pull/43/head
hahwul 2022-08-19 16:26:26 +09:00
parent 4d191bb9df
commit f613267a87
315 changed files with 1634 additions and 1121 deletions

View File

@ -10,19 +10,19 @@ name: App Name
description: App Description description: App Description
url: App URL # https://github.com/hahwul/dalfox url: App URL # https://github.com/hahwul/dalfox
category: tool # tool / tool-addon / browser-addon / bookmarklet category: tool # tool / tool-addon / browser-addon / bookmarklet
type: # fuzzer / scanner / enum / etc... type: # recon / fuzzer / scanner / exploit / utils / etc
platform: platform:
- linux # linux - linux # linux
- macos # macos application - macos # macos application
- windows # windows application - windows # windows application
- firefox # firefox addon - firefox # firefox addon
- safari # safari addon - safari # safari addon
- chrome # chrome addon - chrome # chrome addon
- zap # zap addon - zap # zap addon
- burpsuite # burpsuite addon - burpsuite # burpsuite addon
# If supported crossplatform, you write out all three (linux/macos/windows) # If supported crossplatform, you write out all three (linux/macos/windows)
lang: [] lang: [] # go / python / ruby / rust / etc...
tags: [] tags: [] # xss / sqli / ssrf / oast / etc...
``` ```
![1415](https://user-images.githubusercontent.com/13212227/98445635-00db1e00-215c-11eb-8a59-d7d21dd98db0.png) ![1415](https://user-images.githubusercontent.com/13212227/98445635-00db1e00-215c-11eb-8a59-d7d21dd98db0.png)

613
README.md
View File

@ -24,319 +24,322 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
- [Thanks to contributor](#thanks-to-contributor) - [Thanks to contributor](#thanks-to-contributor)
## Weapons ## Weapons
- OS: Linux(![](./images/linux.png)) macOS(![](./images/apple.png)) Windows(![](./images/windows.png)) *Attributes*
- Browser-Addon: Firefox(![](./images/firefox.png)) Safari(![](./images/safari.png)) Chrome(![](./images/chrome.png)) | | Attributes |
- Tool-Addon: ZAP(![](./images/zap.png)) BurpSuite(![](./images/burp.png)) |-------|---------------------------------------------------|
| Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`|
| Tags | `infra` `param` `subdomains` `dns` `domain` `apk` `jwt` `ssrf` `s3` `sqli` `aaa` `403` `xss` `ssl` `csp` `xxe` `url` `oast` `wordlist` `report` |
| Langs | `Go` `Shell` `Java` `Python` `C` `Rust` `Ruby` `JavaScript` `Perl` `PHP` `C#` `TypeScript` `BlitzBasic` `Kotlin` `HTML` `CSS` `C++` |
### Tools ### Tools
| Type | Name | Description | Star | Badges | | Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | | --- | --- | --- | --- | --- | --- |
||[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Army-Knife|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)|| |Army-Knife|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)|| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|`infra`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Army-Knife|[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)||![](./images/java.png)|
||[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Army-Knife|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)||![](./images/go.png)|
||[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[SequenceDiagram](https://sequencediagram.org)| Online tool for creating UML sequence diagrams|x|| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[grc](https://github.com/garabik/grc)|generic colouriser|![](https://img.shields.io/github/stars/garabik/grc?label=%20)|| |Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)||![](./images/python.png)|
||[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)|| |Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20)|| |Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)|| |Recon|[Chaos Web](https://chaos.projectdiscovery.io)| actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Chaos Web](https://chaos.projectdiscovery.io)| actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|x|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)||![](./images/go.png)|
||[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||||
||[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |![](https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|`dns`|![](./images/go.png)|
||[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)|| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)|
||[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|`dns`|![](./images/rust.png)|
||[SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja)|SQL Injection scanner|x|| |Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)|
||[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)|| |Recon|[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|![](https://img.shields.io/github/stars/hakluke/haktrails?label=%20)||![](./images/go.png)|
||[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)|| |Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![](./images/shell.png)|
||[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records|x|| |Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)|
||[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |![](https://img.shields.io/github/stars/tomnomnom/hacks?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)| |Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |![](https://img.shields.io/github/stars/tomnomnom/meg?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|| |Recon|[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|![](https://img.shields.io/github/stars/opsdisk/pagodo?label=%20)||![](./images/python.png)|
||[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |![](https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)||![](./images/python.png)|
||[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|| |Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|![](https://img.shields.io/github/stars/assetnote/kiterunner?label=%20)|| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![](./images/rust.png)|
||[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|`dns`|![](./images/python.png)|
||[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|`domain`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|| |Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |![](https://img.shields.io/github/stars/riza/medusa?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|![](https://img.shields.io/github/stars/hahwul/gitls?label=%20)|| |Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|| |Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|`param`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |![](https://img.shields.io/github/stars/EdOverflow/megplus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |![](https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|`dns`|![](./images/go.png)|
||[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |![](https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[httptoolkit](https://github.com/httptoolkit/httptoolkit)|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac|![](https://img.shields.io/github/stars/httptoolkit/httptoolkit?label=%20)|| |Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |![](https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)|| |Recon|[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |![](https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|![](https://img.shields.io/github/stars/hakluke/haktrails?label=%20)|| |Recon|[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |![](https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |![](https://img.shields.io/github/stars/ffuf/ffuf?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|![](https://img.shields.io/github/stars/six2dez/reconftw?label=%20)||![](./images/shell.png)|
||[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|![](https://img.shields.io/github/stars/curl/curl?label=%20)|| |Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Phoenix](https://www.hahwul.com/p/phoenix.html)| hahwul's online tools|x|| |Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)||![](./images/rust.png)|
||[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|![](https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20)||![](./images/go.png)|
||[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |![](https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|`dns`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)| |Recon|[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |![](https://img.shields.io/github/stars/michenriksen/gitrob?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|| |Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices||||
||[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)|| |Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |![](https://img.shields.io/github/stars/htcat/htcat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |![](https://img.shields.io/github/stars/tomnomnom/meg?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|![](https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20)||![](./images/go.png)|
||[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|![](https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20)|| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||||
||[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|![](https://img.shields.io/github/stars/opsdisk/pagodo?label=%20)|| |Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|![](https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20)||![](./images/python.png)|
||[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)|| |Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)||![](./images/go.png)|
||[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)|| |Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)||![](./images/go.png)|
||[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|`apk`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)||![](./images/python.png)|
||[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[fockcache](https://github.com/tismayil/fockcache)|FockCache - Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)|| |Recon|[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs |![](https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20)|||
||[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)|| |Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)|| |Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|| |Recon|[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|![](https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20)||![](./images/rust.png)|
||[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)|| |Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|| |Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)||![](./images/python.png)|
||[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |![](https://img.shields.io/github/stars/s0md3v/Striker?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)||![](./images/go.png)|
||[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |![](https://img.shields.io/github/stars/hashcat/hashcat/?label=%20)|| |Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)|||
