Showing preview only (707K chars total). Download the full file or copy to clipboard to get everything.
Repository: hahwul/WebHackersWeapons
Branch: main
Commit: c1dd28659b29
Files: 570
Total size: 604.6 KB
Directory structure:
gitextract_zmpygua0/
├── .github/
│ ├── FUNDING.yml
│ ├── labeler.yml
│ └── workflows/
│ ├── cd.yml
│ ├── labeler.yml
│ └── yaml-lint.yml
├── .gitignore
├── .yamllint.yml
├── AGENTS.md
├── CODE_OF_CONDUCT.md
├── CONTRIBUTING.md
├── LICENSE
├── README.md
├── SECURITY.md
├── categorize/
│ ├── langs/
│ │ ├── BlitzBasic.md
│ │ ├── C#.md
│ │ ├── C++.md
│ │ ├── C.md
│ │ ├── CSS.md
│ │ ├── Crystal.md
│ │ ├── Go.md
│ │ ├── HTML.md
│ │ ├── Java.md
│ │ ├── JavaScript.md
│ │ ├── Kotlin.md
│ │ ├── PHP.md
│ │ ├── Perl.md
│ │ ├── Python.md
│ │ ├── Ruby.md
│ │ ├── Rust.md
│ │ ├── Shell.md
│ │ ├── Txt.md
│ │ └── TypeScript.md
│ └── tags/
│ ├── 403.md
│ ├── RMI.md
│ ├── aaa.md
│ ├── apk.md
│ ├── asn.md
│ ├── asset-discovery.md
│ ├── attack-surface.md
│ ├── authentication.md
│ ├── aws.md
│ ├── blind-xss.md
│ ├── broken-link.md
│ ├── browser-record.md
│ ├── cache-vuln.md
│ ├── certificates.md
│ ├── cidr.md
│ ├── clipboard.md
│ ├── cloud.md
│ ├── code-analysis.md
│ ├── container-security.md
│ ├── cookie.md
│ ├── cors.md
│ ├── crawl.md
│ ├── credentials.md
│ ├── crlf.md
│ ├── csp.md
│ ├── darkmode.md
│ ├── dependency-confusion.md
│ ├── dependency-scanning.md
│ ├── deserialize.md
│ ├── diff.md
│ ├── dns.md
│ ├── documents.md
│ ├── dom.md
│ ├── domain.md
│ ├── encode.md
│ ├── endpoint.md
│ ├── exploit.md
│ ├── favicon.md
│ ├── forensics.md
│ ├── fuzz.md
│ ├── gRPC-Web.md
│ ├── graphql.md
│ ├── header.md
│ ├── http.md
│ ├── infra.md
│ ├── ip-manipulation.md
│ ├── js-analysis.md
│ ├── json.md
│ ├── jwt.md
│ ├── lfi.md
│ ├── live-audit.md
│ ├── mitmproxy.md
│ ├── network-mapping.md
│ ├── network.md
│ ├── nosqli.md
│ ├── note.md
│ ├── notify.md
│ ├── nuclei-templates.md
│ ├── oast.md
│ ├── online.md
│ ├── open-redirect.md
│ ├── osint.md
│ ├── package-manager.md
│ ├── param.md
│ ├── path-traversal.md
│ ├── payload.md
│ ├── pentest.md
│ ├── permutation.md
│ ├── port.md
│ ├── portscan.md
│ ├── prototype-pollution.md
│ ├── prototypepollution.md
│ ├── race-condition.md
│ ├── recon.md
│ ├── repeater.md
│ ├── report.md
│ ├── rfi.md
│ ├── rop.md
│ ├── s3.md
│ ├── sast.md
│ ├── sbom.md
│ ├── secret-scanning.md
│ ├── security.md
│ ├── smuggle.md
│ ├── social-engineering.md
│ ├── sqli.md
│ ├── ssl.md
│ ├── ssrf.md
│ ├── ssti.md
│ ├── steganography.md
│ ├── subdomains.md
│ ├── takeover.md
│ ├── terraform.md
