of + multiple types of lists used during security assessments, collected in one place. + List types include usernames, passwords, URLs, sensitive data patterns, fuzzing + payloads, web shells, and many more. ' +url: https://github.com/danielmiessler/SecLists +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: PHP +tags: [] diff --git a/weapons/SecretFinder.yaml b/weapons/SecretFinder.yaml new file mode 100644 index 0000000..dcfcb5b --- /dev/null +++ b/weapons/SecretFinder.yaml @@ -0,0 +1,13 @@ +--- +name: SecretFinder +description: 'SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) + and search anything on javascript files ' +url: https://github.com/m4ll0k/SecretFinder +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/SecurityTrails.yaml b/weapons/SecurityTrails.yaml new file mode 100644 index 0000000..14e7382 --- /dev/null +++ b/weapons/SecurityTrails.yaml @@ -0,0 +1,12 @@ +--- +name: SecurityTrails +description: " Online dns / subdomain / recon tool" +url: https://securitytrails.com +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/SequenceDiagram.yaml b/weapons/SequenceDiagram.yaml new file mode 100644 index 0000000..ad52886 --- /dev/null +++ b/weapons/SequenceDiagram.yaml @@ -0,0 +1,12 @@ +--- +name: SequenceDiagram +description: " Online tool for creating UML sequence diagrams" +url: https://sequencediagram.org +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Shodan.yaml b/weapons/Shodan.yaml new file mode 100644 index 0000000..7e8b11d --- /dev/null +++ b/weapons/Shodan.yaml @@ -0,0 +1,12 @@ +--- +name: Shodan +description: " World's first search engine for Internet-connected devices" +url: https://www.shodan.io/ +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Silver.yaml b/weapons/Silver.yaml new file mode 100644 index 0000000..852e2f8 --- /dev/null +++ b/weapons/Silver.yaml @@ -0,0 +1,12 @@ +--- +name: Silver +description: 'Mass scan IPs for vulnerable services ' +url: https://github.com/s0md3v/Silver +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Sn1per.yaml b/weapons/Sn1per.yaml new file mode 100644 index 0000000..dc4695e --- /dev/null +++ b/weapons/Sn1per.yaml @@ -0,0 +1,12 @@ +--- +name: Sn1per +description: 'Automated pentest framework for offensive security experts ' +url: https://github.com/1N3/Sn1per +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/Stepper.yaml b/weapons/Stepper.yaml new file mode 100644 index 0000000..db3759b --- /dev/null +++ b/weapons/Stepper.yaml @@ -0,0 +1,12 @@ +--- +name: Stepper +description: +url: https://github.com/CoreyD97/Stepper +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/Striker.yaml b/weapons/Striker.yaml new file mode 100644 index 0000000..e3c4574 --- /dev/null +++ b/weapons/Striker.yaml @@ -0,0 +1,12 @@ +--- +name: Striker +description: 'Striker is an offensive information and vulnerability scanner. ' +url: https://github.com/s0md3v/Striker +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/SubOver.yaml b/weapons/SubOver.yaml new file mode 100644 index 0000000..ff6eb05 --- /dev/null +++ b/weapons/SubOver.yaml @@ -0,0 +1,13 @@ +--- +name: SubOver +description: A Powerful Subdomain Takeover Tool +url: https://github.com/Ice3man543/SubOver +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/Sublist3r.yaml b/weapons/Sublist3r.yaml new file mode 100644 index 0000000..4ccc96a --- /dev/null +++ b/weapons/Sublist3r.yaml @@ -0,0 +1,13 @@ +--- +name: Sublist3r +description: 'Fast subdomains enumeration tool for penetration testers ' +url: https://github.com/aboul3la/Sublist3r +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- subdomains diff --git a/weapons/Taipan.yaml b/weapons/Taipan.yaml new file mode 100644 index 0000000..d33e51f --- /dev/null +++ b/weapons/Taipan.yaml @@ -0,0 +1,12 @@ +--- +name: Taipan +description: Web application vulnerability scanner +url: https://github.com/enkomio/Taipan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/TukTuk.yaml b/weapons/TukTuk.yaml new file mode 100644 index 0000000..7ae4ddf --- /dev/null +++ b/weapons/TukTuk.yaml @@ -0,0 +1,13 @@ +--- +name: TukTuk +description: 'Tool for catching and logging different types of requests. ' +url: https://github.com/ArturSS7/TukTuk +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- oast diff --git a/weapons/User-Agent_Switcher.yaml b/weapons/User-Agent_Switcher.yaml new file mode 100644 index 0000000..1232f2f --- /dev/null +++ b/weapons/User-Agent_Switcher.yaml @@ -0,0 +1,12 @@ +--- +name: User-Agent Switcher +description: quick and easy way to switch between user-agents. +url: https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/VHostScan.yaml b/weapons/VHostScan.yaml new file mode 100644 index 0000000..8a43587 --- /dev/null +++ b/weapons/VHostScan.yaml @@ -0,0 +1,14 @@ +--- +name: VHostScan +description: 'A virtual host scanner that performs reverse lookups, can be used with + pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic + default pages. ' +url: https://github.com/codingo/VHostScan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/Wayback_Machine.yaml b/weapons/Wayback_Machine.yaml new file mode 100644 index 0000000..d15c821 --- /dev/null +++ b/weapons/Wayback_Machine.yaml @@ -0,0 +1,12 @@ +--- +name: Wayback Machine +description: History of website +url: https://apps.apple.com/us/app/wayback-machine/id1472432422 +category: browser-addon +type: Recon +platform: +- linux +- macos +- windows +lang: [] +tags: [] diff --git a/weapons/Web-Cache-Vulnerability-Scanner.yaml b/weapons/Web-Cache-Vulnerability-Scanner.yaml new file mode 100644 index 0000000..d5d3b43 --- /dev/null +++ b/weapons/Web-Cache-Vulnerability-Scanner.yaml @@ -0,0 +1,13 @@ +--- +name: Web-Cache-Vulnerability-Scanner +description: Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for + web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/). +url: https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/XSRFProbe.yaml b/weapons/XSRFProbe.yaml new file mode 100644 index 0000000..d8a675a --- /dev/null +++ b/weapons/XSRFProbe.yaml @@ -0,0 +1,12 @@ +--- +name: XSRFProbe +description: The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. +url: https://github.com/0xInfection/XSRFProbe +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/XSStrike.yaml b/weapons/XSStrike.yaml new file mode 100644 index 0000000..f0afba7 --- /dev/null +++ b/weapons/XSStrike.yaml @@ -0,0 +1,13 @@ +--- +name: XSStrike +description: 'Most advanced XSS scanner. ' +url: https://github.com/s0md3v/XSStrike +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- xss diff --git a/weapons/XSpear.yaml b/weapons/XSpear.yaml new file mode 100644 index 0000000..b2ccfbd --- /dev/null +++ b/weapons/XSpear.yaml @@ -0,0 +1,13 @@ +--- +name: XSpear +description: 'Powerfull XSS Scanning and Parameter analysis tool&gem ' +url: https://github.com/hahwul/XSpear +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Ruby +tags: +- xss diff --git a/weapons/XXEinjector.yaml b/weapons/XXEinjector.yaml new file mode 100644 index 0000000..8b95d04 --- /dev/null +++ b/weapons/XXEinjector.yaml @@ -0,0 +1,14 @@ +--- +name: XXEinjector +description: Tool for automatic exploitation of XXE vulnerability using direct and + different out of band methods. +url: https://github.com/enjoiz/XXEinjector +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: Ruby +tags: +- xxe diff --git a/weapons/a2sv.yaml b/weapons/a2sv.yaml new file mode 100644 index 0000000..9e6f284 --- /dev/null +++ b/weapons/a2sv.yaml @@ -0,0 +1,13 @@ +--- +name: a2sv +description: 'Auto Scanning to SSL Vulnerability ' +url: https://github.com/hahwul/a2sv +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- ssl diff --git a/weapons/altdns.yaml b/weapons/altdns.yaml new file mode 100644 index 0000000..1c66994 --- /dev/null +++ b/weapons/altdns.yaml @@ -0,0 +1,14 @@ +--- +name: altdns +description: 'Generates permutations, alterations and mutations of subdomains and + then resolves them ' +url: https://github.com/infosec-au/altdns +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- dns diff --git a/weapons/anew.yaml b/weapons/anew.yaml new file mode 100644 index 0000000..7a325e8 --- /dev/null +++ b/weapons/anew.yaml @@ -0,0 +1,12 @@ +--- +name: anew +description: A tool for adding new lines to files, skipping duplicates +url: https://github.com/tomnomnom/anew +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/apkleaks.yaml b/weapons/apkleaks.yaml new file mode 100644 index 0000000..ae3e605 --- /dev/null +++ b/weapons/apkleaks.yaml @@ -0,0 +1,13 @@ +--- +name: apkleaks +description: 'Scanning APK file for URIs, endpoints & secrets. ' +url: https://github.com/dwisiswant0/apkleaks +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- apk diff --git a/weapons/aquatone.yaml b/weapons/aquatone.yaml new file mode 100644 index 0000000..710bb3d --- /dev/null +++ b/weapons/aquatone.yaml @@ -0,0 +1,13 @@ +--- +name: aquatone +description: 'A Tool for Domain Flyovers ' +url: https://github.com/michenriksen/aquatone +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- domain diff --git a/weapons/arachni.yaml b/weapons/arachni.yaml new file mode 100644 index 0000000..3b8a27b --- /dev/null +++ b/weapons/arachni.yaml @@ -0,0 +1,12 @@ +--- +name: arachni +description: 'Web Application Security Scanner Framework ' +url: https://github.com/Arachni/arachni +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Ruby +tags: [] diff --git a/weapons/assetfinder.yaml b/weapons/assetfinder.yaml new file mode 100644 index 0000000..4d4a75a --- /dev/null +++ b/weapons/assetfinder.yaml @@ -0,0 +1,13 @@ +--- +name: assetfinder +description: 'Find domains and subdomains related to a given domain ' +url: https://github.com/tomnomnom/assetfinder +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/attack-surface-detector-zap.yaml b/weapons/attack-surface-detector-zap.yaml new file mode 100644 index 0000000..b156acd --- /dev/null +++ b/weapons/attack-surface-detector-zap.yaml @@ -0,0 +1,12 @@ +--- +name: attack-surface-detector-zap +description: +url: https://github.com/secdec/attack-surface-detector-zap +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/auto-repeater.yaml