||[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|![](https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|![](https://img.shields.io/github/stars/epi052/feroxbuster?label=%20)|| |Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|`subdomains`||
||[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|| |Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)|||
||[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|![](https://img.shields.io/github/stars/neex/http2smugl?label=%20)|| |Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|`subdomains`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|| |Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |![](https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |![](https://img.shields.io/github/stars/EdOverflow/megplus?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)||![](./images/go.png)|
||[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)|| |Fuzzer|[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|![](https://img.shields.io/github/stars/assetnote/kiterunner?label=%20)||![](./images/go.png)|
||[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |![](https://img.shields.io/github/stars/riza/medusa?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)| SQL Injection scanner|x|| |Fuzzer|[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |![](https://img.shields.io/github/stars/ffuf/ffuf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|`ssrf`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)|| |Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/perl.png)|
||[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |![](https://img.shields.io/github/stars/Grunny/zap-cli?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)|
||[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)|| |Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |![](https://img.shields.io/github/stars/hashcat/hashcat/?label=%20)||![](./images/c.png)|
||[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|![](https://img.shields.io/github/stars/epi052/feroxbuster?label=%20)||![](./images/rust.png)|
||[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c.png)|
||[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. |![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|![](https://img.shields.io/github/stars/1N3/BruteX?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|| |Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)||![](./images/rust.png)|
||[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |![](https://img.shields.io/github/stars/cytopia/pwncat?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)| |Fuzzer|[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |![](https://img.shields.io/github/stars/xmendez/wfuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |![](https://img.shields.io/github/stars/codingo/VHostScan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |![](https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|`jwt`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20)||![](./images/perl.png)|
||[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)|| |Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |![](https://img.shields.io/github/stars/fransr/template-generator?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |![](https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|| |Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)||![](./images/python.png)|
||[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|| |Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)|
||[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|![](https://img.shields.io/github/stars/epinna/tplmap?label=%20)|| |Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|`sqli`|![](./images/python.png)|
||[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |![](https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|`403`|![](./images/go.png)|
||[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |![](https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)|
||[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)|
||[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|![](https://img.shields.io/github/stars/six2dez/reconftw?label=%20)|| |Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)|| |Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)||![](./images/go.png)|
||[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[fockcache](https://github.com/tismayil/fockcache)|FockCache - Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)||![](./images/go.png)|
||[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|| |Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)||![](./images/go.png)|
||[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |![](https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)||![](./images/go.png)|
||[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |![](https://img.shields.io/github/stars/s0md3v/Striker?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google|x|| |Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|![](https://img.shields.io/github/stars/neex/http2smugl?label=%20)||![](./images/go.png)|
||[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|| |Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)||![](./images/javascript.png)|
||[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)|| |Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)|| |Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|![](https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20)|| |Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |![](https://img.shields.io/github/stars/Grunny/zap-cli?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)||![](./images/go.png)|
||[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|`ssl`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)|
||[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)|| |Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |![](https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |![](https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |![](https://img.shields.io/github/stars/codingo/VHostScan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|![](https://img.shields.io/github/stars/epinna/tplmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|`ssl`|![](./images/java.png)|
||[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |![](https://img.shields.io/github/stars/michenriksen/gitrob?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |![](https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)|| |Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|`403`|![](./images/go.png)|
||[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)||![](./images/go.png)|
||[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|![](https://img.shields.io/github/stars/knqyf263/pet?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)| |Scanner|[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |![](https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)| |Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)|| |Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)||![](./images/javascript.png)|
||[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![](./images/c.png)|
||[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)||![](./images/go.png)|
||[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices|x|| |Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains and scan for endpoints, secrets, api keys, file extensions, tokens and more...|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|![](https://img.shields.io/github/stars/blackcrw/wprecon?label=%20)||![](./images/go.png)|
||[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|![](https://img.shields.io/github/stars/blackcrw/wprecon?label=%20)|| |Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)||![](./images/go.png)|
||[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)|| |Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)|||
||[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|| |Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)|
||[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)|| |Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)||![](./images/go.png)|
||[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)|| |Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|`xss`|![](./images/javascript.png)|
||[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |![](https://img.shields.io/github/stars/htcat/htcat?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|| |Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |![](https://img.shields.io/github/stars/sullo/nikto?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/perl.png)|
||[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)|| |Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)|| |Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)||![](./images/shell.png)|
||[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)|| |Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|![](https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20)|| |Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|![](https://img.shields.io/github/stars/hahwul/gee?label=%20)|| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)||![](./images/javascript.png)|
||[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|![](https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20)|| |Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |![](https://img.shields.io/github/stars/gwen001/github-search?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)|||
||[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)|| |Scanner|[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner|![](https://img.shields.io/github/stars/enkomio/Taipan?label=%20)|||
||[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)|||
||[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)|| |Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool|x|| |Exploit|[SQL Ninja](https://gitlab.com/kalilinux/packages/sqlninja)|SQL Injection scanner||||
||[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|![](https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20)|| |Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)| SQL Injection scanner||||
||[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)|| |Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)||![](./images/python.png)|
||[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. |![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![](./images/go.png)|
||[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|`xxe`|![](./images/ruby.png)|
||[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|| |Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)||![](./images/javascript.png)|
