From eb768c8e3fed73c75d51d4c8430be4121eaba728 Mon Sep 17 00:00:00 2001 From: hahwul Date: Fri, 20 Nov 2020 21:13:22 +0900 Subject: [PATCH 01/24] distribute readme --- README.md | 5 ++++ data.json | 84 +++++++++++++++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 87 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index fe0c824..90a5abc 100644 --- a/README.md +++ b/README.md @@ -36,6 +36,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Discovery/ALL | [lazyrecon](https://github.com/nahamsec/lazyrecon) | This script is intended to automate your reconnaissance process in an organized fashion | ![](https://img.shields.io/github/stars/nahamsec/lazyrecon) | ![](https://img.shields.io/github/languages/top/nahamsec/lazyrecon) | | Discovery/ALL | [rengine](https://github.com/yogeshojha/rengine) | reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. | ![](https://img.shields.io/github/stars/yogeshojha/rengine) | ![](https://img.shields.io/github/languages/top/yogeshojha/rengine) | | Discovery/ALL | [scilla](https://github.com/edoardottt/scilla) | 🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration | ![](https://img.shields.io/github/stars/edoardottt/scilla) | ![](https://img.shields.io/github/languages/top/edoardottt/scilla) | +| Discovery/ALL | [sn0int](https://github.com/kpcyrd/sn0int) | Semi-automatic OSINT framework and package manager | ![](https://img.shields.io/github/stars/kpcyrd/sn0int) | ![](https://img.shields.io/github/languages/top/kpcyrd/sn0int) | | Discovery/APK | [apkleaks](https://github.com/dwisiswant0/apkleaks) | Scanning APK file for URIs, endpoints & secrets. | ![](https://img.shields.io/github/stars/dwisiswant0/apkleaks) | ![](https://img.shields.io/github/languages/top/dwisiswant0/apkleaks) | | Discovery/CRAWL | [Photon](https://github.com/s0md3v/Photon) | Incredibly fast crawler designed for OSINT. | ![](https://img.shields.io/github/stars/s0md3v/Photon) | ![](https://img.shields.io/github/languages/top/s0md3v/Photon) | | Discovery/CRAWL | [cc.py](https://github.com/si9int/cc.py) | Extracting URLs of a specific target based on the results of "commoncrawl.org" | ![](https://img.shields.io/github/stars/si9int/cc.py) | ![](https://img.shields.io/github/languages/top/si9int/cc.py) | @@ -46,8 +47,11 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Discovery/DNS | [DNSDumpster](https://dnsdumpster.com) | Online dns recon & research, find & lookup dns records|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| | Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| | Discovery/DNS | [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsprobe) | +| Discovery/DNS | [dnsvalidator](https://github.com/vortexau/dnsvalidator) | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | ![](https://img.shields.io/github/stars/vortexau/dnsvalidator) | ![](https://img.shields.io/github/languages/top/vortexau/dnsvalidator) | | Discovery/DNS | [hakrevdns](https://github.com/hakluke/hakrevdns) | Small, fast tool for performing reverse DNS lookups en masse. | ![](https://img.shields.io/github/stars/hakluke/hakrevdns) | ![](https://img.shields.io/github/languages/top/hakluke/hakrevdns) | | Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. | ![](https://img.shields.io/github/stars/projectdiscovery/shuffledns) | ![](https://img.shields.io/github/languages/top/projectdiscovery/shuffledns) | +| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) | +| Discovery/DNS | [zdns](https://github.com/zmap/zdns) | Fast CLI DNS Lookup Tool | ![](https://img.shields.io/github/stars/zmap/zdns) | ![](https://img.shields.io/github/languages/top/zmap/zdns) | | Discovery/DOMAIN | [Amass](https://github.com/OWASP/Amass) | In-depth Attack Surface Mapping and Asset Discovery | ![](https://img.shields.io/github/stars/OWASP/Amass) | ![](https://img.shields.io/github/languages/top/OWASP/Amass) | | Discovery/DOMAIN | [Chaos Web](https://chaos.projectdiscovery.io) | actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | Discovery/DOMAIN | [Sublist3r](https://github.com/aboul3la/Sublist3r) | Fast subdomains enumeration tool for penetration testers | ![](https://img.shields.io/github/stars/aboul3la/Sublist3r) | ![](https://img.shields.io/github/languages/top/aboul3la/Sublist3r) | @@ -90,6 +94,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Fetch/HTTP | [httpx](https://github.com/projectdiscovery/httpx) | httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. | ![](https://img.shields.io/github/stars/projectdiscovery/httpx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/httpx) | | Fetch/HTTP | [meg](https://github.com/tomnomnom/meg) | Fetch many paths for many hosts - without killing the hosts | ![](https://img.shields.io/github/stars/tomnomnom/meg) | ![](https://img.shields.io/github/languages/top/tomnomnom/meg) | | Fetch/HTTP | [wuzz](https://github.com/asciimoo/wuzz) | Interactive cli tool for HTTP inspection | ![](https://img.shields.io/github/stars/asciimoo/wuzz) | ![](https://img.shields.io/github/languages/top/asciimoo/wuzz) | +| Fetch/JS | [getJS](https://github.com/003random/getJS) | A tool to fastly get all javascript sources/files | ![](https://img.shields.io/github/stars/003random/getJS) | ![](https://img.shields.io/github/languages/top/003random/getJS) | | Fetch/WSOCK | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler | ![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/websocket-connection-smuggler) | | Scanner/CORS | [CorsMe](https://github.com/Shivangx01b/CorsMe) | Cross Origin Resource Sharing MisConfiguration Scanner | ![](https://img.shields.io/github/stars/Shivangx01b/CorsMe) | ![](https://img.shields.io/github/languages/top/Shivangx01b/CorsMe) | | Scanner/CORS | [Corsy](https://github.com/s0md3v/Corsy) | CORS Misconfiguration Scanner | ![](https://img.shields.io/github/stars/s0md3v/Corsy) | ![](https://img.shields.io/github/languages/top/s0md3v/Corsy) | diff --git a/data.json b/data.json index 11d12bf..a83131c 100644 --- a/data.json +++ b/data.json @@ -1151,6 +1151,22 @@ "Windows": "go get -u -v github.com/projectdiscovery/dnsprobe" } }, + "dnsvalidator": { + "Data": "| Discovery/DNS | [dnsvalidator](https://github.com/vortexau/dnsvalidator) | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | ![](https://img.shields.io/github/stars/vortexau/dnsvalidator) | ![](https://img.shields.io/github/languages/top/vortexau/dnsvalidator) |", + "Description": "Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Method": "DNS", + "Type": "Discovery", + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "domdig": { "Data": "| Scanner/XSS | [domdig](https://github.com/fcavallarin/domdig) | DOM XSS scanner for Single Page Applications | ![](https://img.shields.io/github/stars/fcavallarin/domdig) | ![](https://img.shields.io/github/languages/top/fcavallarin/domdig) |", "Description": "DOM XSS scanner for Single Page Applications ", @@ -1295,6 +1311,22 @@ "Windows": "go get -u -v github.com/lc/gau" } }, + "getJS": { + "Data": "| Fetch/JS | [getJS](https://github.com/003random/getJS) | A tool to fastly get all javascript sources/files | ![](https://img.shields.io/github/stars/003random/getJS) | ![](https://img.shields.io/github/languages/top/003random/getJS) |", + "Description": "A tool to fastly get all javascript sources/files", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Method": "JS", + "Type": "Fetch", + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "gf": { "Data": "| Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things | ![](https://img.shields.io/github/stars/tomnomnom/gf) | ![](https://img.shields.io/github/languages/top/tomnomnom/gf) |", "Description": "A wrapper around grep, to help you grep for things ", @@ -2048,15 +2080,15 @@ } }, "scilla": { - "Type": "Discovery", "Data": "| Discovery/ALL | [scilla](https://github.com/edoardottt/scilla) | 🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration | ![](https://img.shields.io/github/stars/edoardottt/scilla) | ![](https://img.shields.io/github/languages/top/edoardottt/scilla) |", - "Method": "ALL", "Description": "🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration", "Install": { "Linux": "go get-u github.com/edoardottt/scilla", "MacOS": "go get-u github.com/edoardottt/scilla", "Windows": "go get-u github.com/edoardottt/scilla" }, + "Method": "ALL", + "Type": "Discovery", "Update": { "Linux": "go get-u github.com/edoardottt/scilla", "MacOS": "go get-u github.com/edoardottt/scilla", @@ -2095,6 +2127,22 @@ "Windows": "cd smuggler ; git pull -v" } }, + "sn0int": { + "Data": "| Discovery/ALL | [sn0int](https://github.com/kpcyrd/sn0int) | Semi-automatic OSINT framework and package manager | ![](https://img.shields.io/github/stars/kpcyrd/sn0int) | ![](https://img.shields.io/github/languages/top/kpcyrd/sn0int) |", + "Description": "Semi-automatic OSINT framework and package manager", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Method": "ALL", + "Type": "Discovery", + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "sqlmap": { "Data": "| Scanner/SQL | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool | ![](https://img.shields.io/github/stars/sqlmapproject/sqlmap) | ![](https://img.shields.io/github/languages/top/sqlmapproject/sqlmap) |", "Description": "Automatic SQL injection and database takeover tool ", @@ -2143,6 +2191,22 @@ "Windows": "go get -u -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder" } }, + "subgen": { + "Type": "Discovery", + "Data": "| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) |", + "Method": "DNS", + "Description": "A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "subjack": { "Data": "| Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go | ![](https://img.shields.io/github/stars/haccer/subjack) | ![](https://img.shields.io/github/languages/top/haccer/subjack) |", "Description": "Subdomain Takeover tool written in Go ", @@ -2446,5 +2510,21 @@ "MacOS": "", "Windows": "" } + }, + "zdns": { + "Data": "| Discovery/DNS | [zdns](https://github.com/zmap/zdns) | Fast CLI DNS Lookup Tool | ![](https://img.shields.io/github/stars/zmap/zdns) | ![](https://img.shields.io/github/languages/top/zmap/zdns) |", + "Description": "Fast CLI DNS Lookup Tool", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Method": "DNS", + "Type": "Discovery", + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } } } \ No newline at end of file From 0dd1a2ff2c7bd9a6f3a54d0cd4148ed337828a72 Mon Sep 17 00:00:00 2001 From: hahwul Date: Sat, 21 Nov 2020 20:10:18 +0900 Subject: [PATCH 02/24] distribute readme --- README.md | 1 + data.json | 20 ++++++++++++++++++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 90a5abc..eeaf289 100644 --- a/README.md +++ b/README.md @@ -117,6 +117,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Scanner/SMUGGLE | [h2csmuggler](https://github.com/BishopFox/h2csmuggler) | HTTP Request Smuggling over HTTP/2 Cleartext (h2c) | ![](https://img.shields.io/github/stars/BishopFox/h2csmuggler) | ![](https://img.shields.io/github/languages/top/BishopFox/h2csmuggler) | | Scanner/SMUGGLE | [smuggler](https://github.com/defparam/smuggler) | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | ![](https://img.shields.io/github/stars/defparam/smuggler) | ![](https://img.shields.io/github/languages/top/defparam/smuggler) | | Scanner/SQL | [SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja) | SQL Injection scanner|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| +| Scanner/SQL | [sqliv](https://github.com/the-robot/sqliv) | massive SQL injection vulnerability scanner | ![](https://img.shields.io/github/stars/the-robot/sqliv) | ![](https://img.shields.io/github/languages/top/the-robot/sqliv) | | Scanner/SQL | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool | ![](https://img.shields.io/github/stars/sqlmapproject/sqlmap) | ![](https://img.shields.io/github/languages/top/sqlmapproject/sqlmap) | | Scanner/SSL | [a2sv](https://github.com/hahwul/a2sv) | Auto Scanning to SSL Vulnerability | ![](https://img.shields.io/github/stars/hahwul/a2sv) | ![](https://img.shields.io/github/languages/top/hahwul/a2sv) | | Scanner/SSL | [testssl.sh](https://github.com/drwetter/testssl.sh) | Testing TLS/SSL encryption anywhere on any port | ![](https://img.shields.io/github/stars/drwetter/testssl.sh) | ![](https://img.shields.io/github/languages/top/drwetter/testssl.sh) | diff --git a/data.json b/data.json index a83131c..f658ffc 100644 --- a/data.json +++ b/data.json @@ -2143,6 +2143,22 @@ "Windows": "" } }, + "sqliv": { + "Type": "Scanner", + "Data": "| Scanner/SQL | [sqliv](https://github.com/the-robot/sqliv) | massive SQL injection vulnerability scanner | ![](https://img.shields.io/github/stars/the-robot/sqliv) | ![](https://img.shields.io/github/languages/top/the-robot/sqliv) |", + "Method": "SQL", + "Description": "massive SQL injection vulnerability scanner", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "sqlmap": { "Data": "| Scanner/SQL | [sqlmap](https://github.com/sqlmapproject/sqlmap) | Automatic SQL injection and database takeover tool | ![](https://img.shields.io/github/stars/sqlmapproject/sqlmap) | ![](https://img.shields.io/github/languages/top/sqlmapproject/sqlmap) |", "Description": "Automatic SQL injection and database takeover tool ", @@ -2192,15 +2208,15 @@ } }, "subgen": { - "Type": "Discovery", "Data": "| Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) |", - "Method": "DNS", "Description": "A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "DNS", + "Type": "Discovery", "Update": { "Linux": "", "MacOS": "", From 59b7e38bb195140cbbffcaeb65b2eb00633eb943 Mon Sep 17 00:00:00 2001 From: hahwul Date: Sun, 22 Nov 2020 14:49:18 +0900 Subject: [PATCH 03/24] distribute readme --- README.md | 1 + data.json | 20 ++++++++++++++++++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index eeaf289..f6a6c9e 100644 --- a/README.md +++ b/README.md @@ -85,6 +85,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Discovery/PORT | [masscan](https://github.com/robertdavidgraham/masscan) | TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ![](https://img.shields.io/github/stars/robertdavidgraham/masscan) | ![](https://img.shields.io/github/languages/top/robertdavidgraham/masscan) | | Discovery/PORT | [naabu](https://github.com/projectdiscovery/naabu) | A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests | ![](https://img.shields.io/github/stars/projectdiscovery/naabu) | ![](https://img.shields.io/github/languages/top/projectdiscovery/naabu) | | Discovery/PORT | [nmap](https://github.com/nmap/nmap) | Nmap - the Network Mapper. Github mirror of official SVN repository. | ![](https://img.shields.io/github/stars/nmap/nmap) | ![](https://img.shields.io/github/languages/top/nmap/nmap) | +| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool | ![](https://img.shields.io/github/stars/Ice3man543/SubOver) | ![](https://img.shields.io/github/languages/top/Ice3man543/SubOver) | | Discovery/TKOV | [can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz) | "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. | ![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz) | ![](https://img.shields.io/github/languages/top/EdOverflow/can-i-take-over-xyz) | | Discovery/TKOV | [subjack](https://github.com/haccer/subjack) | Subdomain Takeover tool written in Go | ![](https://img.shields.io/github/stars/haccer/subjack) | ![](https://img.shields.io/github/languages/top/haccer/subjack) | | Discovery/URL | [waybackurls](https://github.com/tomnomnom/waybackurls) | Fetch all the URLs that the Wayback Machine knows about for a domain | ![](https://img.shields.io/github/stars/tomnomnom/waybackurls) | ![](https://img.shields.io/github/languages/top/tomnomnom/waybackurls) | diff --git a/data.json b/data.json index f658ffc..c877951 100644 --- a/data.json +++ b/data.json @@ -751,6 +751,22 @@ "Windows": "cd Striker; git pull -v ; pip3 install -r requirements.txt" } }, + "SubOver": { + "Type": "Discovery", + "Data": "| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool | ![](https://img.shields.io/github/stars/Ice3man543/SubOver) | ![](https://img.shields.io/github/languages/top/Ice3man543/SubOver) |", + "Method": "TKOV", + "Description": "A Powerful Subdomain Takeover Tool", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "Sublist3r": { "Data": "| Discovery/DOMAIN | [Sublist3r](https://github.com/aboul3la/Sublist3r) | Fast subdomains enumeration tool for penetration testers | ![](https://img.shields.io/github/stars/aboul3la/Sublist3r) | ![](https://img.shields.io/github/languages/top/aboul3la/Sublist3r) |", "Description": "Fast subdomains enumeration tool for penetration testers ", @@ -2144,15 +2160,15 @@ } }, "sqliv": { - "Type": "Scanner", "Data": "| Scanner/SQL | [sqliv](https://github.com/the-robot/sqliv) | massive SQL injection vulnerability scanner | ![](https://img.shields.io/github/stars/the-robot/sqliv) | ![](https://img.shields.io/github/languages/top/the-robot/sqliv) |", - "Method": "SQL", "Description": "massive SQL injection vulnerability scanner", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "SQL", + "Type": "Scanner", "Update": { "Linux": "", "MacOS": "", From fa83057ae69cc2c0134e9855057366f61d637996 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Sun, 22 Nov 2020 22:48:44 +0900 Subject: [PATCH 04/24] Create SECURITY.md --- SECURITY.md | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 SECURITY.md diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..034e848 --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,21 @@ +# Security Policy + +## Supported Versions + +Use this section to tell people about which versions of your project are +currently being supported with security updates. + +| Version | Supported | +| ------- | ------------------ | +| 5.1.x | :white_check_mark: | +| 5.0.x | :x: | +| 4.0.x | :white_check_mark: | +| < 4.0 | :x: | + +## Reporting a Vulnerability + +Use this section to tell people how to report a vulnerability. + +Tell them where to go, how often they can expect to get an update on a +reported vulnerability, what to expect if the vulnerability is accepted or +declined, etc. From e66e3fd446ff33bb47bf891e9ba04802257a3f92 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Sun, 22 Nov 2020 22:48:57 +0900 Subject: [PATCH 05/24] Create codeql-analysis.yml --- .github/workflows/codeql-analysis.yml | 67 +++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 .github/workflows/codeql-analysis.yml diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml new file mode 100644 index 0000000..b1f7e1d --- /dev/null +++ b/.github/workflows/codeql-analysis.yml @@ -0,0 +1,67 @@ +# For most projects, this workflow file will not need changing; you simply need +# to commit it to your repository. +# +# You may wish to alter this file to override the set of languages analyzed, +# or to provide custom queries or build logic. +# +# ******** NOTE ******** +# We have attempted to detect the languages in your repository. Please check +# the `language` matrix defined below to confirm you have the correct set of +# supported CodeQL languages. +# +name: "CodeQL" + +on: + push: + branches: [ master ] + pull_request: + # The branches below must be a subset of the branches above + branches: [ master ] + schedule: + - cron: '29 14 * * 4' + +jobs: + analyze: + name: Analyze + runs-on: ubuntu-latest + + strategy: + fail-fast: false + matrix: + language: [ 'go' ] + # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] + # Learn more: + # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed + + steps: + - name: Checkout repository + uses: actions/checkout@v2 + + # Initializes the CodeQL tools for scanning. + - name: Initialize CodeQL + uses: github/codeql-action/init@v1 + with: + languages: ${{ matrix.language }} + # If you wish to specify custom queries, you can do so here or in a config file. + # By default, queries listed here will override any specified in a config file. + # Prefix the list here with "+" to use these queries and those in the config file. + # queries: ./path/to/local/query, your-org/your-repo/queries@main + + # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). + # If this step fails, then you should remove it and run the build manually (see below) + - name: Autobuild + uses: github/codeql-action/autobuild@v1 + + # ℹ️ Command-line programs to run using the OS shell. + # 📚 https://git.io/JvXDl + + # ✏️ If the Autobuild fails above, remove it and uncomment the following three lines + # and modify them (or add more) to build your code if your project + # uses a compiled language + + #- run: | + # make bootstrap + # make release + + - name: Perform CodeQL Analysis + uses: github/codeql-action/analyze@v1 From 42e6de8722aada1f43aa325136848dd1630bdf3f Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Sun, 22 Nov 2020 22:50:12 +0900 Subject: [PATCH 06/24] Create go.yml --- .github/workflows/go.yml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 .github/workflows/go.yml diff --git a/.github/workflows/go.yml b/.github/workflows/go.yml new file mode 100644 index 0000000..0d6b7c1 --- /dev/null +++ b/.github/workflows/go.yml @@ -0,0 +1,33 @@ +name: Go + +on: + push: + branches: [ master ] + pull_request: + branches: [ master ] + +jobs: + + build: + name: Build + runs-on: ubuntu-latest + steps: + + - name: Set up Go 1.x + uses: actions/setup-go@v2 + with: + go-version: ^1.13 + + - name: Check out code into the Go module directory + uses: actions/checkout@v2 + + - name: Get dependencies + run: | + go get -v -t -d ./... + if [ -f Gopkg.toml ]; then + curl https://raw.githubusercontent.com/golang/dep/master/install.sh | sh + dep ensure + fi + + - name: Build + run: make contribute From 9c2fdfd869d9af0a934c0a39c1fd1f834b7eef21 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Sun, 22 Nov 2020 22:53:08 +0900 Subject: [PATCH 07/24] Update go.yml --- .github/workflows/go.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/go.yml b/.github/workflows/go.yml index 0d6b7c1..aa4e3bd 100644 --- a/.github/workflows/go.yml +++ b/.github/workflows/go.yml @@ -1,4 +1,4 @@ -name: Go +name: Build on: push: From 4b51bdbe9ab14ef941cdcda997bcce67098331b9 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Sun, 22 Nov 2020 22:53:44 +0900 Subject: [PATCH 08/24] Update head.md --- template/head.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/template/head.md b/template/head.md index 1f3e292..4dba878 100644 --- a/template/head.md +++ b/template/head.md @@ -5,6 +5,9 @@ Web Hacker's Weapons
+ + + A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting From cf7541ff09415089f9a9ed19350503b2c19bdb03 Mon Sep 17 00:00:00 2001 From: hahwul Date: Sun, 22 Nov 2020 22:54:23 +0900 Subject: [PATCH 09/24] distribute readme --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index f6a6c9e..256374d 100644 --- a/README.md +++ b/README.md @@ -5,6 +5,9 @@ Web Hacker's Weapons
+ + + A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting From 049ba32976e59bd68b8f0b4f33193e22aa90fcd6 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Thu, 26 Nov 2020 19:51:04 +0900 Subject: [PATCH 10/24] Create contributors.yml --- .github/workflows/contributors.yml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 .github/workflows/contributors.yml diff --git a/.github/workflows/contributors.yml b/.github/workflows/contributors.yml new file mode 100644 index 0000000..43c7c33 --- /dev/null +++ b/.github/workflows/contributors.yml @@ -0,0 +1,21 @@ +name: Contributors +on: + schedule: + - cron: '0 4 * * 0' + push: + branches: + - master + workflow_dispatch: + inputs: + logLevel: + description: 'manual run' + required: false + default: '' +jobs: + contributors: + runs-on: ubuntu-latest + steps: + - uses: bubkoo/contributors-list@v1 + with: + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} + round: true From 2678aa0920c5eae0d9651a1922f4331a907f8a89 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Thu, 26 Nov 2020 10:51:25 +0000 Subject: [PATCH 11/24] chore: update contributors [skip ci] --- CONTRIBUTORS.svg | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 CONTRIBUTORS.svg diff --git a/CONTRIBUTORS.svg b/CONTRIBUTORS.svg new file mode 100644 index 0000000..d850921 --- /dev/null +++ b/CONTRIBUTORS.svg @@ -0,0 +1,18 @@ + + + + + + + + + + + + + + + + + + \ No newline at end of file From c38a5a757c16f9b5d9f3bae7f40746620d418d08 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Thu, 26 Nov 2020 19:53:07 +0900 Subject: [PATCH 12/24] Update foot.md --- template/foot.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/template/foot.md b/template/foot.md index b34a8b1..e57037b 100644 --- a/template/foot.md +++ b/template/foot.md @@ -2,3 +2,6 @@ ## Thanks to (Contributor) I would like to thank everyone who helped with this project 👍😎