│ ├── tls.md
│ ├── tools-management.md
│ ├── url.md
│ ├── vulnerability-scanner.md
│ ├── web-scanner.md
│ ├── web3.md
│ ├── wordlist.md
│ ├── xss.md
│ ├── xxe.md
│ └── zipbomb.md
├── scripts/
│ ├── erb.rb
│ ├── for_migration/
│ │ ├── apply_platform.rb
│ │ ├── fetch_lang.rb
│ │ └── migration.rb
│ ├── last_change
│ └── validate_weapons.rb
└── weapons/
├── 230-OOB.yaml
├── 3klCon.yaml
├── AWSBucketDump.yaml
├── AWSSigner.yaml
├── Amass.yaml
├── Arjun.yaml
├── Assetnote_Wordlists.yaml
├── Atlas.yaml
├── AuthMatrix.yaml
├── AutoRepeater.yaml
├── Autorize.yaml
├── BLUTO.yaml
├── BaRMIe.yaml
├── BatchQL.yaml
├── Berserko.yaml
├── Blacklist3r.yaml
├── BruteX.yaml
├── Bug-Bounty-Toolz.yaml
├── BugBountyScanner.yaml
├── BurpBounty.yaml
├── BurpCustomizer.yaml
├── BurpJSLinkFinder.yaml
├── BurpSuite-Secret_Finder.yaml
├── BurpSuite.yaml
├── BurpSuiteHTTPSmuggler.yaml
├── BurpSuiteLoggerPlusPlus.yaml
├── CMSmap.yaml
├── CSP_Evaluator.yaml
├── CT_subdomains.yaml
├── CaidoReflector.yaml
├── Chaos_Web.yaml
├── Chromium-based-XSS-Taint-Tracking.yaml
├── Clipboard.yaml
├── ConfusedDotnet.yaml
├── CorsMe.yaml
├── Corsy.yaml
├── CrackQL.yaml
├── CyberChef.yaml
├── DNSDumpster.yaml
├── DOMPurify.yaml
├── DSSS.yaml
├── Dark_Reader.yaml
├── Dark_Reader_for_Safari.yaml
├── Decoder-Improved.yaml
├── DeepViolet.yaml
├── DirDar.yaml
├── DotGit.yaml
├── Dr. Watson.yaml
├── EchoMirage.yaml
├── Edit-This-Cookie.yaml
├── Emissary.yaml
├── EvenBetter.yaml
├── EvenBetterExtensions.yaml
├── FavFreak.yaml
├── Findsploit.yaml
├── Firefox Multi-Account Containers.yaml
├── FockCache.yaml
├── GAP.yaml
├── GQLSpection.yaml
├── GadgetProbe.yaml
├── Gf-Patterns.yaml
├── GitMiner.yaml
├── Glorp.yaml
├── Glue.yaml
├── Gopherus.yaml
├── GraphQLmap.yaml
├── HRS.yaml
├── HTTPSignatures.yaml
├── HUNT.yaml
├── Hack-Tools.yaml
├── HostHunter.yaml
├── Hunt3r.yaml
├── HydraRecon.yaml
├── IntruderPayloads.yaml
├── JSFScan.sh.yaml
├── LFISuite.yaml
├── LOXS.yaml
├── Lepus.yaml
├── LinkFinder.yaml
├── MM3_ProxySwitch.yaml
├── NoSQLMap.yaml
├── NoXss.yaml
├── OneForAll.yaml
├── OpenRedireX.yaml
├── Oralyzer.yaml
├── Osmedeus.yaml
├── PPScan.yaml
├── ParamPamPam.yaml
├── ParamSpider.yaml
├── ParamWizard.yaml
├── Parth.yaml
├── PayloadsAllTheThings.yaml
├── Phoenix.yaml
├── Photon.yaml
├── PoC-in-GitHub.yaml
├── PwnFox.yaml
├── PwnXSS.yaml
├── REcollapse.yaml
├── Redcloud.yaml
├── RustScan.yaml
├── S3Scanner.yaml
├── S3cret Scanner.yaml
├── SQLNinja.yaml
├── SQLiDetector.yaml
├── SSRFire.yaml
├── SSRFmap.yaml
├── SSTImap.yaml
├── STEWS.yaml