||[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|`url`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. |![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[SequenceDiagram](https://sequencediagram.org)| Online tool for creating UML sequence diagrams||||
||[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[grc](https://github.com/garabik/grc)|generic colouriser|![](https://img.shields.io/github/stars/garabik/grc?label=%20)||![](./images/python.png)|
||[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)|| |Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/php.png)|
||[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |![](https://img.shields.io/github/stars/sullo/nikto?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)||![](./images/shell.png)|
||[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)|| |Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)||![](./images/go.png)|
||[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang |![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |![](https://img.shields.io/github/stars/tomnomnom/hacks?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/c#.png)|
||[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|![](https://img.shields.io/github/stars/hahwul/gitls?label=%20)||![](./images/go.png)|
||[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|![](https://img.shields.io/github/stars/1N3/BruteX?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |![](https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[httptoolkit](https://github.com/httptoolkit/httptoolkit)|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac|![](https://img.shields.io/github/stars/httptoolkit/httptoolkit?label=%20)|||
||[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)||![](./images/javascript.png)|
||[zaproxy](https://github.com/zaproxy/zaproxy)|The OWASP ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|| |Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|![](https://img.shields.io/github/stars/curl/curl?label=%20)||![](./images/c.png)|
||[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |![](https://img.shields.io/github/stars/gchq/CyberChef?label=%20)|| |Utils|[Phoenix](https://www.hahwul.com/p/phoenix.html)| hahwul's online tools||||
||[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs |![](https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20)|| |Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|`s3`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|| |Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/java.png)|
||[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|`xss`|![](./images/javascript.png)|
||[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|![](https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20)|| |Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)||![](./images/javascript.png)|
||[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|| |Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|![](https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20)||![](./images/rust.png)|
||[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)|| |Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)|| |Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|`oast`|![](./images/go.png)|
||[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|![](https://img.shields.io/github/stars/google/security-research-pocs?label=%20)|| |Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|`oast` `dns`|![](./images/go.png)|
||[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)|||
||[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |![](https://img.shields.io/github/stars/cytopia/pwncat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![](./images/shell.png)|
||[gron](https://github.com/tomnomnom/gron)|Make JSON greppable! |![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)|| |Utils|[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |![](https://img.shields.io/github/stars/fransr/template-generator?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/javascript.png)|
||[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|![](https://img.shields.io/github/stars/samyk/quickjack?label=%20)|| |Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|`xss`|![](./images/javascript.png)|
||[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)|| |Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|`xxe` `xss`|![](./images/python.png)|
||[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |![](https://img.shields.io/github/stars/tomnomnom/gf?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![](./images/html.png)|
||[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google||||
||[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)||![](./images/go.png)|
||[BurpSuite](https://portswigger.net/burp)|the BurpSuite Project|x|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|`xxe`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)|| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|![](https://img.shields.io/github/stars/knqyf263/pet?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![](./images/go.png)|
||[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)|| |Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)||![](./images/shell.png)|
||[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |![](https://img.shields.io/github/stars/gwen001/github-search?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)||![](./images/go.png)|
||[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |![](https://img.shields.io/github/stars/xmendez/wfuzz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)||![](./images/go.png)|
||[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)|| |Utils|[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)||![](./images/go.png)|
||[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)|| |Utils|[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|![](https://img.shields.io/github/stars/hahwul/gee?label=%20)||![](./images/go.png)|
||[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.|![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|![](https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20)||![](./images/go.png)|
||[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|![](https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|`wordlist`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/css.png)|
||[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)|| |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|`report`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/shell.png)|
||[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20)|| |Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. |![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20)|`xss`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|| |Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/ruby.png)|
||[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|`oast`|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/python.png)|
||[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |![](https://img.shields.io/github/stars/gchq/CyberChef?label=%20)||![](./images/javascript.png)|
||[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)|| |Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|![](https://img.shields.io/github/stars/google/security-research-pocs?label=%20)||![](./images/c++.png)|
||[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|![](https://img.shields.io/github/stars/sharkdp/bat?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable! |![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|![](https://img.shields.io/github/stars/defparam/tiscripts?label=%20)|| |Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|![](https://img.shields.io/github/stars/samyk/quickjack?label=%20)||![](./images/javascript.png)|
||[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |![](https://img.shields.io/github/stars/tomnomnom/gf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)![](./images/go.png)|
||[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|![](https://img.shields.io/github/stars/pemistahl/grex?label=%20)|| |Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)|||
||[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner|![](https://img.shields.io/github/stars/enkomio/Taipan?label=%20)|| |Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. |![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.|![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)|| |Utils|[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20)|||
||[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|![](https://img.shields.io/github/stars/sharkdp/bat?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|| |Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|![](https://img.shields.io/github/stars/defparam/tiscripts?label=%20)|||
||[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|![](https://img.shields.io/github/stars/pemistahl/grex?label=%20)|||
||[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[httpie](https://github.com/httpie/httpie)|As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. https://twitter.com/httpie|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|||
||[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |![](https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
||[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)|![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)| |Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](./images/linux.png)![macos](./images/apple.png)![windows](./images/windows.png)|
### Bookmarklets ### Bookmarklets
| Type | Name | Description | Star | Badges | | Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | | --- | --- | --- | --- | --- | --- |
### Browser Addons ### Browser Addons
| Type | Name | Description | Star | Badges | | Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | | --- | --- | --- | --- | --- | --- |
||[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|![chrome](./images/chrome.png)![firefox](./images/firefox.png)| |Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|||![safari](./images/safari.png)|
||[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)|![firefox](./images/firefox.png)| |Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)||![chrome](./images/chrome.png)![firefox](./images/firefox.png)![](./images/javascript.png)|
||[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)|![chrome](./images/chrome.png)![firefox](./images/firefox.png)| |Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|`jwt`|![chrome](./images/chrome.png)![firefox](./images/firefox.png)![](./images/javascript.png)|
||[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|x|![safari](./images/safari.png)| |Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)||![firefox](./images/firefox.png)![](./images/javascript.png)|
||[User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae)|quick and easy way to switch between user-agents.|x|![chrome](./images/chrome.png)| |Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)||![chrome](./images/chrome.png)![firefox](./images/firefox.png)![](./images/typescript.png)|
