Web Hacker's Weapons

A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting ## Category - [Weapons](#weapons) - [Subdomain Enumeration](#subdomain-enumeration) - [Fetch path and host](#fetch-path-and-host) - [Port scanner](#port-scanner) - [Web Crawler](#web-crawler) - [Web Vulnerability Scanner](#web-vulnerability-scanner) - [XSS](#xss) - [CSRF](#csrf) - [Path traversal / Directory traversal / LFI](#path-traversal--directory-traversal--lfi) - [Command Injection](#command-injection) - [SQL Injection](#sql-injection) - [NoSQL Injection](#nosql-injection) - [SSRF](#ssrf) - [CORS Misconfiguration](#cors-misconfiguration) - [WebSocket](#websocket) - [Cloud Security](#cloud-security) - [Utility for hackers](#utility-for-hackers) - [Online tools](#online-tools) - [Contribute](#contribute-and-contributor) ## Weapons ### Subdomain Enumeration ### Fetch path and host ### Port scanner ### Web Crawler ### Web Vulnerability Scanner ### XSS ### CSRF ### Path traversal / Directory traversal / LFI ### Command Injection ### SQL Injection ### NoSQL Injection ### SSRF ### CORS Misconfiguration ### WebSocket ### Cloud Security ### Utility for hackers ### Online tools ## Contribute and Contributor ### Usage of weapon-md ``` ./weapon-md Usage of ./weapon-md: -isFirst if you add new type, it use -url string github / gitlab / bitbucket url ``` ### Three Procedures for the Contribute First, generate markdown code using `weapon-md` ``` $ ./weapon-md -url https://github.com/hahwul/xspear | [xspear](https://github.com/hahwul/xspear) | Powerfull XSS Scanning and Parameter analysis tool&gem | ![](https://img.shields.io/github/stars/hahwul/xspear) | ![](https://img.shields.io/github/languages/top/hahwul/xspear) | ![](https://img.shields.io/github/repo-size/hahwul/xspear)
![](https://img.shields.io/github/license/hahwul/xspear)
![](https://img.shields.io/github/forks/hahwul/xspear)
![](https://img.shields.io/github/watchers/hahwul/xspear) | ``` Second, Give me PR or Add issue with output code Third, There's no third.