From f68b6ef12da95f13b7c46ee947a040a8afe47d2f Mon Sep 17 00:00:00 2001 From: WHW Date: Fri, 19 Aug 2022 14:33:18 +0000 Subject: [PATCH 01/26] Deploy README.md --- README.md | 22 +++++++++++----------- scripts/last_change | 2 +- 2 files changed, 12 insertions(+), 12 deletions(-) diff --git a/README.md b/README.md index 1eec5ae..9b3b8ab 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun ### Tools | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | -|Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| @@ -310,21 +310,21 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| -|Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| -|Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)| +|Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/javascript.png)| +|Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| -|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotlin.png)| -|Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| +|Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/blitzbasic.png)| +|Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/blitzbasic.png)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotlin.png)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| @@ -334,13 +334,13 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||![](https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/blitzbasic.png)| |Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/kotiln.png)| -|Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| ## Thanks to (Contributor) I would like to thank everyone who helped with this project 👍😎 diff --git a/scripts/last_change b/scripts/last_change index 0686e16..ee9b7dc 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Fri Aug 19 14:28:39 UTC 2022 +Fri Aug 19 14:33:18 UTC 2022 From bcc89f81627de7ec8bedcfeb459326572d377f39 Mon Sep 17 00:00:00 2001 From: WHW Date: Fri, 19 Aug 2022 14:39:56 +0000 Subject: [PATCH 02/26] Deploy README.md --- README.md | 36 ++++++++++++++++++------------------ scripts/last_change | 2 +- 2 files changed, 19 insertions(+), 19 deletions(-) diff --git a/README.md b/README.md index 9b3b8ab..c78fff0 100644 --- a/README.md +++ b/README.md @@ -255,6 +255,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| +|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/blitzbasic.png)| |Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/html.png)| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| @@ -308,37 +309,36 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/python.png)| |Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/javascript.png)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| -|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/java.png)| +|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| -|Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| -|Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| +|Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| |Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| -|Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/blitzbasic.png)| -|Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/kotlin.png)| -|Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| -|Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| +|Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/javascript.png)| +|Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| |utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||![](https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| -|Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| -|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/blitzbasic.png)| -|Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| +|Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/kotiln.png)| |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| diff --git a/scripts/last_change b/scripts/last_change index ee9b7dc..aec8254 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Fri Aug 19 14:33:18 UTC 2022 +Fri Aug 19 14:39:56 UTC 2022 From 7eff29070ca5d07833a95b9c51fa019c38bb1318 Mon Sep 17 00:00:00 2001 From: WHW Date: Fri, 19 Aug 2022 14:51:27 +0000 Subject: [PATCH 03/26] Deploy README.md --- README.md | 4 ++-- scripts/last_change | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index c78fff0..13b2644 100644 --- a/README.md +++ b/README.md @@ -29,7 +29,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |-------|---------------------------------------------------| | Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| | Tags | `infra` `param` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | -| Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Ruby` `Perl` `Kotlin` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | +| Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | ### Tools | Type | Name | Description | Star | Tags | Badges | @@ -310,7 +310,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | --- | --- | --- | --- | --- | --- | |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| -|Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/python.png)| +|Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes|![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/kotlin.png)| |Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/javascript.png)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| diff --git a/scripts/last_change b/scripts/last_change index aec8254..433952e 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Fri Aug 19 14:39:56 UTC 2022 +Fri Aug 19 14:51:27 UTC 2022 From 0ea5a4bc656a52244b6c9cbef389d64f740dd629 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Fri, 19 Aug 2022 14:52:19 +0000 Subject: [PATCH 04/26] chore: update contributors [skip ci] --- images/CONTRIBUTORS.svg | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/images/CONTRIBUTORS.svg b/images/CONTRIBUTORS.svg index fb70fb3..cd2d6f6 100644 --- a/images/CONTRIBUTORS.svg +++ b/images/CONTRIBUTORS.svg @@ -6,31 +6,34 @@ + + + - + - + - + - + - + - + - + - + - + \ No newline at end of file From 589b983c54b919fd2ebbb48e4f8d68472c2ed780 Mon Sep 17 00:00:00 2001 From: WHW Date: Fri, 19 Aug 2022 14:57:00 +0000 Subject: [PATCH 05/26] Deploy README.md --- README.md | 5 +++-- scripts/last_change | 2 +- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 13b2644..1b1a039 100644 --- a/README.md +++ b/README.md @@ -343,6 +343,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| ## Thanks to (Contributor) -I would like to thank everyone who helped with this project 👍😎 -![](/images/CONTRIBUTORS.svg) +WHW's open-source project and made it with ❤️ if you want contribute this project, please see [CONTRIBUTING.md](https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md) and Pull-Request with cool your contents. + +[![](/images/CONTRIBUTORS.svg)](https://github.com/hahwul/WebHackersWeapons/graphs/contributors) diff --git a/scripts/last_change b/scripts/last_change index 433952e..31cad03 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Fri Aug 19 14:51:27 UTC 2022 +Fri Aug 19 14:56:59 UTC 2022 From f4387dea834d817fcca044866f1f64fab7016b2a Mon Sep 17 00:00:00 2001 From: WHW Date: Sun, 21 Aug 2022 03:45:41 +0000 Subject: [PATCH 06/26] Deploy README.md --- README.md | 24 ++++++++++++------------ scripts/last_change | 2 +- 2 files changed, 13 insertions(+), 13 deletions(-) diff --git a/README.md b/README.md index 1b1a039..379bdfa 100644 --- a/README.md +++ b/README.md @@ -28,19 +28,19 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| -| Tags | `infra` `param` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | +| Tags | `proxy` `infra` `live-audit` `param` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | | Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | ### Tools | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | -|Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project||`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| -|Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| +|Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|`live-audit`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| @@ -291,16 +291,16 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun ### Browser Addons | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | -|Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![safari](./images/safari.png)| |Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![safari](./images/safari.png)| |Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/typescript.png)| |Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| -|Utils|[User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae)|quick and easy way to switch between user-agents.|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| -|Utils|[Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh)|Dark mode to any site|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![firefox](./images/firefox.png)![chrome](./images/chrome.png)| +|Utils|[User-Agent Switcher](https://addons.mozilla.org/ko/firefox/addon/user-agent-switcher-revived/)|quick and easy way to switch between user-agents.|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![firefox](./images/firefox.png)| +|Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site|![](https://img.shields.io/github/stars/darkreader/darkreader?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![firefox](./images/firefox.png)![chrome](./images/chrome.png)![](./images/typescript.png)| |Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| diff --git a/scripts/last_change b/scripts/last_change index 31cad03..e062598 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Fri Aug 19 14:56:59 UTC 2022 +Sun Aug 21 03:45:41 UTC 2022 From 701b25075c90cbffa8cfd45dc61835b148667a30 Mon Sep 17 00:00:00 2001 From: WHW Date: Sun, 21 Aug 2022 03:52:16 +0000 Subject: [PATCH 07/26] Deploy README.md --- README.md | 21 +++++++++++---------- scripts/last_change | 2 +- 2 files changed, 12 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 379bdfa..3111d32 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@