||[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)|![chrome](./images/chrome.png)| |Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|||![safari](./images/safari.png)|
||[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|x|![chrome](./images/chrome.png)![firefox](./images/firefox.png)| |Utils|[User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher/clddifkhlkcojbojppdojfeeikdkgiae)|quick and easy way to switch between user-agents.|||![chrome](./images/chrome.png)|
||[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|x|![safari](./images/safari.png)| |Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)||![chrome](./images/chrome.png)![](./images/javascript.png)|
||[Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh)|Dark mode to any site|x|![chrome](./images/chrome.png)![firefox](./images/firefox.png)| |Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![chrome](./images/chrome.png)![firefox](./images/firefox.png)|
||[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)|![chrome](./images/chrome.png)![firefox](./images/firefox.png)| |Utils|[Dark Reader](https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh)|Dark mode to any site|||![chrome](./images/chrome.png)![firefox](./images/firefox.png)|
||[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)|![chrome](./images/chrome.png)| |Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)||![chrome](./images/chrome.png)![](./images/javascript.png)|
||[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)|![firefox](./images/firefox.png)| |Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)||![firefox](./images/firefox.png)![](./images/javascript.png)|
||[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|![firefox](./images/firefox.png)| |Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|`xss`|![firefox](./images/firefox.png)![](./images/javascript.png)|
### Burpsuite and ZAP Addons ### Burpsuite and ZAP Addons
| Type | Name | Description | Star | Badges | | Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | | --- | --- | --- | --- | --- | --- |
||[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)|![burp](./images/burp.png)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)||![burp](./images/burp.png)![](./images/python.png)|
||[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|![burp](./images/burp.png)| |Recon|[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)||![burp](./images/burp.png)![zap](./images/zap.png)![](./images/python.png)|
||[HUNT](https://github.com/bugcrowd/HUNT)||![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|![burp](./images/burp.png)![zap](./images/zap.png)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)||![zap](./images/zap.png)![](./images/java.png)|
||[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)|![burp](./images/burp.png)| |Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![burp](./images/burp.png)|
||[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|![burp](./images/burp.png)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)||![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|![zap](./images/zap.png)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)||![burp](./images/burp.png)![zap](./images/zap.png)![](./images/javascript.png)|
||[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|![burp](./images/burp.png)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)||![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|`param`|![burp](./images/burp.png)![](./images/java.png)|
||[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)|![burp](./images/burp.png)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|`aaa`|![burp](./images/burp.png)![](./images/python.png)|
||[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)|![burp](./images/burp.png)| |Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)|![burp](./images/burp.png)| |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|`aaa`|![burp](./images/burp.png)![](./images/python.png)|
||[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)|![burp](./images/burp.png)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|`csp`|![burp](./images/burp.png)![zap](./images/zap.png)![](./images/java.png)|
||[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)|![burp](./images/burp.png)| |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)|![burp](./images/burp.png)| |Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)||![burp](./images/burp.png)|
||[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)|![burp](./images/burp.png)![zap](./images/zap.png)| |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)|![burp](./images/burp.png)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|`oast`|![burp](./images/burp.png)![](./images/java.png)|
||[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)|![burp](./images/burp.png)| |Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![burp](./images/burp.png)![](./images/blitzbasic.png)|
||[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)|![burp](./images/burp.png)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![burp](./images/burp.png)![](./images/kotlin.png)|
||[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|![burp](./images/burp.png)| |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![burp](./images/burp.png)|
||[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)|![zap](./images/zap.png)| |Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![burp](./images/burp.png)![](./images/blitzbasic.png)|
||[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)|![burp](./images/burp.png)| |Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)|![burp](./images/burp.png)| |Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)|![burp](./images/burp.png)| |Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![burp](./images/burp.png)![zap](./images/zap.png)![](./images/java.png)|
||[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)|![burp](./images/burp.png)| |Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![burp](./images/burp.png)![](./images/python.png)|
||[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|![burp](./images/burp.png)![zap](./images/zap.png)| |Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![burp](./images/burp.png)![](./images/python.png)|
||[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)|![burp](./images/burp.png)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![zap](./images/zap.png)![](./images/java.png)|
||[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)|![burp](./images/burp.png)| |Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)|![burp](./images/burp.png)![zap](./images/zap.png)| |Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![burp](./images/burp.png)![](./images/python.png)|
||[reflect](https://github.com/TypeError/reflect)||![](https://img.shields.io/github/stars/TypeError/reflect?label=%20)|![zap](./images/zap.png)| |Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![burp](./images/burp.png)![](./images/java.png)|
||[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|![zap](./images/zap.png)| |Utils|[reflect](https://github.com/TypeError/reflect)||![](https://img.shields.io/github/stars/TypeError/reflect?label=%20)||![zap](./images/zap.png)|
||[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)|![burp](./images/burp.png)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|`jwt`|![zap](./images/zap.png)![](./images/java.png)|
||[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)|![zap](./images/zap.png)| |Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![burp](./images/burp.png)![](./images/kotlin.png)|
||[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)|![burp](./images/burp.png)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![zap](./images/zap.png)![](./images/javascript.png)|
||[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)|![burp](./images/burp.png)| |Utils|[auto-repeater](https://github.com/PortSwigger/auto-repeater)||![](https://img.shields.io/github/stars/PortSwigger/auto-repeater?label=%20)||![burp](./images/burp.png)|
## Thanks to (Contributor) ## Thanks to (Contributor)
I would like to thank everyone who helped with this project 👍😎 I would like to thank everyone who helped with this project 👍😎

BIN
images/c#.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1002 B

BIN
images/c.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 KiB

BIN
images/go.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 629 B

BIN
images/html.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 813 B

BIN
images/java.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 898 B

BIN
images/javascript.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 759 B

BIN
images/kotlin.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.0 KiB

BIN
images/perl.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 872 B

BIN
images/php.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 780 B

BIN
images/python.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 757 B

BIN
images/ruby.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 KiB

BIN
images/rust.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 KiB

BIN
images/shell.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 592 B

BIN
images/typescript.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 757 B

View File

@ -63,7 +63,7 @@ A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hun
*Attributes* *Attributes*
| | Attributes | | | Attributes |
|-------|---------------------------------------------------| |-------|---------------------------------------------------|
| Types | `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`| | Types | `Army-Knife` `Recon` `Fuzzer` `Scanner` `Exploit` `Utils` `Etc`|
| Tags | <%= tags.uniq.join ' ' %> | | Tags | <%= tags.uniq.join ' ' %> |
| Langs | <%= langs.uniq.join ' ' %> | | Langs | <%= langs.uniq.join ' ' %> |
@ -96,6 +96,7 @@ tool_addons = head + "\n"
weapons = [] weapons = []
weapons_obj = { weapons_obj = {
"army-knife" => [],
"recon"=> [], "recon"=> [],
"fuzzer"=> [], "fuzzer"=> [],
"scanner"=> [], "scanner"=> [],
@ -147,7 +148,6 @@ weapons.each do | data |
popularity = "![](https://img.shields.io/github/stars/#{split_result[1]}?label=%20)" popularity = "![](https://img.shields.io/github/stars/#{split_result[1]}?label=%20)"
end end
badge = generate_badge(data['platform']) badge = generate_badge(data['platform'])
badge = badge + generate_tags(data['tags'])
line = "|#{data['type']}|#{name}|#{data['description']}|#{popularity}|#{temp_tags.join ' '}|#{badge}#{lang_badge}|" line = "|#{data['type']}|#{name}|#{data['description']}|#{popularity}|#{temp_tags.join ' '}|#{badge}#{lang_badge}|"
case data['category'].downcase case data['category'].downcase
when 'tool' when 'tool'

View File

@ -0,0 +1,14 @@
require 'yaml'
Dir.entries("./weapons").each do | name |
if name.strip != "." || name != ".."