b/weapons/auto-repeater.yaml new file mode 100644 index 0000000..4440522 --- /dev/null +++ b/weapons/auto-repeater.yaml @@ -0,0 +1,12 @@ +--- +name: auto-repeater +description: +url: https://github.com/PortSwigger/auto-repeater +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/autochrome.yaml b/weapons/autochrome.yaml new file mode 100644 index 0000000..26bba11 --- /dev/null +++ b/weapons/autochrome.yaml @@ -0,0 +1,12 @@ +--- +name: autochrome +description: This tool downloads, installs, and configures a shiny new copy of Chromium. +url: https://github.com/nccgroup/autochrome +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: HTML +tags: [] diff --git a/weapons/axiom.yaml b/weapons/axiom.yaml new file mode 100644 index 0000000..1bc71ae --- /dev/null +++ b/weapons/axiom.yaml @@ -0,0 +1,13 @@ +--- +name: axiom +description: 'A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ' +url: https://github.com/pry0cc/axiom +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Shell +tags: +- infra diff --git a/weapons/bat.yaml b/weapons/bat.yaml new file mode 100644 index 0000000..41821bb --- /dev/null +++ b/weapons/bat.yaml @@ -0,0 +1,12 @@ +--- +name: bat +description: A cat(1) clone with wings. +url: https://github.com/sharkdp/bat +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/boast.yaml b/weapons/boast.yaml new file mode 100644 index 0000000..6997403 --- /dev/null +++ b/weapons/boast.yaml @@ -0,0 +1,13 @@ +--- +name: boast +description: The BOAST Outpost for AppSec Testing (v0.1.0) +url: https://github.com/marcoagner/boast +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- oast diff --git a/weapons/bountyplz.yaml b/weapons/bountyplz.yaml new file mode 100644 index 0000000..e13ec03 --- /dev/null +++ b/weapons/bountyplz.yaml @@ -0,0 +1,14 @@ +--- +name: bountyplz +description: 'Automated security reporting from markdown templates (HackerOne and + Bugcrowd are currently the platforms supported) ' +url: https://github.com/fransr/bountyplz +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Shell +tags: +- report diff --git a/weapons/burl.yaml b/weapons/burl.yaml new file mode 100644 index 0000000..c0bf48e --- /dev/null +++ b/weapons/burl.yaml @@ -0,0 +1,13 @@ +--- +name: burl +description: 'A Broken-URL Checker ' +url: https://github.com/tomnomnom/burl +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- url diff --git a/weapons/burp-exporter.yaml b/weapons/burp-exporter.yaml new file mode 100644 index 0000000..48a2bbb --- /dev/null +++ b/weapons/burp-exporter.yaml @@ -0,0 +1,12 @@ +--- +name: burp-exporter +description: +url: https://github.com/artssec/burp-exporter +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/burp-piper.yaml b/weapons/burp-piper.yaml new file mode 100644 index 0000000..90ebc92 --- /dev/null +++ b/weapons/burp-piper.yaml @@ -0,0 +1,12 @@ +--- +name: burp-piper +description: +url: https://github.com/silentsignal/burp-piper +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Kotlin +tags: [] diff --git a/weapons/burp-retire-js.yaml b/weapons/burp-retire-js.yaml new file mode 100644 index 0000000..7390d28 --- /dev/null +++ b/weapons/burp-retire-js.yaml @@ -0,0 +1,12 @@ +--- +name: burp-retire-js +description: +url: https://github.com/h3xstream/burp-retire-js +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/burp-send-to.yaml b/weapons/burp-send-to.yaml new file mode 100644 index 0000000..4607176 --- /dev/null +++ b/weapons/burp-send-to.yaml @@ -0,0 +1,12 @@ +--- +name: burp-send-to +description: +url: https://github.com/bytebutcher/burp-send-to +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/c-jwt-cracker.yaml b/weapons/c-jwt-cracker.yaml new file mode 100644 index 0000000..3f7d4a2 --- /dev/null +++ b/weapons/c-jwt-cracker.yaml @@ -0,0 +1,13 @@ +--- +name: c-jwt-cracker +description: 'JWT brute force cracker written in C ' +url: https://github.com/brendan-rius/c-jwt-cracker +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: C +tags: +- jwt diff --git a/weapons/can-i-take-over-xyz.yaml b/weapons/can-i-take-over-xyz.yaml new file mode 100644 index 0000000..3ab8019 --- /dev/null +++ b/weapons/can-i-take-over-xyz.yaml @@ -0,0 +1,13 @@ +--- +name: can-i-take-over-xyz +description: '"Can I take over XYZ?" — a list of services and how to claim (sub)domains + with dangling DNS records.' +url: https://github.com/EdOverflow/can-i-take-over-xyz +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/cariddi.yaml b/weapons/cariddi.yaml new file mode 100644 index 0000000..e693b4e --- /dev/null +++ b/weapons/cariddi.yaml @@ -0,0 +1,13 @@ +--- +name: cariddi +description: Take a list of domains and scan for endpoints, secrets, api keys, file + extensions, tokens and more... +url: https://github.com/edoardottt/cariddi +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/cc.py.yaml b/weapons/cc.py.yaml new file mode 100644 index 0000000..7292da4 --- /dev/null +++ b/weapons/cc.py.yaml @@ -0,0 +1,12 @@ +--- +name: cc.py +description: 'Extracting URLs of a specific target based on the results of "commoncrawl.org" ' +url: https://github.com/si9int/cc.py +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/cf-check.yaml b/weapons/cf-check.yaml new file mode 100644 index 0000000..a78e462 --- /dev/null +++ b/weapons/cf-check.yaml @@ -0,0 +1,12 @@ +--- +name: cf-check +description: 'Cloudflare Checker written in Go ' +url: https://github.com/dwisiswant0/cf-check +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/chaos-client.yaml b/weapons/chaos-client.yaml new file mode 100644 index 0000000..d8740b2 --- /dev/null +++ b/weapons/chaos-client.yaml @@ -0,0 +1,12 @@ +--- +name: chaos-client +description: 'Go client to communicate with Chaos DNS API. ' +url: https://github.com/projectdiscovery/chaos-client +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/clear-cache.yaml b/weapons/clear-cache.yaml new file mode 100644 index 0000000..c363f3f --- /dev/null +++ b/weapons/clear-cache.yaml @@ -0,0 +1,12 @@ +--- +name: clear-cache +description: Add-on to clear browser cache with a single click or via the F9 key. +url: https://github.com/TenSoja/clear-cache +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/collaborator-everywhere.yaml b/weapons/collaborator-everywhere.yaml new file mode 100644 index 0000000..382d571 --- /dev/null +++ b/weapons/collaborator-everywhere.yaml @@ -0,0 +1,12 @@ +--- +name: collaborator-everywhere +description: +url: https://github.com/PortSwigger/collaborator-everywhere +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/commix.yaml b/weapons/commix.yaml new file mode 100644 index 0000000..34f11c8 --- /dev/null +++ b/weapons/commix.yaml @@ -0,0 +1,12 @@ +--- +name: commix +description: Automated All-in-One OS Command Injection Exploitation Tool. +url: https://github.com/commixproject/commix +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/community-scripts.yaml b/weapons/community-scripts.yaml new file mode 100644 index 0000000..cc4e226 --- /dev/null +++ b/weapons/community-scripts.yaml @@ -0,0 +1,12 @@ +--- +name: community-scripts +description: +url: https://github.com/zaproxy/community-scripts +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/confused.yaml b/weapons/confused.yaml new file mode 100644 index 0000000..645690a --- /dev/null +++ b/weapons/confused.yaml @@ -0,0 +1,13 @@ +--- +name: confused +description: Tool to check for dependency confusion vulnerabilities in multiple package + management systems +url: https://github.com/visma-prodsec/confused +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/cookie-quick-manager.yaml b/weapons/cookie-quick-manager.yaml new file mode 100644 index 0000000..613811e --- /dev/null +++ b/weapons/cookie-quick-manager.yaml @@ -0,0 +1,13 @@ +--- +name: cookie-quick-manager +description: An addon to manage (view, search, create, edit, remove, backup, restore) + cookies on Firefox. +url: https://github.com/ysard/cookie-quick-manager +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/corsair_scan.yaml b/weapons/corsair_scan.yaml new file mode 100644 index 0000000..47c8e76 --- /dev/null +++ b/weapons/corsair_scan.yaml @@ -0,0 +1,13 @@ +--- +name: corsair_scan +description: Corsair_scan is a security tool to test Cross-Origin Resource Sharing + (CORS). +url: https://github.com/Santandersecurityresearch/corsair_scan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/crawlergo.yaml b/weapons/crawlergo.yaml new file mode 100644 index 0000000..fd53276 --- /dev/null +++ b/weapons/crawlergo.yaml @@ -0,0 +1,12 @@ +--- +name: crawlergo +description: A powerful browser crawler for web vulnerability scanners +url: https://github.com/Qianlitp/crawlergo +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/crlfuzz.yaml b/weapons/crlfuzz.yaml new file mode 100644 index 0000000..ebe5968 --- /dev/null +++ b/weapons/crlfuzz.yaml @@ -0,0 +1,12 @@ +--- +name: crlfuzz +description: 'A fast tool to scan CRLF vulnerability written in Go ' +url: https://github.com/dwisiswant0/crlfuzz +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/csp-auditor.yaml b/weapons/csp-auditor.yaml new file mode 100644 index 0000000..d31177c --- /dev/null +++ b/weapons/csp-auditor.yaml @@ -0,0 +1,13 @@ +--- +name: csp-auditor +description: +url: https://github.com/GoSecure/csp-auditor +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Java +tags: +- csp diff --git a/weapons/curl.yaml b/weapons/curl.yaml new file mode 100644 index 0000000..6522bf0 --- /dev/null +++ b/weapons/curl.yaml @@ -0,0 +1,15 @@ +--- +name: curl +description: A command line tool and library for transferring data with URL syntax, + supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, + LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful + features +url: https://github.com/curl/curl +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: C +tags: [] diff --git a/weapons/dalfox.yaml b/weapons/dalfox.yaml new file mode 100644 index 0000000..405ab23 --- /dev/null +++ b/weapons/dalfox.yaml @@ -0,0 +1,14 @@ +--- +name: dalfox +description: "\U0001F318\U0001F98A DalFox(Finder Of XSS) / Parameter Analysis and + XSS