- + A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting @@ -28,7 +28,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| -| Tags | `proxy` `infra` `live-audit` `param` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | +| Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | | Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | ### Tools @@ -150,7 +150,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -179,7 +179,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| -|Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| |Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|`ssl`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| @@ -188,7 +188,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|`403`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| @@ -205,7 +205,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| |Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Exploit|[SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja)|SQL Injection scanner|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -308,17 +308,18 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun ### Burpsuite and ZAP Addons | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | -|Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|`endpoint`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| +|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|`endpoint`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes|![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/kotlin.png)| |Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/javascript.png)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/java.png)| -|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| -|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)|`smuggle`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| diff --git a/scripts/last_change b/scripts/last_change index e062598..6aaf88c 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Sun Aug 21 03:45:41 UTC 2022 +Sun Aug 21 03:52:16 UTC 2022 From c24d33304f6af75d2dae3cfb8f1b24ab6384b6df Mon Sep 17 00:00:00 2001 From: WHW Date: Tue, 23 Aug 2022 15:30:02 +0000 Subject: [PATCH 08/26] Deploy README.md --- README.md | 1 + scripts/last_change | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 3111d32..cd28ad1 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| +|Recon|[xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder)|A python tool used to discover endpoints (and potential parameters) for a given target|![](https://img.shields.io/github/stars/xnl-h4ck3r/xnLinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| diff --git a/scripts/last_change b/scripts/last_change index 6aaf88c..cdc58c3 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Sun Aug 21 03:52:16 UTC 2022 +Tue Aug 23 15:30:02 UTC 2022 From 0624c02e5afd55b94bc7508a3bec57ed6a7fe4fa Mon Sep 17 00:00:00 2001 From: WHW Date: Thu, 25 Aug 2022 13:44:24 +0000 Subject: [PATCH 09/26] Deploy README.md --- README.md | 8 +++++++- scripts/last_change | 2 +- 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index cd28ad1..00d7861 100644 --- a/README.md +++ b/README.md @@ -328,13 +328,15 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/blitzbasic.png)| +|Utils|[HTTPSignatures](https://github.com/nccgroup/HTTPSignatures)|A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.|![](https://img.shields.io/github/stars/nccgroup/HTTPSignatures?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[pcap-burp](https://github.com/nccgroup/pcap-burp)|Pcap importer for Burp|![](https://img.shields.io/github/stars/nccgroup/pcap-burp?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/javascript.png)| -|Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)| +|Utils|[blackboxprotobuf](https://github.com/nccgroup/blackboxprotobuf)|Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.|![](https://img.shields.io/github/stars/nccgroup/blackboxprotobuf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||![](https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| @@ -342,7 +344,11 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| |Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/kotiln.png)| +|Utils|[argumentinjectionhammer](https://github.com/nccgroup/argumentinjectionhammer)|A Burp Extension designed to identify argument injection vulnerabilities.