begin
data = YAML.load(File.open("./weapons/#{name}"))
data['platform'] = ['linux','macos','windows']
yaml_data = YAML.dump(data)
File.write("./weapons/#{name}", yaml_data)
rescue => e
puts e
end
end
end

View File

@ -0,0 +1,22 @@
require 'yaml'
Dir.entries("./weapons").each do | name |
if name.strip != "." || name != ".."
begin
data = YAML.load(File.open("./weapons/#{name}"))
if data['type'] == "" || data['type'] == nil
puts "./weapons/#{name} :: none-type"
end
if data['lang'] == "" || data['lang'] == nil || data['lang'].length == 0
if data['url'].include? "github.com"
puts "./weapons/#{name} :: none-lang"
end
end
if data['tags'].length == 0 || data['tags'] == nil
#puts "#{name} :: none-tags"
end
rescue => e
puts e
end
end
end

View File

@ -3,10 +3,11 @@ name: 230-OOB
description: An Out-of-Band XXE server for retrieving file contents over FTP. description: An Out-of-Band XXE server for retrieving file contents over FTP.
url: https://github.com/lc/230-OOB url: https://github.com/lc/230-OOB
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- xxe

View File

@ -4,10 +4,10 @@ description: Automation Recon tool which works with Large & Medium scopes. It pe
more than 20 tasks and gets back all the results in separated files. more than 20 tasks and gets back all the results in separated files.
url: https://github.com/eslam3kl/3klCon url: https://github.com/eslam3kl/3klCon
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,10 +3,11 @@ name: AWSBucketDump
description: Security Tool to Look For Interesting Files in S3 Buckets description: Security Tool to Look For Interesting Files in S3 Buckets
url: https://github.com/jordanpotti/AWSBucketDump url: https://github.com/jordanpotti/AWSBucketDump
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- s3

View File

@ -3,10 +3,11 @@ name: Amass
description: 'In-depth Attack Surface Mapping and Asset Discovery ' description: 'In-depth Attack Surface Mapping and Asset Discovery '
url: https://github.com/OWASP/Amass url: https://github.com/OWASP/Amass
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Go
tags: [] tags:
- subdomains

View File

@ -3,10 +3,11 @@ name: Arjun
description: 'HTTP parameter discovery suite. ' description: 'HTTP parameter discovery suite. '
url: https://github.com/s0md3v/Arjun url: https://github.com/s0md3v/Arjun
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- param

View File

@ -3,10 +3,11 @@ name: Assetnote Wordlists
description: Automated & Manual Wordlists provided by Assetnote description: Automated & Manual Wordlists provided by Assetnote
url: https://github.com/assetnote/wordlists url: https://github.com/assetnote/wordlists
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: CSS
tags: [] tags:
- wordlist

View File

@ -3,10 +3,10 @@ name: Atlas
description: 'Quick SQLMap Tamper Suggester ' description: 'Quick SQLMap Tamper Suggester '
url: https://github.com/m4ll0k/Atlas url: https://github.com/m4ll0k/Atlas
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,8 +3,11 @@ name: AuthMatrix
description: description:
url: https://github.com/SecurityInnovation/AuthMatrix url: https://github.com/SecurityInnovation/AuthMatrix
category: tool-addon category: tool-addon
type: type: Scanner
platform: platform:
- burpsuite - linux
lang: [] - macos
tags: [] - windows
lang: Python
tags:
- aaa

View File

@ -3,8 +3,11 @@ name: Autorize
description: description:
url: https://github.com/Quitten/Autorize url: https://github.com/Quitten/Autorize
category: tool-addon category: tool-addon
type: type: Scanner
platform: platform:
- burpsuite - linux
lang: [] - macos
tags: [] - windows
lang: Python
tags:
- aaa

View File

@ -3,10 +3,10 @@ name: Blacklist3r
description: 'project-blacklist3r ' description: 'project-blacklist3r '
url: https://github.com/NotSoSecure/Blacklist3r url: https://github.com/NotSoSecure/Blacklist3r
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: C#
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: BruteX
description: Automatically brute force all services running on a target. description: Automatically brute force all services running on a target.
url: https://github.com/1N3/BruteX url: https://github.com/1N3/BruteX
category: tool category: tool
type: type: Fuzzer
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Shell
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Bug-Bounty-Toolz
description: 'BBT - Bug Bounty Tools ' description: 'BBT - Bug Bounty Tools '
url: https://github.com/m4ll0k/Bug-Bounty-Toolz url: https://github.com/m4ll0k/Bug-Bounty-Toolz
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpBounty
description: description:
url: https://github.com/wagiro/BurpBounty url: https://github.com/wagiro/BurpBounty
category: tool-addon category: tool-addon
type: type: Utils
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: BlitzBasic
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpCustomizer
description: Because just a dark theme wasn't enough! description: Because just a dark theme wasn't enough!