Scanning tool based on golang " +url: https://github.com/hahwul/dalfox +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: +- xss diff --git a/weapons/dirsearch.yaml b/weapons/dirsearch.yaml new file mode 100644 index 0000000..ad7de1c --- /dev/null +++ b/weapons/dirsearch.yaml @@ -0,0 +1,12 @@ +--- +name: dirsearch +description: 'Web path scanner ' +url: https://github.com/maurosoria/dirsearch +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/ditto.yaml b/weapons/ditto.yaml new file mode 100644 index 0000000..0a0d956 --- /dev/null +++ b/weapons/ditto.yaml @@ -0,0 +1,12 @@ +--- +name: ditto +description: A tool for IDN homograph attacks and detection. +url: https://github.com/evilsocket/ditto +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/dmut.yaml b/weapons/dmut.yaml new file mode 100644 index 0000000..1681f22 --- /dev/null +++ b/weapons/dmut.yaml @@ -0,0 +1,14 @@ +--- +name: dmut +description: A tool to perform permutations, mutations and alteration of subdomains + in golang. +url: https://github.com/bp0lr/dmut +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/dnsobserver.yaml b/weapons/dnsobserver.yaml new file mode 100644 index 0000000..d298db4 --- /dev/null +++ b/weapons/dnsobserver.yaml @@ -0,0 +1,16 @@ +--- +name: dnsobserver +description: 'A handy DNS service written in Go to aid in the detection of several + types of blind vulnerabilities. It monitors a pentester''s server for out-of-band + DNS interactions and sends lookup notifications via Slack. ' +url: https://github.com/allyomalley/dnsobserver +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- oast +- dns diff --git a/weapons/dnsprobe.yaml b/weapons/dnsprobe.yaml new file mode 100644 index 0000000..f633ae3 --- /dev/null +++ b/weapons/dnsprobe.yaml @@ -0,0 +1,14 @@ +--- +name: dnsprobe +description: 'DNSProb (beta) is a tool built on top of retryabledns that allows you + to perform multiple dns queries of your choice with a list of user supplied resolvers. ' +url: https://github.com/projectdiscovery/dnsprobe +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- dns diff --git a/weapons/dnsvalidator.yaml b/weapons/dnsvalidator.yaml new file mode 100644 index 0000000..b4bcdd0 --- /dev/null +++ b/weapons/dnsvalidator.yaml @@ -0,0 +1,14 @@ +--- +name: dnsvalidator +description: Maintains a list of IPv4 DNS servers by verifying them against baseline + servers, and ensuring accurate responses. +url: https://github.com/vortexau/dnsvalidator +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- dns diff --git a/weapons/dnsx.yaml b/weapons/dnsx.yaml new file mode 100644 index 0000000..462b779 --- /dev/null +++ b/weapons/dnsx.yaml @@ -0,0 +1,14 @@ +--- +name: dnsx +description: dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS + queries of your choice with a list of user-supplied resolvers. +url: https://github.com/projectdiscovery/dnsx +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- dns diff --git a/weapons/docem.yaml b/weapons/docem.yaml new file mode 100644 index 0000000..aa599dc --- /dev/null +++ b/weapons/docem.yaml @@ -0,0 +1,15 @@ +--- +name: docem +description: Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on + steroids) +url: https://github.com/whitel1st/docem +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: +- xxe +- xss diff --git a/weapons/domdig.yaml b/weapons/domdig.yaml new file mode 100644 index 0000000..9b67bc5 --- /dev/null +++ b/weapons/domdig.yaml @@ -0,0 +1,13 @@ +--- +name: domdig +description: 'DOM XSS scanner for Single Page Applications ' +url: https://github.com/fcavallarin/domdig +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- xss diff --git a/weapons/dontgo403.yaml b/weapons/dontgo403.yaml new file mode 100644 index 0000000..014a3ec --- /dev/null +++ b/weapons/dontgo403.yaml @@ -0,0 +1,13 @@ +--- +name: dontgo403 +description: Tool to bypass 40X response codes. +url: https://github.com/devploit/dontgo403 +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: +- 403 diff --git a/weapons/dotdotpwn.yaml b/weapons/dotdotpwn.yaml new file mode 100644 index 0000000..4c7fa2f --- /dev/null +++ b/weapons/dotdotpwn.yaml @@ -0,0 +1,12 @@ +--- +name: dotdotpwn +description: 'DotDotPwn - The Directory Traversal Fuzzer ' +url: https://github.com/wireghoul/dotdotpwn +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Perl +tags: [] diff --git a/weapons/eval_villain.yaml b/weapons/eval_villain.yaml new file mode 100644 index 0000000..a78e5f2 --- /dev/null +++ b/weapons/eval_villain.yaml @@ -0,0 +1,13 @@ +--- +name: eval_villain +description: A Firefox Web Extension to improve the discovery of DOM XSS. +url: https://github.com/swoops/eval_villain +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- xss diff --git a/weapons/ezXSS.yaml b/weapons/ezXSS.yaml new file mode 100644 index 0000000..d8ee884 --- /dev/null +++ b/weapons/ezXSS.yaml @@ -0,0 +1,14 @@ +--- +name: ezXSS +description: 'ezXSS is an easy way for penetration testers and bug bounty hunters + to test (blind) Cross Site Scripting. ' +url: https://github.com/ssl/ezXSS +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: PHP +tags: +- xss diff --git a/weapons/femida.yaml b/weapons/femida.yaml new file mode 100644 index 0000000..86eafff --- /dev/null +++ b/weapons/femida.yaml @@ -0,0 +1,12 @@ +--- +name: femida +description: +url: https://github.com/wish-i-was/femida +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/feroxbuster.yaml b/weapons/feroxbuster.yaml new file mode 100644 index 0000000..9a09909 --- /dev/null +++ b/weapons/feroxbuster.yaml @@ -0,0 +1,12 @@ +--- +name: feroxbuster +description: A fast, simple, recursive content discovery tool written in Rust. +url: https://github.com/epi052/feroxbuster +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/ffuf.yaml b/weapons/ffuf.yaml new file mode 100644 index 0000000..a77803b --- /dev/null +++ b/weapons/ffuf.yaml @@ -0,0 +1,12 @@ +--- +name: ffuf +description: 'Fast web fuzzer written in Go ' +url: https://github.com/ffuf/ffuf +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/fhc.yaml b/weapons/fhc.yaml new file mode 100644 index 0000000..d2ecdf5 --- /dev/null +++ b/weapons/fhc.yaml @@ -0,0 +1,12 @@ +--- +name: fhc +description: Fast HTTP Checker. +url: https://github.com/Edu4rdSHL/fhc +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/findom-xss.yaml b/weapons/findom-xss.yaml new file mode 100644 index 0000000..1371683 --- /dev/null +++ b/weapons/findom-xss.yaml @@ -0,0 +1,13 @@ +--- +name: findom-xss +description: 'A fast DOM based XSS vulnerability scanner with simplicity. ' +url: https://github.com/dwisiswant0/findom-xss +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Shell +tags: +- xss diff --git a/weapons/findomain.yaml b/weapons/findomain.yaml new file mode 100644 index 0000000..638900b --- /dev/null +++ b/weapons/findomain.yaml @@ -0,0 +1,14 @@ +--- +name: findomain +description: 'The fastest and cross-platform subdomain enumerator, do not waste your + time. ' +url: https://github.com/Edu4rdSHL/findomain +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: +- subdomains diff --git a/weapons/fockcache.yaml b/weapons/fockcache.yaml new file mode 100644 index 0000000..b816e54 --- /dev/null +++ b/weapons/fockcache.yaml @@ -0,0 +1,12 @@ +--- +name: fockcache +description: FockCache - Minimalized Test Cache Poisoning +url: https://github.com/tismayil/fockcache +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/fuzzparam.yaml b/weapons/fuzzparam.yaml new file mode 100644 index 0000000..b88bd0b --- /dev/null +++ b/weapons/fuzzparam.yaml @@ -0,0 +1,12 @@ +--- +name: fuzzparam +description: A fast go based param miner to fuzz possible parameters a URL can have. +url: https://github.com/0xsapra/fuzzparam +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/fzf.yaml b/weapons/fzf.yaml new file mode 100644 index 0000000..0050443 --- /dev/null +++ b/weapons/fzf.yaml @@ -0,0 +1,12 @@ +--- +name: fzf +description: A command-line fuzzy finder +url: https://github.com/junegunn/fzf +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gau.yaml b/weapons/gau.yaml new file mode 100644 index 0000000..d4ca1e0 --- /dev/null +++ b/weapons/gau.yaml @@ -0,0 +1,13 @@ +--- +name: gau +description: Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback + Machine, and Common Crawl. +url: https://github.com/lc/gau +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gauplus.yaml b/weapons/gauplus.yaml new file mode 100644 index 0000000..d9d1d66 --- /dev/null +++ b/weapons/gauplus.yaml @@ -0,0 +1,13 @@ +--- +name: gauplus +description: A modified version of gau for personal usage. Support workers, proxies + and some extra things. +url: https://github.com/bp0lr/gauplus +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gee.yaml b/weapons/gee.yaml new file mode 100644 index 0000000..47c2a55 --- /dev/null +++ b/weapons/gee.yaml @@ -0,0 +1,14 @@ +--- +name: gee +description: "\U0001F3F5 Gee is tool of stdin to each files and stdout. It is similar + to the tee command, but there are more functions for convenience. In addition, it + was written as go" +url: https://github.com/hahwul/gee +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/getJS.yaml b/weapons/getJS.yaml new file mode 100644 index 0000000..46a02de --- /dev/null +++ b/weapons/getJS.yaml @@ -0,0 +1,12 @@ +--- +name: getJS +description: A tool to fastly get all javascript sources/files +url: https://github.com/003random/getJS +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gf.yaml b/weapons/gf.yaml new file mode 100644 index 0000000..fa305ab --- /dev/null +++ b/weapons/gf.yaml @@ -0,0 +1,12 @@ +--- +name: gf +description: 'A wrapper around grep, to help you grep for things ' +url: https://github.com/tomnomnom/gf +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gitGraber.yaml b/weapons/gitGraber.yaml new file mode 100644 index 0000000..4b14166 --- /dev/null +++ b/weapons/gitGraber.yaml @@ -0,0 +1,12 @@ +--- +name: gitGraber +description: 'gitGraber ' +url: https://github.com/hisxo/gitGraber +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/github-endpoints.yaml b/weapons/github-endpoints.yaml