[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran) , [rykkard](https://github.com/rykkard) + +## Contributors +![](/CONTRIBUTORS.svg) From 6c60429a6750ef45b87e6baf69c2dcdbf44ed842 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Fri, 27 Nov 2020 00:40:34 +0900 Subject: [PATCH 13/24] Update head.md --- template/head.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/template/head.md b/template/head.md index 4dba878..f40e28c 100644 --- a/template/head.md +++ b/template/head.md @@ -4,10 +4,15 @@
Web Hacker's Weapons
- + + + + + + A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting From 71fde32a2e30516b928030d5c7d5fb90295fc756 Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Fri, 27 Nov 2020 00:47:12 +0900 Subject: [PATCH 14/24] Update README.md --- README.md | 67 +++++++++++++++++++++++++++++-------------------------- 1 file changed, 35 insertions(+), 32 deletions(-) diff --git a/README.md b/README.md index 256374d..3961040 100644 --- a/README.md +++ b/README.md @@ -1,31 +1,34 @@ -

-
- -
- Web Hacker's Weapons -
- - - - -

-A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting - -## Table of Contents -- [WHW-Tools](https://whw-tools.hahwul.com) -- [Weapons](#weapons) -- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) -- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) -- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) -- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) -- [Thanks to contributor](#thanks-to-contributor) - -## WHW-Tools -> Always use the latest tools 😎 - -`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) - -## Weapons +

+
+ +
+ Web Hacker's Weapons +
+ + + + + + + +

+A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting + +## Table of Contents +- [WHW-Tools](https://whw-tools.hahwul.com) +- [Weapons](#weapons) +- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) +- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) +- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) +- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) +- [Thanks to contributor](#thanks-to-contributor) + +## WHW-Tools +> Always use the latest tools 😎 + +`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) + +## Weapons | Type | Name | Description | Popularity | Language | | ---------- | :---------- | :----------: | :----------: | :----------: | | Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing | ![](https://img.shields.io/github/stars/jaeles-project/jaeles) | ![](https://img.shields.io/github/languages/top/jaeles-project/jaeles) | @@ -188,7 +191,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Utility/WORD | [CT_subdomains](https://github.com/internetwache/CT_subdomains) | An hourly updated list of subdomains gathered from certificate transparency logs | ![](https://img.shields.io/github/stars/internetwache/CT_subdomains) | ![](https://img.shields.io/github/languages/top/internetwache/CT_subdomains) | | Utility/WORD | [SecLists](https://github.com/danielmiessler/SecLists) | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. | ![](https://img.shields.io/github/stars/danielmiessler/SecLists) | ![](https://img.shields.io/github/languages/top/danielmiessler/SecLists) | | Utility/WORD | [subs_all](https://github.com/emadshanab/subs_all) | Subdomain Enumeration Wordlist. 8956437 unique words. Updated. | ![](https://img.shields.io/github/stars/emadshanab/subs_all) | ![](https://img.shields.io/github/languages/top/emadshanab/subs_all) | - -## Thanks to (Contributor) -I would like to thank everyone who helped with this project 👍😎
-[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran) , [rykkard](https://github.com/rykkard) + +## Thanks to (Contributor) +I would like to thank everyone who helped with this project 👍😎
+[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran) , [rykkard](https://github.com/rykkard) From 7dd86e4eafcadac47eb38286a957dac59d126bce Mon Sep 17 00:00:00 2001 From: HAHWUL Date: Fri, 27 Nov 2020 00:47:51 +0900 Subject: [PATCH 15/24] Update head.md --- template/head.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/template/head.md b/template/head.md index f40e28c..a300319 100644 --- a/template/head.md +++ b/template/head.md @@ -9,10 +9,7 @@ - - - A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting From 9a7dc8c1bde7e127e9e77af745b3dfb8861ccf22 Mon Sep 17 00:00:00 2001 From: hahwul Date: Fri, 27 Nov 2020 00:50:27 +0900 Subject: [PATCH 16/24] distribute readme --- README.md | 72 ++++++++++++++++++++++++++++--------------------------- 1 file changed, 37 insertions(+), 35 deletions(-) diff --git a/README.md b/README.md index 3961040..6729e0d 100644 --- a/README.md +++ b/README.md @@ -1,34 +1,33 @@ -

-
- -
- Web Hacker's Weapons -
- - - - - - - -

-A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting - -## Table of Contents -- [WHW-Tools](https://whw-tools.hahwul.com) -- [Weapons](#weapons) -- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) -- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) -- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) -- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) -- [Thanks to contributor](#thanks-to-contributor) - -## WHW-Tools -> Always use the latest tools 😎 - -`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) - -## Weapons +

+
+ +
+ Web Hacker's Weapons +
+ + + + + + +