url: https://github.com/CoreyD97/BurpCustomizer url: https://github.com/CoreyD97/BurpCustomizer
category: tool-addon category: tool-addon
type: type: Utils
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: Java
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpJSLinkFinder
description: description:
url: https://github.com/InitRoot/BurpJSLinkFinder url: https://github.com/InitRoot/BurpJSLinkFinder
category: tool-addon category: tool-addon
type: type: Recon
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: Python
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpSuite-Secret_Finder
description: description:
url: https://github.com/m4ll0k/BurpSuite-Secret_Finder url: https://github.com/m4ll0k/BurpSuite-Secret_Finder
category: tool-addon category: tool-addon
type: type: Recon
platform: platform:
- burpsuite - linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: BurpSuite
description: the BurpSuite Project description: the BurpSuite Project
url: https://portswigger.net/burp url: https://portswigger.net/burp
category: tool category: tool
type: type: Army-Knife
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Java
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpSuiteHTTPSmuggler
description: description:
url: https://github.com/nccgroup/BurpSuiteHTTPSmuggler url: https://github.com/nccgroup/BurpSuiteHTTPSmuggler
category: tool-addon category: tool-addon
type: type: Scanner
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: Java
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: BurpSuiteLoggerPlusPlus
description: description:
url: https://github.com/nccgroup/BurpSuiteLoggerPlusPlus url: https://github.com/nccgroup/BurpSuiteLoggerPlusPlus
category: tool-addon category: tool-addon
type: type: Utils
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: Java
tags: [] tags: []

View File

@ -1,9 +1,12 @@
--- ---
name: CSP Evaluator name: CSP Evaluator
description: "Online CSP Evaluator from google" description: Online CSP Evaluator from google
url: https://csp-evaluator.withgoogle.com url: https://csp-evaluator.withgoogle.com
category: tool category: tool
type: type: Utils
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -4,7 +4,10 @@ description: 'An hourly updated list of subdomains gathered from certificate tra
logs ' logs '
url: https://github.com/internetwache/CT_subdomains url: https://github.com/internetwache/CT_subdomains
category: tool category: tool
type: type: Recon
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: 'null'
tags: [] tags: []

View File

@ -4,7 +4,7 @@ description: " actively scan and maintain internet-wide assets' data. enhance re
and analyse changes around DNS for better insights." and analyse changes around DNS for better insights."
url: https://chaos.projectdiscovery.io url: https://chaos.projectdiscovery.io
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos

View File

@ -4,7 +4,10 @@ description: Cyclops is a web browser with XSS detection feature, it is chromium
xss detection that used to find the flows from a source to a sink. xss detection that used to find the flows from a source to a sink.
url: https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking url: https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: 'null'
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: CorsMe
description: 'Cross Origin Resource Sharing MisConfiguration Scanner ' description: 'Cross Origin Resource Sharing MisConfiguration Scanner '
url: https://github.com/Shivangx01b/CorsMe url: https://github.com/Shivangx01b/CorsMe
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Go
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Corsy
description: 'CORS Misconfiguration Scanner ' description: 'CORS Misconfiguration Scanner '
url: https://github.com/s0md3v/Corsy url: https://github.com/s0md3v/Corsy
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -4,7 +4,10 @@ description: 'The Cyber Swiss Army Knife - a web app for encryption, encoding, c
and data analysis ' and data analysis '
url: https://github.com/gchq/CyberChef url: https://github.com/gchq/CyberChef
category: tool category: tool
type: type: Utils
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: JavaScript
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: DNSDumpster
description: " Online dns recon & research, find & lookup dns records" description: " Online dns recon & research, find & lookup dns records"
url: https://dnsdumpster.com url: https://dnsdumpster.com
category: tool category: tool
type: type: Recon
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -5,7 +5,11 @@ description: 'DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer fo
configurability and hooks. Demo:' configurability and hooks. Demo:'
url: https://github.com/cure53/DOMPurify url: https://github.com/cure53/DOMPurify
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
tags: [] - macos
- windows
lang: JavaScript
tags:
- xss

View File

@ -3,7 +3,10 @@ name: DSSS
description: Damn Small SQLi Scanner description: Damn Small SQLi Scanner
url: https://github.com/stamparm/DSSS url: https://github.com/stamparm/DSSS
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Python
tags: [] tags: []

View File

@ -3,9 +3,10 @@ name: Dark Reader
description: Dark mode to any site description: Dark mode to any site
url: https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh url: https://chrome.google.com/webstore/detail/dark-reader/eimadpbcbfnmbkopoojfekhnkhdbieeh
category: browser-addon category: browser-addon
type: type: Utils
platform: platform:
- chrome - linux
- firefox - macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: Dark Reader for Safari
description: Dark mode to any site description: Dark mode to any site
url: https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180 url: https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180
category: browser-addon category: browser-addon
type: type: Utils
platform: platform:
- safari - linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,7 +3,11 @@ name: DeepViolet
description: Tool for introspection of SSL\TLS sessions description: Tool for introspection of SSL\TLS sessions
url: https://github.com/spoofzu/DeepViolet url: https://github.com/spoofzu/DeepViolet
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
tags: [] - macos
- windows
lang: Java
tags:
- ssl

View File

@ -4,7 +4,11 @@ description: DirDar is a tool that searches for (403-Forbidden) directories to b
it and get dir listing on it it and get dir listing on it
url: https://github.com/M4DM0e/DirDar url: https://github.com/M4DM0e/DirDar
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
tags: [] - macos
- windows
lang: Go
tags:
- 403

View File

@ -3,9 +3,10 @@ name: DotGit
description: An extension for checking if .git is exposed in visited websites description: An extension for checking if .git is exposed in visited websites
url: https://github.com/davtur19/DotGit url: https://github.com/davtur19/DotGit
category: browser-addon category: browser-addon
type: type: Recon
platform: platform:
- chrome - linux
- firefox - macos
lang: [] - windows
lang: JavaScript
tags: [] tags: []

View File

@ -4,8 +4,10 @@ description: EditThisCookie is the famous Google Chrome/Chromium extension for e
cookies cookies
url: https://github.com/ETCExtensions/Edit-This-Cookie url: https://github.com/ETCExtensions/Edit-This-Cookie
category: browser-addon category: browser-addon
type: type: Utils
platform: platform:
- chrome - linux
lang: [] - macos
- windows
lang: JavaScript
tags: [] tags: []

View File

@ -4,7 +4,10 @@ description: Send notifications on different channels such as Slack, Telegram, D
etc. etc.