new file mode 100644 index 0000000..33134cd --- /dev/null +++ b/weapons/github-endpoints.yaml @@ -0,0 +1,12 @@ +--- +name: github-endpoints +description: Find endpoints on GitHub. +url: https://github.com/gwen001/github-endpoints +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/github-regexp.yaml b/weapons/github-regexp.yaml new file mode 100644 index 0000000..cbbf1f6 --- /dev/null +++ b/weapons/github-regexp.yaml @@ -0,0 +1,12 @@ +--- +name: github-regexp +description: Basically a regexp over a GitHub search. +url: https://github.com/gwen001/github-regexp +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/github-search.yaml b/weapons/github-search.yaml new file mode 100644 index 0000000..8bc6f49 --- /dev/null +++ b/weapons/github-search.yaml @@ -0,0 +1,12 @@ +--- +name: github-search +description: 'Tools to perform basic search on GitHub. ' +url: https://github.com/gwen001/github-search +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/github-subdomains.yaml b/weapons/github-subdomains.yaml new file mode 100644 index 0000000..7cf0df3 --- /dev/null +++ b/weapons/github-subdomains.yaml @@ -0,0 +1,12 @@ +--- +name: github-subdomains +description: Find subdomains on GitHub +url: https://github.com/gwen001/github-subdomains +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gitleaks.yaml b/weapons/gitleaks.yaml new file mode 100644 index 0000000..b331263 --- /dev/null +++ b/weapons/gitleaks.yaml @@ -0,0 +1,12 @@ +--- +name: gitleaks +description: "Scan git repos (or files) for secrets using regex and entropy \U0001F511" +url: https://github.com/zricethezav/gitleaks +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gitls.yaml b/weapons/gitls.yaml new file mode 100644 index 0000000..00860df --- /dev/null +++ b/weapons/gitls.yaml @@ -0,0 +1,12 @@ +--- +name: gitls +description: Listing git repository from URL/User/Org +url: https://github.com/hahwul/gitls +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gitrob.yaml b/weapons/gitrob.yaml new file mode 100644 index 0000000..443232b --- /dev/null +++ b/weapons/gitrob.yaml @@ -0,0 +1,12 @@ +--- +name: gitrob +description: 'Reconnaissance tool for GitHub organizations ' +url: https://github.com/michenriksen/gitrob +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/go-dork.yaml b/weapons/go-dork.yaml new file mode 100644 index 0000000..0330463 --- /dev/null +++ b/weapons/go-dork.yaml @@ -0,0 +1,12 @@ +--- +name: go-dork +description: 'The fastest dork scanner written in Go. ' +url: https://github.com/dwisiswant0/go-dork +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gobuster.yaml b/weapons/gobuster.yaml new file mode 100644 index 0000000..6dd2c11 --- /dev/null +++ b/weapons/gobuster.yaml @@ -0,0 +1,12 @@ +--- +name: gobuster +description: 'Directory/File, DNS and VHost busting tool written in Go ' +url: https://github.com/OJ/gobuster +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gospider.yaml b/weapons/gospider.yaml new file mode 100644 index 0000000..7739129 --- /dev/null +++ b/weapons/gospider.yaml @@ -0,0 +1,12 @@ +--- +name: gospider +description: 'Gospider - Fast web spider written in Go ' +url: https://github.com/jaeles-project/gospider +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gotator.yaml b/weapons/gotator.yaml new file mode 100644 index 0000000..e926c1e --- /dev/null +++ b/weapons/gotator.yaml @@ -0,0 +1,12 @@ +--- +name: gotator +description: Gotator is a tool to generate DNS wordlists through permutations. +url: https://github.com/Josue87/gotator +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gotestwaf.yaml b/weapons/gotestwaf.yaml new file mode 100644 index 0000000..162db21 --- /dev/null +++ b/weapons/gotestwaf.yaml @@ -0,0 +1,13 @@ +--- +name: gotestwaf +description: An open-source project in Golang to test different web application firewalls + (WAF) for detection logic and bypasses +url: https://github.com/wallarm/gotestwaf +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/gowitness.yaml b/weapons/gowitness.yaml new file mode 100644 index 0000000..1953f8c --- /dev/null +++ b/weapons/gowitness.yaml @@ -0,0 +1,13 @@ +--- +name: gowitness +description: "\U0001F50D gowitness - a golang, web screenshot utility using Chrome + Headless " +url: https://github.com/sensepost/gowitness +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/graphql-voyager.yaml b/weapons/graphql-voyager.yaml new file mode 100644 index 0000000..cc88d6d --- /dev/null +++ b/weapons/graphql-voyager.yaml @@ -0,0 +1,12 @@ +--- +name: graphql-voyager +description: "\U0001F6F0️ Represent any GraphQL API as an interactive graph " +url: https://github.com/APIs-guru/graphql-voyager +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Typescript +tags: [] diff --git a/weapons/grc.yaml b/weapons/grc.yaml new file mode 100644 index 0000000..7a7946a --- /dev/null +++ b/weapons/grc.yaml @@ -0,0 +1,12 @@ +--- +name: grc +description: generic colouriser +url: https://github.com/garabik/grc +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/grex.yaml b/weapons/grex.yaml new file mode 100644 index 0000000..515a061 --- /dev/null +++ b/weapons/grex.yaml @@ -0,0 +1,13 @@ +--- +name: grex +description: A command-line tool and library for generating regular expressions from + user-provided test cases +url: https://github.com/pemistahl/grex +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/gron.yaml b/weapons/gron.yaml new file mode 100644 index 0000000..4364d46 --- /dev/null +++ b/weapons/gron.yaml @@ -0,0 +1,12 @@ +--- +name: gron +description: 'Make JSON greppable! ' +url: https://github.com/tomnomnom/gron +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/h2csmuggler.yaml b/weapons/h2csmuggler.yaml new file mode 100644 index 0000000..67b4834 --- /dev/null +++ b/weapons/h2csmuggler.yaml @@ -0,0 +1,12 @@ +--- +name: h2csmuggler +description: HTTP Request Smuggling Detection Tool +url: https://github.com/assetnote/h2csmuggler +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hacks.yaml b/weapons/hacks.yaml new file mode 100644 index 0000000..593297e --- /dev/null +++ b/weapons/hacks.yaml @@ -0,0 +1,12 @@ +--- +name: hacks +description: 'A collection of hacks and one-off scripts ' +url: https://github.com/tomnomnom/hacks +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hakcheckurl.yaml b/weapons/hakcheckurl.yaml new file mode 100644 index 0000000..8eecb9c --- /dev/null +++ b/weapons/hakcheckurl.yaml @@ -0,0 +1,12 @@ +--- +name: hakcheckurl +description: Takes a list of URLs and returns their HTTP response codes +url: https://github.com/hakluke/hakcheckurl +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hakrawler.yaml b/weapons/hakrawler.yaml new file mode 100644 index 0000000..6681319 --- /dev/null +++ b/weapons/hakrawler.yaml @@ -0,0 +1,13 @@ +--- +name: hakrawler +description: 'Simple, fast web crawler designed for easy, quick discovery of endpoints + and assets within a web application ' +url: https://github.com/hakluke/hakrawler +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hakrevdns.yaml b/weapons/hakrevdns.yaml new file mode 100644 index 0000000..37d4578 --- /dev/null +++ b/weapons/hakrevdns.yaml @@ -0,0 +1,12 @@ +--- +name: hakrevdns +description: 'Small, fast tool for performing reverse DNS lookups en masse. ' +url: https://github.com/hakluke/hakrevdns +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/haktrails.yaml b/weapons/haktrails.yaml new file mode 100644 index 0000000..5f553da --- /dev/null +++ b/weapons/haktrails.yaml @@ -0,0 +1,12 @@ +--- +name: haktrails +description: Golang client for querying SecurityTrails API data +url: https://github.com/hakluke/haktrails +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hashcat.yaml b/weapons/hashcat.yaml new file mode 100644 index 0000000..9555943 --- /dev/null +++ b/weapons/hashcat.yaml @@ -0,0 +1,12 @@ +--- +name: hashcat +description: 'World''s fastest and most advanced password recovery utility ' +url: https://github.com/hashcat/hashcat/ +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: C +tags: [] diff --git a/weapons/headi.yaml b/weapons/headi.yaml new file mode 100644 index 0000000..4af14d4 --- /dev/null +++ b/weapons/headi.yaml @@ -0,0 +1,12 @@ +--- +name: headi +description: Customisable and automated HTTP header injection +url: https://github.com/mlcsec/headi +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hetty.yaml b/weapons/hetty.yaml new file mode 100644 index 0000000..02ff272 --- /dev/null +++ b/weapons/hetty.yaml @@ -0,0 +1,14 @@ +--- +name: hetty +description: Hetty is an HTTP toolkit for security research. It aims to become an + open source alternative to commercial software like Burp Suite Pro, with powerful + features tailored to the needs of the infosec and bug bounty community. +url: https://github.com/dstotijn/hetty +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hinject.yaml b/weapons/hinject.yaml new file mode 100644 index 0000000..38c0a28 --- /dev/null +++ b/weapons/hinject.yaml @@ -0,0 +1,12 @@ +--- +name: hinject +description: 'Host Header Injection Checker ' +url: https://github.com/dwisiswant0/hinject +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/htcat.yaml b/weapons/htcat.yaml new file mode 100644 index 0000000..11ae040 --- /dev/null +++ b/weapons/htcat.yaml @@ -0,0 +1,12 @@ +--- +name: htcat +description: 'Parallel and Pipelined HTTP GET Utility ' +url: https://github.com/htcat/htcat +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/http-request-smuggler.yaml b/weapons/http-request-smuggler.yaml new file mode 100644 index 0000000..94e346e --- /dev/null +++ b/weapons/http-request-smuggler.yaml @@ -0,0 +1,12 @@ +--- +name: http-request-smuggler +description: +url: https://github.com/PortSwigger/http-request-smuggler +category: tool-addon +type: Scanner +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/http-request-smuggling.yaml b/weapons/http-request-smuggling.yaml new file mode 100644 index 0000000..a46cee8 --- /dev/null +++ b/weapons/http-request-smuggling.yaml @@ -0,0 +1,12 @@ +--- +name: http-request-smuggling +description: HTTP Request Smuggling Detection Tool +url: https://github.com/anshumanpattnaik/http-request-smuggling +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/http-script-generator.yaml b/weapons/http-script-generator.yaml new file mode 100644 index 0000000..1df0d12 --- /dev/null +++ b/weapons/http-script-generator.yaml @@ -0,0 +1,12 @@ +--- +name: http-script-generator +description: +url: https://github.com/h3xstream/http-script-generator +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/http2smugl.yaml b/weapons/http2smugl.yaml new file mode 100644 index 0000000..3eab091 --- /dev/null +++ b/weapons/http2smugl.yaml @@ -0,0 +1,13 @@ +--- +name: http2smugl +description: This tool helps to detect and exploit HTTP request smuggling in cases + it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server. +url: https://github.com/neex/http2smugl +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/httpie.yaml b/weapons/httpie.yaml new file mode 100644 index 0000000..1c30cb7 --- /dev/null +++ b/weapons/httpie.yaml @@ -0,0 +1,14 @@ +--- +name: httpie +description: "As easy as /aitch-tee-tee-pie/ \U0001F967 Modern, user-friendly command-line + HTTP client for the API era. JSON support, colors, sessions, downloads, plugins + & more. https://twitter.com/httpie" +url: https://github.com/httpie/httpie +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/httprobe.yaml b/weapons/httprobe.yaml new file mode 100644 index 0000000..c1c8f81 --- /dev/null +++ b/weapons/httprobe.yaml @@ -0,0 +1,12 @@ +--- +name: httprobe +description: 'Take a list of domains and probe for working HTTP and HTTPS servers ' +url: https://github.com/tomnomnom/httprobe +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/httptoolkit.yaml b/weapons/httptoolkit.yaml new file mode 100644 index 0000000..102dc6d --- /dev/null +++ b/weapons/httptoolkit.yaml @@ -0,0 +1,13 @@ +--- +name: httptoolkit +description: HTTP Toolkit is a beautiful & open-source tool for debugging, testing + and building with HTTP(S) on Windows, Linux & Mac +url: https://github.com/httptoolkit/httptoolkit +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: 'null' +tags: [] diff --git a/weapons/httpx.yaml b/weapons/httpx.yaml new file mode 100644 index 0000000..dd3cab6 --- /dev/null +++ b/weapons/httpx.yaml @@ -0,0 +1,14 @@ +--- +name: httpx +description: 'httpx is a fast and multi-purpose HTTP toolkit allow to run multiple + probers using retryablehttp library, it is designed to maintain the result reliability + with increased threads. ' +url: https://github.com/projectdiscovery/httpx +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/hurl.yaml b/weapons/hurl.yaml new file mode 100644 index 0000000..7bb4a36 --- /dev/null +++ b/weapons/hurl.yaml @@ -0,0 +1,12 @@ +--- +name: hurl +description: Hurl, run and test HTTP requests. +url: https://github.com/Orange-OpenSource/hurl +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/inql.yaml b/weapons/inql.yaml new file mode 100644 index 0000000..9965e27 --- /dev/null +++ b/weapons/inql.yaml @@ -0,0 +1,12 @@ +--- +name: inql +description: +url: https://github.com/doyensec/inql +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/interactsh.yaml b/weapons/interactsh.yaml new file mode 100644 index 0000000..0dc5da4 --- /dev/null +++ b/weapons/interactsh.yaml @@ -0,0 +1,13 @@ +--- +name: interactsh +description: An OOB interaction gathering server and client library +url: https://github.com/projectdiscovery/interactsh +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- oast diff --git a/weapons/intrigue-core.yaml b/weapons/intrigue-core.yaml new file mode 100644 index 0000000..1baafc3 --- /dev/null +++ b/weapons/intrigue-core.yaml @@ -0,0 +1,12 @@ +--- +name: intrigue-core +description: 'Discover Your Attack Surface ' +url: https://github.com/intrigueio/intrigue-core +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Ruby +tags: [] diff --git a/weapons/jaeles.yaml b/weapons/jaeles.yaml new file mode 100644 index 0000000..d77a008 --- /dev/null +++ b/weapons/jaeles.yaml @@ -0,0 +1,12 @@ +--- +name: jaeles +description: 'The Swiss Army knife for automated Web Application Testing ' +url: https://github.com/jaeles-project/jaeles +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/jsfuck.yaml b/weapons/jsfuck.yaml new file mode 100644 index 0000000..0cd137d --- /dev/null +++ b/weapons/jsfuck.yaml @@ -0,0 +1,13 @@ +--- +name: jsfuck +description: Write any JavaScript with 6 Characters +url: https://github.com/aemkei/jsfuck +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- xss diff --git a/weapons/jsonwebtoken.github.io.yaml b/weapons/jsonwebtoken.github.io.yaml new file mode 100644 index 0000000..64676ce --- /dev/null +++ b/weapons/jsonwebtoken.github.io.yaml @@ -0,0 +1,13 @@ +--- +name: jsonwebtoken.github.io +description: JWT En/Decode and Verify +url: https://github.com/jsonwebtoken/jsonwebtoken.github.io +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- jwt diff --git a/weapons/jsprime.yaml b/weapons/jsprime.yaml new file mode 100644 index 0000000..804386d --- /dev/null +++ b/weapons/jsprime.yaml @@ -0,0 +1,12 @@ +--- +name: jsprime +description: a javascript static security analysis tool +url: https://github.com/dpnishant/jsprime +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/jwt-cracker.yaml b/weapons/jwt-cracker.yaml new file mode 100644 index 0000000..bf056ec --- /dev/null +++ b/weapons/jwt-cracker.yaml @@ -0,0 +1,13 @@ +--- +name: jwt-cracker +description: 'Simple HS256 JWT token brute force cracker ' +url: https://github.com/lmammino/jwt-cracker +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- jwt diff --git a/weapons/jwt-hack.yaml b/weapons/jwt-hack.yaml new file mode 100644 index 0000000..05eadb3 --- /dev/null +++ b/weapons/jwt-hack.yaml @@ -0,0 +1,14 @@ +--- +name: jwt-hack +description: "\U0001F529 jwt-hack is tool for hacking / security testing to JWT. Supported + for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)" +url: https://github.com/hahwul/jwt-hack +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Go +tags: +- jwt diff --git a/weapons/kiterunner.yaml b/weapons/kiterunner.yaml new file mode 100644 index 0000000..0e784c5 --- /dev/null +++ b/weapons/kiterunner.yaml @@ -0,0 +1,12 @@ +--- +name: kiterunner +description: Contextual Content Discovery Tool +url: https://github.com/assetnote/kiterunner +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/knife.yaml b/weapons/knife.yaml new file mode 100644 index 0000000..c4c55fc --- /dev/null +++ b/weapons/knife.yaml @@ -0,0 +1,12 @@ +--- +name: knife +description: A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅 +url: https://github.com/bit4woo/knife +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/knock.yaml b/weapons/knock.yaml new file mode 100644 index 0000000..4169f91 --- /dev/null +++ b/weapons/knock.yaml @@ -0,0 +1,13 @@ +--- +name: knock +description: 'Knock Subdomain Scan ' +url: https://github.com/guelfoweb/knock +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: +- subdomains diff --git a/weapons/lazyrecon.yaml b/weapons/lazyrecon.yaml new file mode 100644 index 0000000..6c07f0c --- /dev/null +++ b/weapons/lazyrecon.yaml @@ -0,0 +1,13 @@ +--- +name: lazyrecon +description: 'This script is intended to automate your reconnaissance process in an + organized fashion ' +url: https://github.com/nahamsec/lazyrecon +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/longtongue.yaml b/weapons/longtongue.yaml new file mode 100644 index 0000000..aadedcb --- /dev/null +++ b/weapons/longtongue.yaml @@ -0,0 +1,12 @@ +--- +name: longtongue +description: Customized Password/Passphrase List inputting Target Info +url: https://github.com/edoardottt/longtongue +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/masscan.yaml b/weapons/masscan.yaml new file mode 100644 index 0000000..bc9afc3 --- /dev/null +++ b/weapons/masscan.yaml @@ -0,0 +1,13 @@ +--- +name: masscan +description: 'TCP port scanner, spews SYN packets asynchronously, scanning entire + Internet in under 5 minutes. ' +url: https://github.com/robertdavidgraham/masscan +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: C +tags: [] diff --git a/weapons/medusa.yaml b/weapons/medusa.yaml new file mode 100644 index 0000000..708714e --- /dev/null +++ b/weapons/medusa.yaml @@ -0,0 +1,12 @@ +--- +name: medusa +description: 'Fastest recursive HTTP fuzzer, like a Ferrari. ' +url: https://github.com/riza/medusa +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/meg.yaml b/weapons/meg.yaml new file mode 100644 index 0000000..f2b6e0e --- /dev/null +++ b/weapons/meg.yaml @@ -0,0 +1,12 @@ +--- +name: meg +description: 'Fetch many paths for many hosts - without killing the hosts ' +url: https://github.com/tomnomnom/meg +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/megplus.yaml b/weapons/megplus.yaml new file mode 100644 index 0000000..90d63b2 --- /dev/null +++ b/weapons/megplus.yaml @@ -0,0 +1,12 @@ +--- +name: megplus +description: 'Automated reconnaissance wrapper — TomNomNom''s meg on steroids. [DEPRECATED] ' +url: https://github.com/EdOverflow/megplus +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/naabu.yaml b/weapons/naabu.yaml new file mode 100644 index 0000000..d387fd8 --- /dev/null +++ b/weapons/naabu.yaml @@ -0,0 +1,14 @@ +--- +name: naabu +description: 'A fast port scanner written in go with focus on reliability and simplicity. + Designed to be used in combination with other tools for attack surface discovery + in bug bounties and pentests ' +url: https://github.com/projectdiscovery/naabu +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/nikto.yaml b/weapons/nikto.yaml new file mode 100644 index 0000000..ea30071 --- /dev/null +++ b/weapons/nikto.yaml @@ -0,0 +1,12 @@ +--- +name: nikto +description: 'Nikto web server scanner ' +url: https://github.com/sullo/nikto +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Perl +tags: [] diff --git a/weapons/nmap.yaml b/weapons/nmap.yaml new file mode 100644 index 0000000..25ecc60 --- /dev/null +++ b/weapons/nmap.yaml @@ -0,0 +1,12 @@ +--- +name: nmap +description: 'Nmap - the Network Mapper. Github mirror of official SVN