|![](https://img.shields.io/github/stars/nccgroup/argumentinjectionhammer?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/python.png)| +|Utils|[Berserko](https://github.com/nccgroup/Berserko)|Burp Suite extension to perform Kerberos authentication|![](https://img.shields.io/github/stars/nccgroup/Berserko?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[Decoder-Improved](https://github.com/nccgroup/Decoder-Improved)|Improved decoder for Burp Suite|![](https://img.shields.io/github/stars/nccgroup/Decoder-Improved?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| +|Utils|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)|Automated HTTP Request Repeating With Burp Suite|![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| ## Thanks to (Contributor) WHW's open-source project and made it with ❤️ if you want contribute this project, please see [CONTRIBUTING.md](https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md) and Pull-Request with cool your contents. diff --git a/scripts/last_change b/scripts/last_change index cdc58c3..45dbb74 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Tue Aug 23 15:30:02 UTC 2022 +Thu Aug 25 13:44:24 UTC 2022 From b8a859165696311fcb672869b90275624d8c12f1 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 29 Aug 2022 15:39:01 +0000 Subject: [PATCH 10/26] Deploy README.md --- README.md | 3 ++- scripts/last_change | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 00d7861..92ca477 100644 --- a/README.md +++ b/README.md @@ -97,7 +97,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| -|Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -243,6 +243,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|`report`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| |Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker|![](https://img.shields.io/github/stars/khast3x/Redcloud?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| diff --git a/scripts/last_change b/scripts/last_change index 45dbb74..5dbbfac 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Thu Aug 25 13:44:24 UTC 2022 +Mon Aug 29 15:39:01 UTC 2022 From 767db4cdfac2a0807aea2322e433ba81339bc983 Mon Sep 17 00:00:00 2001 From: WHW Date: Tue, 30 Aug 2022 15:45:20 +0000 Subject: [PATCH 11/26] Deploy README.md --- README.md | 8 ++++++-- scripts/last_change | 2 +- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 92ca477..81d7681 100644 --- a/README.md +++ b/README.md @@ -28,7 +28,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| -| Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `xxe` `url` `oast` `report` `wordlist` | +| Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `rop` `xxe` `url` `oast` `report` `wordlist` | | Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | ### Tools @@ -37,7 +37,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project||`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| +|Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|`live-audit`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -49,6 +49,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[Smap](https://github.com/s0md3v/smap/)|a drop-in replacement for Nmap powered by shodan.io|![](https://img.shields.io/github/stars/s0md3v/smap/?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -210,10 +211,13 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Exploit|[SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja)|SQL Injection scanner|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Exploit|[ropr](https://github.com/Ben-Lichtman/ropr)|A blazing fast™ multithreaded ROP Gadget finder. ropper|![](https://img.shields.io/github/stars/Ben-Lichtman/ropr?label=%20)|`rop`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|`xxe`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| +|Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.|![](https://img.shields.io/github/stars/t3l3machus/toxssin?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)| SQL Injection scanner|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| |Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project|![](https://img.shields.io/github/stars/beefproject/beef?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| |Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|`url`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| diff --git a/scripts/last_change b/scripts/last_change index 5dbbfac..d85ac68 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Aug 29 15:39:01 UTC 2022 +Tue Aug 30 15:45:20 UTC 2022 From b13acc3a6d4da7cbfd3734ccdf6d20cc98af7c8d Mon Sep 17 00:00:00 2001 From: WHW Date: Wed, 31 Aug 2022 04:56:14 +0000 Subject: [PATCH 12/26] Deploy README.md --- README.md | 1 + scripts/last_change | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 81d7681..9e5f323 100644 --- a/README.md +++ b/README.md @@ -234,6 +234,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[godeclutter](https://github.com/c3l3si4n/godeclutter)|Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.