url: https://github.com/BountyStrike/Emissary url: https://github.com/BountyStrike/Emissary
category: tool category: tool
type: type: Utils
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Go
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: FavFreak
description: 'Making Favicon.ico based Recon Great again ! ' description: 'Making Favicon.ico based Recon Great again ! '
url: https://github.com/devanshbatham/FavFreak url: https://github.com/devanshbatham/FavFreak
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: Findsploit
description: Find exploits in local and online databases instantly description: Find exploits in local and online databases instantly
url: https://github.com/1N3/Findsploit url: https://github.com/1N3/Findsploit
category: tool category: tool
type: type: Utils
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Shell
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_
parameters grep ' parameters grep '
url: https://github.com/1ndianl33t/Gf-Patterns url: https://github.com/1ndianl33t/Gf-Patterns
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: 'null'
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: GitMiner
description: 'Tool for advanced mining for content on Github ' description: 'Tool for advanced mining for content on Github '
url: https://github.com/UnkL4b/GitMiner url: https://github.com/UnkL4b/GitMiner
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'This tool generates gopher link for exploiting SSRF and gaining RC
in various servers ' in various servers '
url: https://github.com/tarunkant/Gopherus url: https://github.com/tarunkant/Gopherus
category: tool category: tool
type: type: Exploit
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'GraphQLmap is a scripting engine to interact with a graphql endpoi
for pentesting purposes. ' for pentesting purposes. '
url: https://github.com/swisskyrepo/GraphQLmap url: https://github.com/swisskyrepo/GraphQLmap
category: tool category: tool
type: type: Fuzzer
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -4,7 +4,10 @@ description: HTTP Request Smuggling demonstration Perl script, for variants 1, 2
5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.
url: https://github.com/SafeBreach-Labs/HRS url: https://github.com/SafeBreach-Labs/HRS
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Perl
tags: [] tags: []

View File

@ -3,9 +3,10 @@ name: HUNT
description: description:
url: https://github.com/bugcrowd/HUNT url: https://github.com/bugcrowd/HUNT
category: tool-addon category: tool-addon
type: type: Recon
platform: platform:
- burpsuite - linux
- zap - macos
lang: [] - windows
lang: Python
tags: [] tags: []

View File

@ -3,9 +3,10 @@ name: Hack-Tools
description: "The all-in-one Red Team extension for Web Pentester \U0001F6E0" description: "The all-in-one Red Team extension for Web Pentester \U0001F6E0"
url: https://github.com/LasCC/Hack-Tools url: https://github.com/LasCC/Hack-Tools
category: browser-addon category: browser-addon
type: type: Utils
platform: platform:
- chrome - linux
- firefox - macos
lang: [] - windows
lang: TypeScript
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: HydraRecon
description: All In One, Fast, Easy Recon Tool description: All In One, Fast, Easy Recon Tool
url: https://github.com/aufzayed/HydraRecon url: https://github.com/aufzayed/HydraRecon
category: tool category: tool
type: type: Recon
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Python
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: IntruderPayloads
description: description:
url: https://github.com/1N3/IntruderPayloads url: https://github.com/1N3/IntruderPayloads
category: tool-addon category: tool-addon
type: type: Utils
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: BlitzBasic
tags: [] tags: []

View File

@ -3,9 +3,10 @@ name: JSFScan.sh
description: 'Automation for javascript recon in bug bounty. ' description: 'Automation for javascript recon in bug bounty. '
url: https://github.com/KathanP19/JSFScan.sh url: https://github.com/KathanP19/JSFScan.sh
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
lang: [] - windows
lang: Shell
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: LFISuite
description: 'Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner ' description: 'Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner '
url: https://github.com/D35m0nd142/LFISuite url: https://github.com/D35m0nd142/LFISuite
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: LinkFinder
description: 'A python script that finds endpoints in JavaScript files ' description: 'A python script that finds endpoints in JavaScript files '
url: https://github.com/GerbenJavado/LinkFinder url: https://github.com/GerbenJavado/LinkFinder
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,9 +3,10 @@ name: MM3 ProxySwitch
description: Proxy Switch in Firefox and Chrome description: Proxy Switch in Firefox and Chrome
url: https://proxy-offline-browser.com/ProxySwitch/ url: https://proxy-offline-browser.com/ProxySwitch/
category: browser-addon category: browser-addon
type: type: Utils
platform: platform:
- chrome - linux
- firefox - macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'Automated NoSQL database enumeration and web application exploitat
tool. ' tool. '
url: https://github.com/codingo/NoSQLMap url: https://github.com/codingo/NoSQLMap
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: OneForAll
description: 'OneForAll是一款功能强大的子域收集工具 ' description: 'OneForAll是一款功能强大的子域收集工具 '
url: https://github.com/shmilylty/OneForAll url: https://github.com/shmilylty/OneForAll
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: OpenRedireX
description: A Fuzzer for OpenRedirect issues description: A Fuzzer for OpenRedirect issues
url: https://github.com/devanshbatham/OpenRedireX url: https://github.com/devanshbatham/OpenRedireX
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Python
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'Fully automated offensive security framework for reconnaissance an
vulnerability scanning ' vulnerability scanning '
url: https://github.com/j3ssie/Osmedeus url: https://github.com/j3ssie/Osmedeus
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Go
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: PPScan
description: Client Side Prototype Pollution Scanner description: Client Side Prototype Pollution Scanner
url: https://github.com/msrkp/PPScan url: https://github.com/msrkp/PPScan
category: tool category: tool
type: type: Scanner
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: JavaScript
tags: [] tags: []

View File

@ -3,10 +3,11 @@ name: ParamSpider
description: 'Mining parameters from dark corners of Web Archives ' description: 'Mining parameters from dark corners of Web Archives '
url: https://github.com/devanshbatham/ParamSpider url: https://github.com/devanshbatham/ParamSpider
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- param

View File

@ -3,10 +3,11 @@ name: Parth
description: 'Heuristic Vulnerable Parameter Scanner ' description: 'Heuristic Vulnerable Parameter Scanner '
url: https://github.com/s0md3v/Parth url: https://github.com/s0md3v/Parth
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- param

View File

@ -4,7 +4,10 @@ description: 'A list of useful payloads and bypass for Web Application Security
Pentest/CTF ' Pentest/CTF '
url: https://github.com/swisskyrepo/PayloadsAllTheThings url: https://github.com/swisskyrepo/PayloadsAllTheThings
category: tool category: tool
type: type: Utils
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Python
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: Phoenix
description: " hahwul's online tools" description: " hahwul's online tools"
url: https://www.hahwul.com/p/phoenix.html url: https://www.hahwul.com/p/phoenix.html
category: tool category: tool
type: type: Utils
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Photon
description: 'Incredibly fast crawler designed for OSINT. ' description: 'Incredibly fast crawler designed for OSINT. '
url: https://github.com/s0md3v/Photon url: https://github.com/s0md3v/Photon
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: PoC-in-GitHub
description: "\U0001F4E1 PoC auto collect from GitHub. Be careful malware." description: "\U0001F4E1 PoC auto collect from GitHub. Be careful malware."