repository. ' +url: https://github.com/nmap/nmap +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: C +tags: [] diff --git a/weapons/nosqli.yaml b/weapons/nosqli.yaml new file mode 100644 index 0000000..a75b55b --- /dev/null +++ b/weapons/nosqli.yaml @@ -0,0 +1,12 @@ +--- +name: nosqli +description: NoSql Injection CLI tool +url: https://github.com/Charlie-belmer/nosqli +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/nuclei.yaml b/weapons/nuclei.yaml new file mode 100644 index 0000000..bf185d5 --- /dev/null +++ b/weapons/nuclei.yaml @@ -0,0 +1,13 @@ +--- +name: nuclei +description: 'Nuclei is a fast tool for configurable targeted scanning based on templates + offering massive extensibility and ease of use. ' +url: https://github.com/projectdiscovery/nuclei +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/ob_hacky_slack.yaml b/weapons/ob_hacky_slack.yaml new file mode 100644 index 0000000..98bea55 --- /dev/null +++ b/weapons/ob_hacky_slack.yaml @@ -0,0 +1,12 @@ +--- +name: ob_hacky_slack +description: Hacky Slack - a bash script that sends beautiful messages to Slack +url: https://github.com/openbridge/ob_hacky_slack +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/owasp-zap-jwt-addon.yaml b/weapons/owasp-zap-jwt-addon.yaml new file mode 100644 index 0000000..4180238 --- /dev/null +++ b/weapons/owasp-zap-jwt-addon.yaml @@ -0,0 +1,13 @@ +--- +name: owasp-zap-jwt-addon +description: +url: https://github.com/SasanLabs/owasp-zap-jwt-addon +category: tool-addon +type: utils +platform: +- linux +- macos +- windows +lang: Java +tags: +- jwt diff --git a/weapons/oxml_xxe.yaml b/weapons/oxml_xxe.yaml new file mode 100644 index 0000000..6de5dff --- /dev/null +++ b/weapons/oxml_xxe.yaml @@ -0,0 +1,12 @@ +--- +name: oxml_xxe +description: 'A tool for embedding XXE/XML exploits into different filetypes ' +url: https://github.com/BuffaloWill/oxml_xxe +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Ruby +tags: [] diff --git a/weapons/pagodo.yaml b/weapons/pagodo.yaml new file mode 100644 index 0000000..b421709 --- /dev/null +++ b/weapons/pagodo.yaml @@ -0,0 +1,13 @@ +--- +name: pagodo +description: pagodo (Passive Google Dork) - Automate Google Hacking Database scraping + and searching +url: https://github.com/opsdisk/pagodo +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/param-miner.yaml b/weapons/param-miner.yaml new file mode 100644 index 0000000..282c0d1 --- /dev/null +++ b/weapons/param-miner.yaml @@ -0,0 +1,13 @@ +--- +name: param-miner +description: +url: https://github.com/PortSwigger/param-miner +category: tool-addon +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Java +tags: +- param diff --git a/weapons/parameth.yaml b/weapons/parameth.yaml new file mode 100644 index 0000000..8962571 --- /dev/null +++ b/weapons/parameth.yaml @@ -0,0 +1,12 @@ +--- +name: parameth +description: This tool can be used to brute discover GET and POST parameters +url: https://github.com/maK-/parameth +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/pentest-tools.yaml b/weapons/pentest-tools.yaml new file mode 100644 index 0000000..d27cd7b --- /dev/null +++ b/weapons/pentest-tools.yaml @@ -0,0 +1,12 @@ +--- +name: pentest-tools +description: 'Custom pentesting tools ' +url: https://github.com/gwen001/pentest-tools +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/pet.yaml b/weapons/pet.yaml new file mode 100644 index 0000000..85ab444 --- /dev/null +++ b/weapons/pet.yaml @@ -0,0 +1,12 @@ +--- +name: pet +description: Simple command-line snippet manager, written in Go. +url: https://github.com/knqyf263/pet +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/plution.yaml b/weapons/plution.yaml new file mode 100644 index 0000000..6dfee2a --- /dev/null +++ b/weapons/plution.yaml @@ -0,0 +1,12 @@ +--- +name: plution +description: Prototype pollution scanner using headless chrome +url: https://github.com/raverrr/plution +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/postMessage-tracker.yaml b/weapons/postMessage-tracker.yaml new file mode 100644 index 0000000..c02699f --- /dev/null +++ b/weapons/postMessage-tracker.yaml @@ -0,0 +1,13 @@ +--- +name: postMessage-tracker +description: A Chrome Extension to track postMessage usage (url, domain and stack) + both by logging using CORS and also visually as an extension-icon +url: https://github.com/fransr/postMessage-tracker +category: browser-addon +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/ppfuzz.yaml b/weapons/ppfuzz.yaml new file mode 100644 index 0000000..22cad9b --- /dev/null +++ b/weapons/ppfuzz.yaml @@ -0,0 +1,13 @@ +--- +name: ppfuzz +description: "A fast tool to scan client-side prototype pollution vulnerability written + in Rust. \U0001F980" +url: https://github.com/dwisiswant0/ppfuzz +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/ppmap.yaml b/weapons/ppmap.yaml new file mode 100644 index 0000000..9efc4da --- /dev/null +++ b/weapons/ppmap.yaml @@ -0,0 +1,13 @@ +--- +name: ppmap +description: A scanner/exploitation tool written in GO, which leverages client-side + Prototype Pollution to XSS by exploiting known gadgets. +url: https://github.com/kleiton0x00/ppmap +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/proxify.yaml b/weapons/proxify.yaml new file mode 100644 index 0000000..f3b2d71 --- /dev/null +++ b/weapons/proxify.yaml @@ -0,0 +1,13 @@ +--- +name: proxify +description: Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation + and replay +url: https://github.com/projectdiscovery/proxify +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/puredns.yaml b/weapons/puredns.yaml new file mode 100644 index 0000000..1a47c6c --- /dev/null +++ b/weapons/puredns.yaml @@ -0,0 +1,13 @@ +--- +name: puredns +description: Puredns is a fast domain resolver and subdomain bruteforcing tool that + can accurately filter out wildcard subdomains and DNS poisoned entries. +url: https://github.com/d3mondev/puredns +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/pwncat.yaml b/weapons/pwncat.yaml new file mode 100644 index 0000000..584b3fe --- /dev/null +++ b/weapons/pwncat.yaml @@ -0,0 +1,14 @@ +--- +name: pwncat +description: 'pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and + reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable + with Python (PSE) ' +url: https://github.com/cytopia/pwncat +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/qsreplace.yaml b/weapons/qsreplace.yaml new file mode 100644 index 0000000..6c97253 --- /dev/null +++ b/weapons/qsreplace.yaml @@ -0,0 +1,13 @@ +--- +name: qsreplace +description: 'Accept URLs on stdin, replace all query string values with a user-supplied + value ' +url: https://github.com/tomnomnom/qsreplace +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/quickjack.yaml b/weapons/quickjack.yaml new file mode 100644 index 0000000..1635584 --- /dev/null +++ b/weapons/quickjack.yaml @@ -0,0 +1,13 @@ +--- +name: quickjack +description: Quickjack is a point-and-click tool for intuitively producing advanced + clickjacking and frame slicing attacks. +url: https://github.com/samyk/quickjack +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/rapidscan.yaml b/weapons/rapidscan.yaml new file mode 100644 index 0000000..b06aa8d --- /dev/null +++ b/weapons/rapidscan.yaml @@ -0,0 +1,12 @@ +--- +name: rapidscan +description: 'The Multi-Tool Web Vulnerability Scanner. ' +url: https://github.com/skavngr/rapidscan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/recon_profile.yaml b/weapons/recon_profile.yaml new file mode 100644 index 0000000..35957ea --- /dev/null +++ b/weapons/recon_profile.yaml @@ -0,0 +1,12 @@ +--- +name: recon_profile +description: 'Recon profile (bash profile) for bugbounty ' +url: https://github.com/nahamsec/recon_profile +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/reconftw.yaml b/weapons/reconftw.yaml new file mode 100644 index 0000000..3cced26 --- /dev/null +++ b/weapons/reconftw.yaml @@ -0,0 +1,13 @@ +--- +name: reconftw +description: reconFTW is a tool designed to perform automated recon on a target domain + by running the best set of tools to perform scanning and finding out vulnerabilities +url: https://github.com/six2dez/reconftw +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/reflect.yaml b/weapons/reflect.yaml new file mode 100644 index 0000000..be422fe --- /dev/null +++ b/weapons/reflect.yaml @@ -0,0 +1,12 @@ +--- +name: reflect +description: +url: https://github.com/cak/reflect +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Kotiln +tags: [] diff --git a/weapons/reflected-parameters.yaml b/weapons/reflected-parameters.yaml new file mode 100644 index 0000000..acb19b8 --- /dev/null +++ b/weapons/reflected-parameters.yaml @@ -0,0 +1,12 @@ +--- +name: reflected-parameters +description: +url: https://github.com/PortSwigger/reflected-parameters +category: tool-addon +type: Recon +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/rengine.yaml b/weapons/rengine.yaml new file mode 100644 index 0000000..cb29244 --- /dev/null +++ b/weapons/rengine.yaml @@ -0,0 +1,14 @@ +--- +name: rengine +description: 'reNgine is an automated reconnaissance framework meant for gathering + information during penetration testing of web applications. reNgine has customizable + scan engines, which can be used to scan the websites, endpoints, and gather information. ' +url: https://github.com/yogeshojha/rengine +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/rusolver.yaml b/weapons/rusolver.yaml new file mode 100644 index 0000000..c86667c --- /dev/null +++ b/weapons/rusolver.yaml @@ -0,0 +1,13 @@ +--- +name: rusolver +description: Fast and accurate DNS resolver. +url: https://github.com/Edu4rdSHL/rusolver +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: +- dns diff --git a/weapons/s3reverse.yaml b/weapons/s3reverse.yaml new file mode 100644 index 0000000..297c74e --- /dev/null +++ b/weapons/s3reverse.yaml @@ -0,0 +1,14 @@ +--- +name: s3reverse +description: 'The format of various s3 buckets is convert in one format. for bugbounty + and security testing. ' +url: https://github.com/hahwul/s3reverse +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: +- s3 diff --git a/weapons/safecopy.yaml b/weapons/safecopy.yaml new file mode 100644 index 0000000..b72319b --- /dev/null +++ b/weapons/safecopy.yaml @@ -0,0 +1,12 @@ +--- +name: safecopy +description: +url: https://github.com/yashrs/safecopy +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/scilla.yaml b/weapons/scilla.yaml new file mode 100644 index 0000000..7df3796 --- /dev/null +++ b/weapons/scilla.yaml @@ -0,0 +1,13 @@ +--- +name: scilla +description: "\U0001F3F4‍☠️ Information Gathering tool \U0001F3F4‍☠️ dns/subdomain/port + enumeration" +url: https://github.com/edoardottt/scilla +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/security-crawl-maze.yaml b/weapons/security-crawl-maze.yaml new file mode 100644 index 0000000..e5507fb --- /dev/null +++ b/weapons/security-crawl-maze.yaml @@ -0,0 +1,14 @@ +--- +name: security-crawl-maze +description: Security Crawl Maze is a comprehensive testbed for web security crawlers. + It contains pages representing many ways in which one can link resources from a + valid HTML document. +url: https://github.com/google/security-crawl-maze +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: HTML +tags: [] diff --git a/weapons/security-research-pocs.yaml b/weapons/security-research-pocs.yaml new file mode 100644 index 0000000..0562407 --- /dev/null +++ b/weapons/security-research-pocs.yaml @@ -0,0 +1,13 @@ +--- +name: security-research-pocs +description: Proof-of-concept codes created as part of security research done by Google + Security Team. +url: https://github.com/google/security-research-pocs +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: C++ +tags: [] diff --git a/weapons/shuffledns.yaml b/weapons/shuffledns.yaml new file mode 100644 index 0000000..6579e6c --- /dev/null +++ b/weapons/shuffledns.yaml @@ -0,0 +1,14 @@ +--- +name: shuffledns +description: 'shuffleDNS is a wrapper around massdns written in go that allows you + to enumerate valid subdomains using active bruteforce as well as resolve subdomains + with wildcard handling and easy input-output support. ' +url: https://github.com/projectdiscovery/shuffledns +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/singularity.yaml b/weapons/singularity.yaml new file mode 100644 index 0000000..5703534 --- /dev/null +++ b/weapons/singularity.yaml @@ -0,0 +1,12 @@ +--- +name: singularity +description: A DNS rebinding attack framework. +url: https://github.com/nccgroup/singularity +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/slackcat.yaml b/weapons/slackcat.yaml new file mode 100644 index 0000000..7daa8b5 --- /dev/null +++ b/weapons/slackcat.yaml @@ -0,0 +1,12 @@ +--- +name: slackcat +description: CLI utility to post files and command output to slack +url: https://github.com/bcicen/slackcat +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/smuggler.yaml b/weapons/smuggler.yaml new file mode 100644 index 0000000..5146405 --- /dev/null +++ b/weapons/smuggler.yaml @@ -0,0 +1,13 @@ +--- +name: smuggler +description: 'Smuggler - An HTTP Request Smuggling / Desync testing tool written in + Python 3 ' +url: https://github.com/defparam/smuggler +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/sn0int.yaml b/weapons/sn0int.yaml new file mode 100644 index 0000000..ca7b5f9 --- /dev/null +++ b/weapons/sn0int.yaml @@ -0,0 +1,12 @@ +--- +name: sn0int +description: Semi-automatic OSINT framework and package manager +url: https://github.com/kpcyrd/sn0int +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/spiderfoot.yaml b/weapons/spiderfoot.yaml new file mode 100644 index 0000000..331ac1a --- /dev/null +++ b/weapons/spiderfoot.yaml @@ -0,0 +1,12 @@ +--- +name: spiderfoot +description: SpiderFoot automates OSINT collection so that you can focus on analysis. +url: https://github.com/smicallef/spiderfoot +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/sqliv.yaml b/weapons/sqliv.yaml new file mode 100644 index 0000000..96669f9 --- /dev/null +++ b/weapons/sqliv.yaml @@ -0,0 +1,13 @@ +--- +name: sqliv +description: massive SQL injection vulnerability scanner +url: https://github.com/the-robot/sqliv +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- sqli diff --git a/weapons/sqlmap.yaml b/weapons/sqlmap.yaml new file mode 100644 index 0000000..b2d813c --- /dev/null +++ b/weapons/sqlmap.yaml @@ -0,0 +1,12 @@ +--- +name: sqlmap +description: Automatic SQL injection and database takeover tool +url: https://github.com/sqlmapproject/sqlmap +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/ssrf-sheriff.yaml b/weapons/ssrf-sheriff.yaml new file mode 100644 index 0000000..f0c3d4c --- /dev/null +++ b/weapons/ssrf-sheriff.yaml @@ -0,0 +1,12 @@ +--- +name: ssrf-sheriff +description: 'A simple SSRF-testing sheriff written in Go ' +url: https://github.com/teknogeek/ssrf-sheriff +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/subfinder.yaml b/weapons/subfinder.yaml new file mode 100644 index 0000000..ad98aba --- /dev/null +++ b/weapons/subfinder.yaml @@ -0,0 +1,15 @@ +--- +name: subfinder +description: 'Subfinder is a subdomain discovery tool that discovers valid subdomains + for websites. Designed as a passive framework to be useful for bug bounties and + safe for penetration testing. ' +url: https://github.com/projectdiscovery/subfinder +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/subgen.yaml b/weapons/subgen.yaml new file mode 100644 index 0000000..d3ef404 --- /dev/null +++ b/weapons/subgen.yaml @@ -0,0 +1,14 @@ +--- +name: subgen +description: A really simple utility to concate wordlists to a domain name - to pipe + into your favourite resolver! +url: https://github.com/pry0cc/subgen +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/subjack.yaml b/weapons/subjack.yaml new file mode 100644 index 0000000..e963899 --- /dev/null +++ b/weapons/subjack.yaml @@ -0,0 +1,13 @@ +--- +name: subjack +description: 'Subdomain Takeover tool written in Go ' +url: https://github.com/haccer/subjack +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/subjs.yaml b/weapons/subjs.yaml new file mode 100644 index 0000000..9b15bca --- /dev/null +++ b/weapons/subjs.yaml @@ -0,0 +1,12 @@ +--- +name: subjs +description: Fetches javascript file from a list of URLS or subdomains. +url: https://github.com/lc/subjs +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/subs_all.yaml b/weapons/subs_all.yaml new file mode 100644 index 0000000..97abd17 --- /dev/null +++ b/weapons/subs_all.yaml @@ -0,0 +1,13 @@ +--- +name: subs_all +description: 'Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ' +url: https://github.com/emadshanab/subs_all +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: 'null' +tags: +- subdomains diff --git a/weapons/subzy.yaml b/weapons/subzy.yaml new file mode 100644 index 0000000..4599a77 --- /dev/null +++ b/weapons/subzy.yaml @@ -0,0 +1,13 @@ +--- +name: subzy +description: Subdomain takeover vulnerability checker +url: https://github.com/LukaSikic/subzy +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- subdomains diff --git a/weapons/taborator.yaml b/weapons/taborator.yaml new file mode 100644 index 0000000..c24ad65 --- /dev/null +++ b/weapons/taborator.yaml @@ -0,0 +1,13 @@ +--- +name: taborator +description: +url: https://github.com/hackvertor/taborator +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: +- oast diff --git a/weapons/template-generator.yaml b/weapons/template-generator.yaml new file mode 100644 index 0000000..0b53cf2 --- /dev/null +++ b/weapons/template-generator.yaml @@ -0,0 +1,15 @@ +--- +name: template-generator +description: 'A simple variable based template editor using handlebarjs+strapdownjs. + The idea is to use variables in markdown based files to easily replace the variables + with content. Data is saved temporarily in local storage. PHP is only needed to + generate the list of files in the dropdown of templates. ' +url: https://github.com/fransr/template-generator +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/testssl.sh.yaml b/weapons/testssl.sh.yaml new file mode 100644 index 0000000..d754364 --- /dev/null +++ b/weapons/testssl.sh.yaml @@ -0,0 +1,12 @@ +--- +name: testssl.sh +description: 'Testing TLS/SSL encryption anywhere on any port ' +url: https://github.com/drwetter/testssl.sh +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/thc-hydra.yaml b/weapons/thc-hydra.yaml new file mode 100644 index 0000000..2d8e54a --- /dev/null +++ b/weapons/thc-hydra.yaml @@ -0,0 +1,12 @@ +--- +name: thc-hydra +description: 'hydra ' +url: https://github.com/vanhauser-thc/thc-hydra +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: C +tags: [] diff --git a/weapons/tiscripts.yaml b/weapons/tiscripts.yaml new file mode 100644 index 0000000..026fe32 --- /dev/null +++ b/weapons/tiscripts.yaml @@ -0,0 +1,12 @@ +--- +name: tiscripts +description: Turbo Intruder Scripts +url: https://github.com/defparam/tiscripts +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/tplmap.yaml b/weapons/tplmap.yaml new file mode 100644 index 0000000..fa4ee84 --- /dev/null +++ b/weapons/tplmap.yaml @@ -0,0 +1,13 @@ +--- +name: tplmap +description: Server-Side Template Injection and Code Injection Detection and Exploitation + Tool +url: https://github.com/epinna/tplmap +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/turbo-intruder.yaml b/weapons/turbo-intruder.yaml new file mode 100644 index 0000000..01afe40 --- /dev/null +++ b/weapons/turbo-intruder.yaml @@ -0,0 +1,12 @@ +--- +name: turbo-intruder +description: +url: https://github.com/PortSwigger/turbo-intruder +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Kotlin +tags: [] diff --git a/weapons/uncover.yaml b/weapons/uncover.yaml new file mode 100644 index 0000000..ca36ecb --- /dev/null +++ b/weapons/uncover.yaml @@ -0,0 +1,13 @@ +--- +name: uncover +description: Quickly discover exposed hosts on the internet using multiple search + engine. +url: https://github.com/projectdiscovery/uncover +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/unfurl.yaml b/weapons/unfurl.yaml new file mode 100644 index 0000000..0898284 --- /dev/null +++ b/weapons/unfurl.yaml @@ -0,0 +1,12 @@ +--- +name: unfurl +description: 'Pull out bits of URLs provided on stdin ' +url: https://github.com/tomnomnom/unfurl +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/urlgrab.yaml b/weapons/urlgrab.yaml new file mode 100644 index 0000000..7117eda --- /dev/null +++ b/weapons/urlgrab.yaml @@ -0,0 +1,13 @@ +--- +name: urlgrab +description: 'A golang utility to spider through a website searching for additional + links. ' +url: https://github.com/IAmStoxe/urlgrab +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/urlhunter.yaml b/weapons/urlhunter.yaml new file mode 100644 index 0000000..b91cc0d --- /dev/null +++ b/weapons/urlhunter.yaml @@ -0,0 +1,13 @@ +--- +name: urlhunter +description: a recon tool that allows searching on URLs that are exposed via shortener + services +url: https://github.com/utkusen/urlhunter +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/urlprobe.yaml b/weapons/urlprobe.yaml new file mode 100644 index 0000000..3c55af2 --- /dev/null +++ b/weapons/urlprobe.yaml @@ -0,0 +1,12 @@ +--- +name: urlprobe +description: 'Urls status code & content length checker ' +url: https://github.com/1ndianl33t/urlprobe +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/uro.yaml b/weapons/uro.yaml new file mode 100644 index 0000000..c20b976 --- /dev/null +++ b/weapons/uro.yaml @@ -0,0 +1,12 @@ +--- +name: uro +description: declutters url lists for crawling/pentesting +url: https://github.com/s0md3v/uro +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/waybackurls.yaml b/weapons/waybackurls.yaml new file mode 100644 index 0000000..45e899d --- /dev/null +++ b/weapons/waybackurls.yaml @@ -0,0 +1,12 @@ +--- +name: waybackurls +description: 'Fetch all the URLs that the Wayback Machine knows about for a domain ' +url: https://github.com/tomnomnom/waybackurls +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/weaponised-XSS-payloads.yaml b/weapons/weaponised-XSS-payloads.yaml new file mode 100644 index 0000000..de563b3 --- /dev/null +++ b/weapons/weaponised-XSS-payloads.yaml @@ -0,0 +1,12 @@ +--- +name: weaponised-XSS-payloads +description: XSS payloads designed to turn alert(1) into P1 +url: https://github.com/hakluke/weaponised-XSS-payloads +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/web_cache_poison.yaml b/weapons/web_cache_poison.yaml new file mode 100644 index 0000000..d26e98c --- /dev/null +++ b/weapons/web_cache_poison.yaml @@ -0,0 +1,12 @@ +--- +name: web_cache_poison +description: web cache poison - Top 1 web hacking technique of 2019 +url: https://github.com/fngoo/web_cache_poison +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Shell +tags: [] diff --git a/weapons/websocket-connection-smuggler.yaml b/weapons/websocket-connection-smuggler.yaml new file mode 100644 index 0000000..04f973a --- /dev/null +++ b/weapons/websocket-connection-smuggler.yaml @@ -0,0 +1,12 @@ +--- +name: websocket-connection-smuggler +description: websocket-connection-smuggler +url: https://github.com/hahwul/websocket-connection-smuggler +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/wfuzz.yaml b/weapons/wfuzz.yaml new file mode 100644 index 0000000..2cc9d95 --- /dev/null +++ b/weapons/wfuzz.yaml @@ -0,0 +1,12 @@ +--- +name: wfuzz +description: 'Web application fuzzer ' +url: https://github.com/xmendez/wfuzz +category: tool +type: Fuzzer +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/wprecon.yaml b/weapons/wprecon.yaml new file mode 100644 index 0000000..a2ab933 --- /dev/null +++ b/weapons/wprecon.yaml @@ -0,0 +1,13 @@ +--- +name: wprecon +description: Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition + tool in CMS Wordpress, 100% developed in Go. +url: https://github.com/blackcrw/wprecon +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/wpscan.yaml b/weapons/wpscan.yaml new file mode 100644 index 0000000..4e0268b --- /dev/null +++ b/weapons/wpscan.yaml @@ -0,0 +1,14 @@ +--- +name: wpscan +description: 'WPScan is a free, for non-commercial use, black box WordPress Vulnerability + Scanner written for security professionals and blog maintainers to test the security + of their WordPress websites. ' +url: https://github.com/wpscanteam/wpscan +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Ruby +tags: [] diff --git a/weapons/ws-smuggler.yaml b/weapons/ws-smuggler.yaml new file mode 100644 index 0000000..dca06dc --- /dev/null +++ b/weapons/ws-smuggler.yaml @@ -0,0 +1,12 @@ +--- +name: ws-smuggler +description: WebSocket Connection Smuggler +url: https://github.com/hahwul/ws-smuggler +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/wssip.yaml b/weapons/wssip.yaml new file mode 100644 index 0000000..f6f190a --- /dev/null +++ b/weapons/wssip.yaml @@ -0,0 +1,13 @@ +--- +name: wssip +description: Application for capturing, modifying and sending custom WebSocket data + from client to server and vice versa. +url: https://github.com/nccgroup/wssip +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/wuzz.yaml b/weapons/wuzz.yaml new file mode 100644 index 0000000..907dad6 --- /dev/null +++ b/weapons/wuzz.yaml @@ -0,0 +1,12 @@ +--- +name: wuzz +description: 'Interactive cli tool for HTTP inspection ' +url: https://github.com/asciimoo/wuzz +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/x8.yaml b/weapons/x8.yaml new file mode 100644 index 0000000..2cf591d --- /dev/null +++ b/weapons/x8.yaml @@ -0,0 +1,12 @@ +--- +name: x8 +description: Hidden parameters discovery suite +url: https://github.com/Sh1Yo/x8 +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Rust +tags: [] diff --git a/weapons/xsinator.com.yaml b/weapons/xsinator.com.yaml new file mode 100644 index 0000000..3960af9 --- /dev/null +++ b/weapons/xsinator.com.yaml @@ -0,0 +1,12 @@ +--- +name: xsinator.com +description: XS-Leak Browser Test Suite +url: https://github.com/RUB-NDS/xsinator.com +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: JavaScript +tags: [] diff --git a/weapons/xss-cheatsheet-data.yaml b/weapons/xss-cheatsheet-data.yaml new file mode 100644 index 0000000..b8764e4 --- /dev/null +++ b/weapons/xss-cheatsheet-data.yaml @@ -0,0 +1,14 @@ +--- +name: xss-cheatsheet-data +description: 'This repository contains all the XSS cheatsheet data to allow contributions + from the community. ' +url: https://github.com/PortSwigger/xss-cheatsheet-data +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: 'null' +tags: +- xss diff --git a/weapons/xsscrapy.yaml b/weapons/xsscrapy.yaml new file mode 100644 index 0000000..1b1dbd3 --- /dev/null +++ b/weapons/xsscrapy.yaml @@ -0,0 +1,14 @@ +--- +name: xsscrapy +description: 'XSS/SQLi spider. Give it a URL and it''ll test every link it finds for + XSS and some SQLi. ' +url: https://github.com/DanMcInerney/xsscrapy +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- xss diff --git a/weapons/xsser.yaml b/weapons/xsser.yaml new file mode 100644 index 0000000..d6b484d --- /dev/null +++ b/weapons/xsser.yaml @@ -0,0 +1,14 @@ +--- +name: xsser +description: 'Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, + exploit and report XSS vulnerabilities in web-based applications. ' +url: https://github.com/epsylon/xsser +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: +- xss diff --git a/weapons/xssor2.yaml b/weapons/xssor2.yaml new file mode 100644 index 0000000..cab0da3 --- /dev/null +++ b/weapons/xssor2.yaml @@ -0,0 +1,13 @@ +--- +name: xssor2 +description: XSS'OR - Hack with JavaScript. +url: https://github.com/evilcos/xssor2 +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: JavaScript +tags: +- xss diff --git a/weapons/xxeserv.yaml b/weapons/xxeserv.yaml new file mode 100644 index 0000000..0ae0ca3 --- /dev/null +++ b/weapons/xxeserv.yaml @@ -0,0 +1,12 @@ +--- +name: xxeserv +description: A mini webserver with FTP support for XXE payloads +url: https://github.com/staaldraad/xxeserv +category: tool +type: Exploit +platform: +- linux +- macos +- windows +lang: Go +tags: [] diff --git a/weapons/ysoserial.net.yaml b/weapons/ysoserial.net.yaml new file mode 100644 index 0000000..93bbc17 --- /dev/null +++ b/weapons/ysoserial.net.yaml @@ -0,0 +1,12 @@ +--- +name: ysoserial.net +description: 'Deserialization payload generator for a variety of .NET formatters ' +url: https://github.com/pwntester/ysoserial.net +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: C# +tags: [] diff --git a/weapons/ysoserial.yaml b/weapons/ysoserial.yaml new file mode 100644 index 0000000..8ec4571 --- /dev/null +++ b/weapons/ysoserial.yaml @@ -0,0 +1,13 @@ +--- +name: ysoserial +description: 'A proof-of-concept tool for generating payloads that exploit unsafe + Java object deserialization. ' +url: https://github.com/frohoff/ysoserial +category: tool +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/zap-cli.yaml b/weapons/zap-cli.yaml new file mode 100644 index 0000000..bd4a077 --- /dev/null +++ b/weapons/zap-cli.yaml @@ -0,0 +1,12 @@ +--- +name: zap-cli +description: 'A simple tool for interacting with OWASP ZAP from the commandline. ' +url: https://github.com/Grunny/zap-cli +category: tool +type: Scanner +platform: +- linux +- macos +- windows +lang: Python +tags: [] diff --git a/weapons/zap-hud.yaml b/weapons/zap-hud.yaml new file mode 100644 index 0000000..7201287 --- /dev/null +++ b/weapons/zap-hud.yaml @@ -0,0 +1,12 @@ +--- +name: zap-hud +description: +url: https://github.com/zaproxy/zap-hud +category: tool-addon +type: Utils +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/zaproxy.yaml b/weapons/zaproxy.yaml new file mode 100644 index 0000000..5f84643 --- /dev/null +++ b/weapons/zaproxy.yaml @@ -0,0 +1,12 @@ +--- +name: zaproxy +description: The OWASP ZAP core project +url: https://github.com/zaproxy/zaproxy +category: tool +type: Army-Knife +platform: +- linux +- macos +- windows +lang: Java +tags: [] diff --git a/weapons/zdns.yaml b/weapons/zdns.yaml new file mode 100644 index 0000000..63665d9 --- /dev/null +++ b/weapons/zdns.yaml @@ -0,0 +1,13 @@ +--- +name: zdns +description: Fast CLI DNS Lookup Tool +url: https://github.com/zmap/zdns +category: tool +type: Recon +platform: +- linux +- macos +- windows +lang: Go +tags: +- dns