|![](https://img.shields.io/github/stars/c3l3si4n/godeclutter?label=%20)|`url`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[Phoenix](https://www.hahwul.com/p/phoenix.html)| hahwul's online tools|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| diff --git a/scripts/last_change b/scripts/last_change index d85ac68..5549b47 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Tue Aug 30 15:45:20 UTC 2022 +Wed Aug 31 04:56:14 UTC 2022 From 76e4080ce3726e04fa76a00842719d53d0d251a6 Mon Sep 17 00:00:00 2001 From: WHW Date: Wed, 31 Aug 2022 13:24:55 +0000 Subject: [PATCH 13/26] Deploy README.md --- README.md | 1 + scripts/last_change | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 9e5f323..27d0f0b 100644 --- a/README.md +++ b/README.md @@ -110,6 +110,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|![](https://img.shields.io/github/stars/EasyRecon/Hunt3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)| |Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| diff --git a/scripts/last_change b/scripts/last_change index 5549b47..a23d3cd 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Wed Aug 31 04:56:14 UTC 2022 +Wed Aug 31 13:24:55 UTC 2022 From bf34fbc2bc064f6a7bc8c38aea35dea6f21f21be Mon Sep 17 00:00:00 2001 From: WHW Date: Thu, 1 Sep 2022 14:17:46 +0000 Subject: [PATCH 14/26] Deploy README.md --- README.md | 1 + scripts/last_change | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 27d0f0b..a350886 100644 --- a/README.md +++ b/README.md @@ -339,6 +339,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[pcap-burp](https://github.com/nccgroup/pcap-burp)|Pcap importer for Burp|![](https://img.shields.io/github/stars/nccgroup/pcap-burp?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/kotlin.png)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/javascript.png)| +|Utils|[AWSSigner](https://github.com/NetSPI/AWSSigner)|Burp Extension for AWS Signing|![](https://img.shields.io/github/stars/NetSPI/AWSSigner?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![burp](./images/burp.png)![](./images/java.png)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| diff --git a/scripts/last_change b/scripts/last_change index a23d3cd..3eed7cd 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Wed Aug 31 13:24:55 UTC 2022 +Thu Sep 1 14:17:46 UTC 2022 From 6ffdc41403ae06cbd3c58f7b1ecfc02aaabb0907 Mon Sep 17 00:00:00 2001 From: Dyrandy <53304159+Dyrandy@users.noreply.github.com> Date: Mon, 5 Sep 2022 23:54:31 +0900 Subject: [PATCH 15/26] Create EchoMirage.md --- weapons/EchoMirage.md | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 weapons/EchoMirage.md diff --git a/weapons/EchoMirage.md b/weapons/EchoMirage.md new file mode 100644 index 0000000..1e193e5 --- /dev/null +++ b/weapons/EchoMirage.md @@ -0,0 +1,10 @@ +--- +name: Echo Mirage +description: A generic network proxy that uses DLL injection to capture and alter TCP traffic. +url: https://sourceforge.net/projects/echomirage.oldbutgold.p/ +category: tool +type: Proxy +platform: +- windows +lang: +tags: [] From d77a5e8e80d1401a1446f00a5f63e1687400fefd Mon Sep 17 00:00:00 2001 From: hahwul Date: Tue, 6 Sep 2022 07:07:30 +0900 Subject: [PATCH 16/26] Update weapons (New type: Proxy) Signed-off-by: hahwul --- weapons/hetty.yaml | 3 +-- weapons/proxify.yaml | 3 +-- weapons/wuzz.yaml | 3 +-- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/weapons/hetty.yaml b/weapons/hetty.yaml index ebc75a4..12cddc6 100644 --- a/weapons/hetty.yaml +++ b/weapons/hetty.yaml @@ -5,11 +5,10 @@ description: Hetty is an HTTP toolkit for security research. It aims to become a features tailored to the needs of the infosec and bug bounty community. url: https://github.com/dstotijn/hetty category: tool -type: Army-Knife +type: Proxy platform: - linux - macos - windows lang: Go tags: -- proxy \ No newline at end of file diff --git a/weapons/proxify.yaml b/weapons/proxify.yaml index 0f71ffa..279e6b1 100644 --- a/weapons/proxify.yaml +++ b/weapons/proxify.yaml @@ -4,11 +4,10 @@ description: Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipul and replay url: https://github.com/projectdiscovery/proxify category: tool -type: Army-Knife +type: Proxy platform: - linux - macos - windows lang: Go tags: -- proxy \ No newline at end of file diff --git a/weapons/wuzz.yaml b/weapons/wuzz.yaml index b898821..7b81628 100644 --- a/weapons/wuzz.yaml +++ b/weapons/wuzz.yaml @@ -3,11 +3,10 @@ name: wuzz description: 'Interactive cli tool