url: https://github.com/nomi-sec/PoC-in-GitHub url: https://github.com/nomi-sec/PoC-in-GitHub
category: tool category: tool
type: type: Utils
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: 'null'
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: RustScan
description: 'Faster Nmap Scanning with Rust ' description: 'Faster Nmap Scanning with Rust '
url: https://github.com/brandonskerritt/RustScan url: https://github.com/brandonskerritt/RustScan
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Rust
tags: [] tags: []

View File

@ -3,10 +3,11 @@ name: S3Scanner
description: 'Scan for open AWS S3 buckets and dump the contents ' description: 'Scan for open AWS S3 buckets and dump the contents '
url: https://github.com/sa7mon/S3Scanner url: https://github.com/sa7mon/S3Scanner
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- s3

View File

@ -3,7 +3,10 @@ name: SQLNinja
description: " SQL Injection scanner" description: " SQL Injection scanner"
url: https://gitlab.com/kalilinux/packages/sqlninja url: https://gitlab.com/kalilinux/packages/sqlninja
category: tool category: tool
type: type: Exploit
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: SQL Ninja
description: SQL Injection scanner description: SQL Injection scanner
url: https://gitlab.com/kalilinux/packages/sqlninja url: https://gitlab.com/kalilinux/packages/sqlninja
category: tool category: tool
type: type: Exploit
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,10 +3,11 @@ name: SSRFmap
description: 'Automatic SSRF fuzzer and exploitation tool ' description: 'Automatic SSRF fuzzer and exploitation tool '
url: https://github.com/swisskyrepo/SSRFmap url: https://github.com/swisskyrepo/SSRFmap
category: tool category: tool
type: type: Fuzzer
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- ssrf

View File

@ -3,7 +3,10 @@ name: STEWS
description: A Security Tool for Enumerating WebSockets description: A Security Tool for Enumerating WebSockets
url: https://github.com/PalindromeLabs/STEWS url: https://github.com/PalindromeLabs/STEWS
category: tool category: tool
type: type: Recon
platform: [] platform:
lang: [] - linux
- macos
- windows
lang: Python
tags: [] tags: []

View File

@ -6,10 +6,10 @@ description: 'SecLists is the security tester''s companion. It''s a collection o
payloads, web shells, and many more. ' payloads, web shells, and many more. '
url: https://github.com/danielmiessler/SecLists url: https://github.com/danielmiessler/SecLists
category: tool category: tool
type: type: Utils
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: PHP
tags: [] tags: []

View File

@ -4,10 +4,10 @@ description: 'SecretFinder - A python script for find sensitive data (apikeys, a
and search anything on javascript files ' and search anything on javascript files '
url: https://github.com/m4ll0k/SecretFinder url: https://github.com/m4ll0k/SecretFinder
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: SecurityTrails
description: " Online dns / subdomain / recon tool" description: " Online dns / subdomain / recon tool"
url: https://securitytrails.com url: https://securitytrails.com
category: tool category: tool
type: type: Recon
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: SequenceDiagram
description: " Online tool for creating UML sequence diagrams" description: " Online tool for creating UML sequence diagrams"
url: https://sequencediagram.org url: https://sequencediagram.org
category: tool category: tool
type: type: Utils
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,7 +3,10 @@ name: Shodan
description: " World's first search engine for Internet-connected devices" description: " World's first search engine for Internet-connected devices"
url: https://www.shodan.io/ url: https://www.shodan.io/
category: tool category: tool
type: type: Recon
platform: [] platform:
- linux
- macos
- windows
lang: [] lang: []
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Silver
description: 'Mass scan IPs for vulnerable services ' description: 'Mass scan IPs for vulnerable services '
url: https://github.com/s0md3v/Silver url: https://github.com/s0md3v/Silver
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Sn1per
description: 'Automated pentest framework for offensive security experts ' description: 'Automated pentest framework for offensive security experts '
url: https://github.com/1N3/Sn1per url: https://github.com/1N3/Sn1per
category: tool category: tool
type: type: Exploit
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Shell
tags: [] tags: []

View File

@ -3,8 +3,10 @@ name: Stepper
description: description:
url: https://github.com/CoreyD97/Stepper url: https://github.com/CoreyD97/Stepper
category: tool-addon category: tool-addon
type: type: Utils
platform: platform:
- burpsuite - linux
lang: [] - macos
- windows
lang: Java
tags: [] tags: []

View File

@ -3,10 +3,10 @@ name: Striker
description: 'Striker is an offensive information and vulnerability scanner. ' description: 'Striker is an offensive information and vulnerability scanner. '
url: https://github.com/s0md3v/Striker url: https://github.com/s0md3v/Striker
category: tool category: tool
type: type: Scanner
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags: []

View File

@ -3,7 +3,11 @@ name: SubOver
description: A Powerful Subdomain Takeover Tool description: A Powerful Subdomain Takeover Tool
url: https://github.com/Ice3man543/SubOver url: https://github.com/Ice3man543/SubOver
category: tool category: tool
type: type: Recon
platform: [] platform:
lang: [] - linux
tags: [] - macos
- windows
lang: Go
tags:
- subdomains

View File

@ -3,10 +3,11 @@ name: Sublist3r
description: 'Fast subdomains enumeration tool for penetration testers ' description: 'Fast subdomains enumeration tool for penetration testers '
url: https://github.com/aboul3la/Sublist3r url: https://github.com/aboul3la/Sublist3r
category: tool category: tool
type: type: Recon
platform: platform:
- linux - linux
- macos - macos
- windows - windows
lang: [] lang: Python
tags: [] tags:
- subdomains

Some files were not shown because too many files have changed in this diff Show More