├── SecLists.yaml
├── SecretFinder.yaml
├── SecurityTrails.yaml
├── SequenceDiagram.yaml
├── SerializationDumper.yaml
├── Shodan.yaml
├── Silver.yaml
├── Sn1per.yaml
├── Stepper.yaml
├── Striker.yaml
├── SubOver.yaml
├── Sublist3r.yaml
├── Taipan.yaml
├── TukTuk.yaml
├── User-Agent_Switcher.yaml
├── V3n0M-Scanner.yaml
├── VHostScan.yaml
├── Wayback_Machine.yaml
├── Web-Cache-Vulnerability-Scanner.yaml
├── Web3 Decoder.yaml
├── XSRFProbe.yaml
├── XSS-Catcher.yaml
├── XSStrike.yaml
├── XSpear.yaml
├── XXEinjector.yaml
├── XXExploiter.yaml
├── XssPy.yaml
├── ZipBomb.yaml
├── a2sv.yaml
├── altdns.yaml
├── alterx.yaml
├── anew.yaml
├── apkleaks.yaml
├── aquatone.yaml
├── arachni.yaml
├── argumentinjectionhammer.yaml
├── asnmap.yaml
├── assetfinder.yaml
├── attack-surface-detector-burp.yaml
├── attack-surface-detector-zap.yaml
├── autochrome.yaml
├── autopoisoner.yaml
├── axiom.yaml
├── bat.yaml
├── baudrillard-suite.yaml
├── bbot.yaml
├── beef.yaml
├── blackboxprotobuf.yaml
├── blistener.yaml
├── boast.yaml
├── bountyplz.yaml
├── bruteforce-lists.yaml
├── burl.yaml
├── burp-exporter.yaml
├── burp-piper.yaml
├── burp-retire-js.yaml
├── burp-send-to.yaml
├── c-jwt-cracker.yaml
├── caido.yaml
├── caidope.yaml
├── can-i-take-over-xyz.yaml
├── cariddi.yaml
├── cc.py.yaml
├── cent.yaml
├── cf-check.yaml
├── chaos-client.yaml
├── clairvoyance.yaml
├── clear-cache.yaml
├── cloud-audit.yaml
├── cloudlist.yaml
├── collaborator-everywhere.yaml
├── commix.yaml
├── community-scripts.yaml
├── confused.yaml
├── cookie-quick-manager.yaml
├── corsair_scan.yaml
├── crawlergo.yaml
├── crimson.yaml
├── crlfuzz.yaml
├── csp-auditor.yaml
├── csprecon.yaml
├── curl.yaml
├── dalfox.yaml
├── deadfinder.yaml
├── deadlinks.yaml
├── deadsniper.yaml
├── dependency-confusion-scanner.yaml
├── depenfusion.yaml
├── difftastic.yaml
├── dirsearch.yaml
├── ditto.yaml
├── dmut.yaml
├── dnsobserver.yaml
├── dnsprobe.yaml
├── dnsvalidator.yaml
├── dnsx.yaml
├── docem.yaml
├── domdig.yaml
├── domloggerpp.yaml
├── dontgo403.yaml
├── dotdotpwn.yaml
├── dsieve.yaml
├── eoyc.yaml
├── eval_villain.yaml
├── evil-proxy.yaml
├── ezXSS.yaml
├── favirecon.yaml
├── femida.yaml
├── feroxbuster.yaml
├── fff.yaml
├── ffuf.yaml
├── fhc.yaml
├── findom-xss.yaml
├── findomain.yaml
├── firefox-container-proxy.yaml
├── fuzzparam.yaml
├── fzf.yaml
├── gRPC-Pentest-Suite.yaml
├── gau.yaml
├── gauplus.yaml
├── gee.yaml
├── getJS.yaml
├── gf.yaml
├── ghauri.yaml
├── gitGraber.yaml
├── github-endpoints.yaml
├── github-regexp.yaml
├── github-search.yaml