+A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting + +## Table of Contents +- [WHW-Tools](https://whw-tools.hahwul.com) +- [Weapons](#weapons) +- [Awesome Bookmarklets](https://github.com/hahwul/WebHackersWeapons/tree/master/Bookmarklets) +- [Awesome Browser Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Browser%20Extensions) +- [Awesome Burp and ZAP Extensions](https://github.com/hahwul/WebHackersWeapons/tree/master/Burp%20and%20ZAP%20Extensions) +- [Contribute](https://github.com/hahwul/WebHackersWeapons/blob/master/CONTRIBUTING.md) +- [Thanks to contributor](#thanks-to-contributor) + +## WHW-Tools +> Always use the latest tools 😎 + +`WHW-Tools` is tools web of `#WebHackersWeapons`. Easy install and Easy manage upgrade. Go to [WHW-Tools](https://whw-tools.hahwul.com/) + +## Weapons | Type | Name | Description | Popularity | Language | | ---------- | :---------- | :----------: | :----------: | :----------: | | Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing | ![](https://img.shields.io/github/stars/jaeles-project/jaeles) | ![](https://img.shields.io/github/languages/top/jaeles-project/jaeles) | @@ -191,7 +190,10 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Utility/WORD | [CT_subdomains](https://github.com/internetwache/CT_subdomains) | An hourly updated list of subdomains gathered from certificate transparency logs | ![](https://img.shields.io/github/stars/internetwache/CT_subdomains) | ![](https://img.shields.io/github/languages/top/internetwache/CT_subdomains) | | Utility/WORD | [SecLists](https://github.com/danielmiessler/SecLists) | SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. | ![](https://img.shields.io/github/stars/danielmiessler/SecLists) | ![](https://img.shields.io/github/languages/top/danielmiessler/SecLists) | | Utility/WORD | [subs_all](https://github.com/emadshanab/subs_all) | Subdomain Enumeration Wordlist. 8956437 unique words. Updated. | ![](https://img.shields.io/github/stars/emadshanab/subs_all) | ![](https://img.shields.io/github/languages/top/emadshanab/subs_all) | - -## Thanks to (Contributor) -I would like to thank everyone who helped with this project 👍😎
-[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran) , [rykkard](https://github.com/rykkard) + +## Thanks to (Contributor) +I would like to thank everyone who helped with this project 👍😎
+[six2dez](https://github.com/six2dez) , [si9int](https://github.com/si9int) , [dwisiswant0](https://twitter.com/dwisiswant0) , [riza](https://github.com/riza) , [jcran](https://github.com/jcran) , [rykkard](https://github.com/rykkard) + +## Contributors +![](/CONTRIBUTORS.svg) From 6f7ef58df1af05c20955ae6346721123bdc5f1af Mon Sep 17 00:00:00 2001 From: hahwul Date: Fri, 27 Nov 2020 00:52:07 +0900 Subject: [PATCH 17/24] distribute readme --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 6729e0d..42a1dc0 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,8 @@
Web Hacker's Weapons
- + + From 9a860be683f9758e97d2850a517f5f9c1c4e0ef6 Mon Sep 17 00:00:00 2001 From: hahwul Date: Fri, 27 Nov 2020 00:52:12 +0900 Subject: [PATCH 18/24] update --- template/head.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/template/head.md b/template/head.md index a300319..32287a0 100644 --- a/template/head.md +++ b/template/head.md @@ -4,7 +4,8 @@
Web Hacker's Weapons
- + + From 6301c675acc77f65710749049b2acb8d0c63571a Mon Sep 17 00:00:00 2001 From: Renovate Bot Date: Fri, 27 Nov 2020 05:57:18 +0000 Subject: [PATCH 19/24] Add renovate.json --- renovate.json | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 renovate.json diff --git a/renovate.json b/renovate.json new file mode 100644 index 0000000..f45d8f1 --- /dev/null +++ b/renovate.json @@ -0,0 +1,5 @@ +{ + "extends": [ + "config:base" + ] +} From aeffe621efb60729593306d3968341a24d09edee Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Sat, 28 Nov 2020 16:44:39 +0000 Subject: [PATCH 20/24] chore: update contributors [skip ci] --- CONTRIBUTORS.svg | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/CONTRIBUTORS.svg b/CONTRIBUTORS.svg index d850921..1dfda30 100644 --- a/CONTRIBUTORS.svg +++ b/CONTRIBUTORS.svg @@ -9,10 +9,13 @@ + + + - + - + \ No newline at end of file From eb5f42a80b90195ebb543d684752fee0cd266577 Mon Sep 17 00:00:00 2001 From: hahwul Date: Mon, 30 Nov 2020 11:30:01 +0900 Subject: [PATCH 21/24] distribute readme --- README.md | 2 ++ data.json | 36 ++++++++++++++++++++++++++++++++++-- 2 files changed, 36 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 42a1dc0..dfc0f81 100644 --- a/README.md +++ b/README.md @@ -159,6 +159,8 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Utility/FIND | [fzf](https://github.com/junegunn/fzf) | A command-line fuzzy finder | ![](https://img.shields.io/github/stars/junegunn/fzf) | ![](https://img.shields.io/github/languages/top/junegunn/fzf) | | Utility/FLOW | [SequenceDiagram](https://sequencediagram.org) | Online tool for creating UML sequence diagrams|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| | Utility/GREP | [gf](https://github.com/tomnomnom/gf) | A wrapper around grep, to help you grep for things | ![](https://img.shields.io/github/stars/tomnomnom/gf) | ![](https://img.shields.io/github/languages/top/tomnomnom/gf) | +| Utility/HTTP | [curl](https://github.com/curl/curl) | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features | ![](https://img.shields.io/github/stars/curl/curl) | ![](https://img.shields.io/github/languages/top/curl/curl) | +| Utility/HTTP | [httpie](https://github.com/httpie/httpie) | As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie | ![](https://img.shields.io/github/stars/httpie/httpie) | ![](https://img.shields.io/github/languages/top/httpie/httpie) | | Utility/JSON | [gron](https://github.com/tomnomnom/gron) | Make JSON greppable! | ![](https://img.shields.io/github/stars/tomnomnom/gron) | ![](https://img.shields.io/github/languages/top/tomnomnom/gron) | | Utility/JWT | [c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker) | JWT brute force cracker written in C | ![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker) | ![](https://img.shields.io/github/languages/top/brendan-rius/c-jwt-cracker) | | Utility/JWT | [jwt-cracker](https://github.com/lmammino/jwt-cracker) | Simple HS256 JWT token brute force cracker | ![](https://img.shields.io/github/stars/lmammino/jwt-cracker) | ![](https://img.shields.io/github/languages/top/lmammino/jwt-cracker) | diff --git a/data.json b/data.json index c877951..2b8d457 100644 --- a/data.json +++ b/data.json @@ -752,15 +752,15 @@ } }, "SubOver": { - "Type": "Discovery", "Data": "| Discovery/TKOV | [SubOver](https://github.com/Ice3man543/SubOver) | A