for HTTP inspection ' url: https://github.com/asciimoo/wuzz category: tool -type: Army-Knife +type: Proxy platform: - linux - macos - windows lang: Go tags: -- proxy \ No newline at end of file From 0e378fd8136680c302ec84a02ad1c33c68b35930 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:15:27 +0000 Subject: [PATCH 17/26] Deploy README.md --- README.md | 3 --- scripts/last_change | 2 +- 2 files changed, 1 insertion(+), 4 deletions(-) diff --git a/README.md b/README.md index a350886..43109a3 100644 --- a/README.md +++ b/README.md @@ -36,10 +36,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | --- | --- | --- | --- | --- | --- | |Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project||`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/java.png)| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| -|Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| -|Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|`live-audit`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| diff --git a/scripts/last_change b/scripts/last_change index 3eed7cd..d618e92 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Thu Sep 1 14:17:46 UTC 2022 +Mon Sep 5 22:15:27 UTC 2022 From 2c3d55bd3335356130ed57e64e8b845d99efc31b Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Mon, 5 Sep 2022 22:15:28 +0000 Subject: [PATCH 18/26] chore: update contributors [skip ci] --- images/CONTRIBUTORS.svg | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/images/CONTRIBUTORS.svg b/images/CONTRIBUTORS.svg index cd2d6f6..688d955 100644 --- a/images/CONTRIBUTORS.svg +++ b/images/CONTRIBUTORS.svg @@ -18,22 +18,25 @@ + + + - + - + - + - + - + - + \ No newline at end of file From 7d0b471f5b7ddf2ed6231d4c243611f2346bcd85 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:18:33 +0000 Subject: [PATCH 19/26] Deploy README.md --- scripts/last_change | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/last_change b/scripts/last_change index d618e92..e5ad48c 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Sep 5 22:15:27 UTC 2022 +Mon Sep 5 22:18:33 UTC 2022 From 3d354e3fa3335e7abd879fbd921aff0b6e067cd6 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:20:16 +0000 Subject: [PATCH 20/26] Deploy README.md --- scripts/last_change | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/last_change b/scripts/last_change index e5ad48c..8d6110c 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Sep 5 22:18:33 UTC 2022 +Mon Sep 5 22:20:16 UTC 2022 From 6edc8f019f84b06608d5634ae5d71358e767b604 Mon Sep 17 00:00:00 2001 From: hahwul Date: Tue, 6 Sep 2022 07:25:40 +0900 Subject: [PATCH 21/26] Update ERB script Signed-off-by: hahwul --- scripts/erb.rb | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/scripts/erb.rb b/scripts/erb.rb index de3aa64..6bc8533 100644 --- a/scripts/erb.rb +++ b/scripts/erb.rb @@ -129,14 +129,20 @@ weapons.each do | data | begin name = data['name'] temp_tags = [] - data['tags'].each do |t| - temp_tags.push "`#{t}`" + begin + data['tags'].each do |t| + temp_tags.push "`#{t}`" + end + tags.concat temp_tags + rescue end - tags.concat temp_tags lang_badge = "" - if data['lang'].length > 0 && data['lang'] != "null" - langs.push "`#{data['lang']}`" - lang_badge = "![](./images/#{data['lang'].downcase}.png)" + begin + if data['lang'].length > 0 && data['lang'] != "null" + langs.push "`#{data['lang']}`" + lang_badge = "![](./images/#{data['lang'].downcase}.png)" + end + rescue end popularity = "" From 15419e56c98d191df894497a11278eba3f22ad25 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:25:57 +0000 Subject: [PATCH 22/26] Deploy README.md --- README.md | 4 ++++ scripts/last_change | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 43109a3..061d19d 100644 --- a/README.md +++ b/README.md @@ -38,6 +38,10 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|`proxy`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![zap](./images/zap.png)![](./images/java.png)| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|`live-audit`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Proxy|[Echo Mirage](https://sourceforge.net/projects/echomirage.oldbutgold.p/)|A generic network proxy that uses DLL injection to capture and alter TCP traffic.|||![windows](./images/windows.png)| +|Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| +|Proxy|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| diff --git a/scripts/last_change b/scripts/last_change index 8d6110c..599d18e 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Sep 5 22:20:16 UTC 2022 +Mon Sep 5 22:25:57 UTC 2022 From 2ba7a3f9b8be9e0afb572ab6a41ef4861c1eed44 Mon Sep 17 00:00:00 2001 From: hahwul Date: Tue, 6 Sep 2022 07:29:03 +0900 Subject: [PATCH 23/26] Update ERB script (Add Types) Signed-off-by: hahwul --- scripts/erb.