Powerful Subdomain Takeover Tool | ![](https://img.shields.io/github/stars/Ice3man543/SubOver) | ![](https://img.shields.io/github/languages/top/Ice3man543/SubOver) |", - "Method": "TKOV", "Description": "A Powerful Subdomain Takeover Tool", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "TKOV", + "Type": "Discovery", "Update": { "Linux": "", "MacOS": "", @@ -1103,6 +1103,22 @@ "Windows": "go get -v github.com/dwisiswant0/crlfuzz/cmd/crlfuzz" } }, + "curl": { + "Type": "Utility", + "Data": "| Utility/HTTP | [curl](https://github.com/curl/curl) | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features | ![](https://img.shields.io/github/stars/curl/curl) | ![](https://img.shields.io/github/languages/top/curl/curl) |", + "Method": "HTTP", + "Description": "A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "dalfox": { "Data": "| Scanner/XSS | [dalfox](https://github.com/hahwul/dalfox) | 🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | ![](https://img.shields.io/github/stars/hahwul/dalfox) | ![](https://img.shields.io/github/languages/top/hahwul/dalfox) |", "Description": "🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang ", @@ -1647,6 +1663,22 @@ "Windows": "go get github.com/htcat/htcat/cmd/htcat" } }, + "httpie": { + "Data": "| Utility/HTTP | [httpie](https://github.com/httpie/httpie) | As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins \u0026 more. https://twitter.com/httpie | ![](https://img.shields.io/github/stars/httpie/httpie) | ![](https://img.shields.io/github/languages/top/httpie/httpie) |", + "Description": "As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins \u0026 more. https://twitter.com/httpie", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Method": "HTTP", + "Type": "Utility", + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "httprobe": { "Data": "| Fetch/HTTP | [httprobe](https://github.com/tomnomnom/httprobe) | Take a list of domains and probe for working HTTP and HTTPS servers | ![](https://img.shields.io/github/stars/tomnomnom/httprobe) | ![](https://img.shields.io/github/languages/top/tomnomnom/httprobe) |", "Description": "Take a list of domains and probe for working HTTP and HTTPS servers ", From c00839832d1ef1bc8872319f8253c7d061ea8820 Mon Sep 17 00:00:00 2001 From: hahwul Date: Wed, 2 Dec 2020 00:32:06 +0900 Subject: [PATCH 22/24] distribute readme --- README.md | 1 + data.json | 20 ++++++++++++++++++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index dfc0f81..57cac37 100644 --- a/README.md +++ b/README.md @@ -54,6 +54,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Discovery/DNS | [SecurityTrails](https://securitytrails.com) | Online dns / subdomain / recon tool|![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | ![](https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)| | Discovery/DNS | [dnsprobe](https://github.com/projectdiscovery/dnsprobe) | DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsprobe) | | Discovery/DNS | [dnsvalidator](https://github.com/vortexau/dnsvalidator) | Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. | ![](https://img.shields.io/github/stars/vortexau/dnsvalidator) | ![](https://img.shields.io/github/languages/top/vortexau/dnsvalidator) | +| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsx) | | Discovery/DNS | [hakrevdns](https://github.com/hakluke/hakrevdns) | Small, fast tool for performing reverse DNS lookups en masse. | ![](https://img.shields.io/github/stars/hakluke/hakrevdns) | ![](https://img.shields.io/github/languages/top/hakluke/hakrevdns) | | Discovery/DNS | [shuffledns](https://github.com/projectdiscovery/shuffledns) | shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. | ![](https://img.shields.io/github/stars/projectdiscovery/shuffledns) | ![](https://img.shields.io/github/languages/top/projectdiscovery/shuffledns) | | Discovery/DNS | [subgen](https://github.com/pry0cc/subgen) | A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! | ![](https://img.shields.io/github/stars/pry0cc/subgen) | ![](https://img.shields.io/github/languages/top/pry0cc/subgen) | diff --git a/data.json b/data.json index 2b8d457..af431ac 100644 --- a/data.json +++ b/data.json @@ -1104,15 +1104,15 @@ } }, "curl": { - "Type": "Utility", "Data": "| Utility/HTTP | [curl](https://github.com/curl/curl) | A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features | ![](https://img.shields.io/github/stars/curl/curl) | ![](https://img.shields.io/github/languages/top/curl/curl) |", - "Method": "HTTP", "Description": "A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "HTTP", + "Type": "Utility", "Update": { "Linux": "", "MacOS": "", @@ -1199,6 +1199,22 @@ "Windows": "" } }, + "dnsx": { + "Type": "Discovery", + "Data": "| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsx) |", + "Method": "DNS", + "Description": "dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "domdig": { "Data": "| Scanner/XSS | [domdig](https://github.com/fcavallarin/domdig) | DOM XSS scanner for Single Page Applications | ![](https://img.shields.io/github/stars/fcavallarin/domdig) | ![](https://img.shields.io/github/languages/top/fcavallarin/domdig) |", "Description": "DOM XSS scanner for Single Page Applications ", From 52209e4d1bd697fba56c45a0e17083c2c75be4f4 Mon Sep 17 00:00:00 2001 From: hahwul Date: Sat, 12 Dec 2020 00:50:41 +0900 Subject: [PATCH 23/24] distribute readme --- README.md | 1 + data.json | 20 ++++++++++++++++++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 57cac37..53f5531 100644 --- a/README.md +++ b/README.md @@ -173,6 +173,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Utility/PAYLOAD | [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) | A list of useful payloads and bypass for Web Application Security and Pentest/CTF | ![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings) | ![](https://img.shields.io/github/languages/top/swisskyrepo/PayloadsAllTheThings) | | Utility/PAYLOAD | [hinject](https://github.com/dwisiswant0/hinject) | Host Header Injection Checker | ![](https://img.shields.io/github/stars/dwisiswant0/hinject) | ![](https://img.shields.io/github/languages/top/dwisiswant0/hinject) | | Utility/PAYLOAD | [oxml_xxe](https://github.com/BuffaloWill/oxml_xxe) | A tool for embedding XXE/XML exploits into different filetypes | ![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe) | ![](https://img.shields.io/github/languages/top/BuffaloWill/oxml_xxe) | +| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 | ![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads) | ![](https://img.shields.io/github/languages/top/hakluke/weaponised-XSS-payloads) | | Utility/PAYLOAD | [xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data) | This repository contains all the XSS cheatsheet data to allow contributions from the community. | ![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data) | ![](https://img.shields.io/github/languages/top/PortSwigger/xss-cheatsheet-data) | | Utility/PAYLOAD | [ysoserial](https://github.com/frohoff/ysoserial) | A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | ![](https://img.shields.io/github/stars/frohoff/ysoserial) | ![](https://img.shields.io/github/languages/top/frohoff/ysoserial) | | Utility/PAYLOAD | [ysoserial.net](https://github.com/pwntester/ysoserial.net) | Deserialization payload generator for a variety of .NET formatters | ![](https://img.shields.io/github/stars/pwntester/ysoserial.net) | ![](https://img.shields.io/github/languages/top/pwntester/ysoserial.net) | diff --git a/data.json b/data.json index af431ac..325243d 100644 --- a/data.json +++ b/data.json @@ -1200,15 +1200,15 @@ } }, "dnsx": { - "Type": "Discovery", "Data": "| Discovery/DNS | [dnsx](https://github.com/projectdiscovery/dnsx) | dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. | ![](https://img.shields.io/github/stars/projectdiscovery/dnsx) | ![](https://img.shields.io/github/languages/top/projectdiscovery/dnsx) |", - "Method": "DNS", "Description": "dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "DNS", + "Type": "Discovery", "Update": { "Linux": "", "MacOS": "", @@ -2431,6 +2431,22 @@ "Windows": "go get github.com/tomnomnom/waybackurls" } }, + "weaponised-XSS-payloads": { + "Type": "Utility", + "Data": "| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 | ![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads) | ![](https://img.shields.io/github/languages/top/hakluke/weaponised-XSS-payloads) |", + "Method": "PAYLOAD", + "Description": "XSS payloads designed to turn alert(1) into P1", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "websocket-connection-smuggler": { "Data": "| Fetch/WSOCK | [websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler) | websocket-connection-smuggler | ![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler) | ![](https://img.shields.io/github/languages/top/hahwul/websocket-connection-smuggler) |", "Description": "websocket-connection-smuggler ", From d637bd88836ef43d058f95691378b73cbec898ec Mon Sep 17 00:00:00 2001 From: hahwul Date: Mon, 14 Dec 2020 01:41:28 +0900 Subject: [PATCH 24/24] distribute readme --- README.md | 1 + data.json | 20 ++++++++++++++++++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 53f5531..980366d 100644 --- a/README.md +++ b/README.md @@ -34,6 +34,7 @@ A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntin | Army-Knife/SCAN | [jaeles](https://github.com/jaeles-project/jaeles) | The Swiss Army knife for automated Web Application Testing | ![](https://img.shields.io/github/stars/jaeles-project/jaeles) | ![](https://img.shields.io/github/languages/top/jaeles-project/jaeles) | | Army-Knife/PROXY | [BurpSuite](https://portswigger.net/burp) | the BurpSuite Project|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) | Army-Knife/PROXY | [hetty](https://github.com/dstotijn/hetty) | Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. | ![](https://img.shields.io/github/stars/dstotijn/hetty) | ![](https://img.shields.io/github/languages/top/dstotijn/hetty) | +| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) | | Army-Knife/PROXY | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project | ![](https://img.shields.io/github/stars/zaproxy/zaproxy) | ![](https://img.shields.io/github/languages/top/zaproxy/zaproxy) | | Army-Knife/SCAN | [nuclei](https://github.com/projectdiscovery/nuclei) | Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. | ![](https://img.shields.io/github/stars/projectdiscovery/nuclei) | ![](https://img.shields.io/github/languages/top/projectdiscovery/nuclei) | | Discovery/ALL | [OneForAll](https://github.com/shmilylty/OneForAll) | OneForAll是一款功能强大的子域收集工具 | ![](https://img.shields.io/github/stars/shmilylty/OneForAll) | ![](https://img.shields.io/github/languages/top/shmilylty/OneForAll) | diff --git a/data.json b/data.json index 325243d..63dfceb 100644 --- a/data.json +++ b/data.json @@ -2047,6 +2047,22 @@ "Windows": "cd postMessage-tracker ; git pull -v" } }, + "proxify": { + "Type": "Army-Knife", + "Data": "| Army-Knife/PROXY | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) |", + "Method": "PROXY", + "Description": "Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay", + "Install": { + "Linux": "", + "MacOS": "", + "Windows": "" + }, + "Update": { + "Linux": "", + "MacOS": "", + "Windows": "" + } + }, "pwncat": { "Data": "| Utility/PENTEST | [pwncat](https://github.com/cytopia/pwncat) | pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) | ![](https://img.shields.io/github/stars/cytopia/pwncat) | ![](https://img.shields.io/github/languages/top/cytopia/pwncat) |", "Description": "pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) ", @@ -2432,15 +2448,15 @@ } }, "weaponised-XSS-payloads": { - "Type": "Utility", "Data": "| Utility/PAYLOAD | [weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads) | XSS payloads designed to turn alert(1) into P1 | ![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads) | ![](https://img.shields.io/github/languages/top/hakluke/weaponised-XSS-payloads) |", - "Method": "PAYLOAD", "Description": "XSS payloads designed to turn alert(1) into P1", "Install": { "Linux": "", "MacOS": "", "Windows": "" }, + "Method": "PAYLOAD", + "Type": "Utility", "Update": { "Linux": "", "MacOS": "",