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/erb.rb b/scripts/erb.rb index 6bc8533..5d56f10 100644 --- a/scripts/erb.rb +++ b/scripts/erb.rb @@ -63,7 +63,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun *Attributes* | | Attributes | |-------|---------------------------------------------------| -| Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| +| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| | Tags | <%= tags.uniq.join ' ' %> | | Langs | <%= langs.uniq.join ' ' %> | From 8808025a2e07fdd65263eadfde2639d8a2c415ca Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:29:19 +0000 Subject: [PATCH 24/26] Deploy README.md --- README.md | 2 +- scripts/last_change | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 061d19d..f555175 100644 --- a/README.md +++ b/README.md @@ -27,7 +27,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun *Attributes* | | Attributes | |-------|---------------------------------------------------| -| Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| +| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| | Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `rop` `xxe` `url` `oast` `report` `wordlist` | | Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | diff --git a/scripts/last_change b/scripts/last_change index 599d18e..78a2749 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Sep 5 22:25:57 UTC 2022 +Mon Sep 5 22:29:19 UTC 2022 From fe06d2a0f63f0c6f31d2df5e422cfcd3e83dca30 Mon Sep 17 00:00:00 2001 From: hahwul Date: Tue, 6 Sep 2022 07:33:22 +0900 Subject: [PATCH 25/26] Update weapons Signed-off-by: hahwul --- weapons/httpie.yaml | 3 ++- weapons/wuzz.yaml | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/weapons/httpie.yaml b/weapons/httpie.yaml index 1c30cb7..f70ed20 100644 --- a/weapons/httpie.yaml +++ b/weapons/httpie.yaml @@ -11,4 +11,5 @@ platform: - macos - windows lang: Python -tags: [] +tags: +- http diff --git a/weapons/wuzz.yaml b/weapons/wuzz.yaml index 7b81628..a0ac87a 100644 --- a/weapons/wuzz.yaml +++ b/weapons/wuzz.yaml @@ -3,10 +3,11 @@ name: wuzz description: 'Interactive cli tool for HTTP inspection ' url: https://github.com/asciimoo/wuzz category: tool -type: Proxy +type: Utils platform: - linux - macos - windows lang: Go tags: +- http From 4bd46c335b33ca7b6ed937270fca031f79234f95 Mon Sep 17 00:00:00 2001 From: WHW Date: Mon, 5 Sep 2022 22:33:51 +0000 Subject: [PATCH 26/26] Deploy README.md --- README.md | 6 +++--- scripts/last_change | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index f555175..ffdf16e 100644 --- a/README.md +++ b/README.md @@ -28,7 +28,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| -| Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `rop` `xxe` `url` `oast` `report` `wordlist` | +| Tags | `proxy` `infra` `live-audit` `param` `endpoint` `subdomains` `apk` `dns` `domain` `jwt` `ssrf` `xss` `smuggle` `csp` `s3` `sqli` `403` `aaa` `ssl` `rop` `xxe` `url` `oast` `http` `report` `wordlist` | | Langs | `Java` `Shell` `Go` `Rust` `C` `Python` `JavaScript` `Kotlin` `Ruby` `Perl` `TypeScript` `PHP` `BlitzBasic` `C#` `Typescript` `HTML` `C++` `Kotiln` `CSS` | ### Tools @@ -41,7 +41,6 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Proxy|[Echo Mirage](https://sourceforge.net/projects/echomirage.oldbutgold.p/)|A generic network proxy that uses DLL injection to capture and alter TCP traffic.|||![windows](./images/windows.png)| |Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| -|Proxy|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/rust.png)| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)| @@ -246,7 +245,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.|![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)| -|Utils|[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| +|Utils|[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|`http`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)| |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|`report`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| |Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| @@ -265,6 +264,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun |Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)| |Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![burp](./images/burp.png)![](./images/blitzbasic.png)| +|Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|`http`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/html.png)| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)| |Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| diff --git a/scripts/last_change b/scripts/last_change index 78a2749..d124b71 100644 --- a/scripts/last_change +++ b/scripts/last_change @@ -1 +1 @@ -Mon Sep 5 22:29:19 UTC 2022 +Mon Sep 5 22:33:51 UTC 2022