├── github-subdomains.yaml
├── gitleaks.yaml
├── gitls.yaml
├── gitrob.yaml
├── go-dork.yaml
├── gobuster.yaml
├── godeclutter.yaml
├── gospider.yaml
├── gotator.yaml
├── gotestwaf.yaml
├── goverview.yaml
├── gowitness.yaml
├── graphql-voyager.yaml
├── graphw00f.yaml
├── grc.yaml
├── grex.yaml
├── gron.yaml
├── gxss.yaml
├── h2csmuggler.yaml
├── h2spacex.yaml
├── hacks.yaml
├── hakcheckurl.yaml
├── hakrawler.yaml
├── hakrevdns.yaml
├── haktrails.yaml
├── hashcat.yaml
├── hbxss.yaml
├── headerpwn.yaml
├── headi.yaml
├── hetty.yaml
├── hinject.yaml
├── hoppscotch.yaml
├── htcat.yaml
├── http-request-smuggler.yaml
├── http-request-smuggling.yaml
├── http-script-generator.yaml
├── http2smugl.yaml
├── httpie.yaml
├── httprobe.yaml
├── httptoolkit.yaml
├── httpx.yaml
├── hurl.yaml
├── inql.yaml
├── interactsh.yaml
├── intrigue-core.yaml
├── jaeles.yaml
├── jsfuck.yaml
├── jsluice.yaml
├── jsonwebtoken.github.io.yaml
├── jsprime.yaml
├── jwt-cracker.yaml
├── jwt-hack.yaml
├── jwt_tool.yaml
├── katana.yaml
├── kiterunner.yaml
├── knife.yaml
├── knock.yaml
├── lazyrecon.yaml
├── liffy.yaml
├── longtongue.yaml
├── mapcidr.yaml
├── masscan.yaml
├── medusa.yaml
├── meg.yaml
├── megplus.yaml
├── metasploit.yaml
├── missing-cve-nuclei-templates.yaml
├── mitmproxy.yaml
├── mubeng.yaml
├── naabu.yaml
├── neonmarker.yaml
├── nikto.yaml
├── nmap.yaml
├── noir.yaml
├── nosqli.yaml
├── notebook.yaml
├── nuclei-templates.yaml
├── nuclei-wordfence-cve.yaml
├── nuclei.yaml
├── ob_hacky_slack.yaml
├── of-CORS.yaml
├── osv-scanner.yaml
├── owasp-zap-jwt-addon.yaml
├── owasp-zap-maplocal-addon.yaml
├── oxml_xxe.yaml
├── pagodo.yaml
├── param-miner.yaml
├── parameth.yaml
├── pcap-burp.yaml
├── pdtm.yaml
├── pentest-env.yaml
├── pentest-tools.yaml
├── pet.yaml
├── plution.yaml
├── postMessage-tracker.yaml
├── ppfuzz.yaml
├── pphack.yaml
├── ppmap.yaml
├── proxify.yaml
├── puredns.yaml
├── pwncat.yaml
├── qsreplace.yaml
├── quickjack.yaml
├── race-the-web.yaml
├── rapidscan.yaml
├── recon_profile.yaml
├── reconftw.yaml
├── reflect.yaml
├── reflected-parameters.yaml
├── rengine.yaml
├── rep.yaml
├── reverse-shell-generator.yaml
├── ronin.yaml
├── ropr.yaml
├── rusolver.yaml
├── s3reverse.yaml
├── safecopy.yaml
├── scan4all.yaml
├── scilla.yaml
├── security-crawl-maze.yaml
├── security-research-pocs.yaml
├── semgrep.yaml
├── shosubgo.yaml
├── shuffledns.yaml
├── singularity.yaml
├── slackcat.yaml
├── smap.yaml
├── smugglefuzz.yaml
├── smuggler.yaml
├── smugglex.yaml
├── sn0int.yaml
├── spiderfoot.yaml
├── sqliv.yaml
├── sqlmap.yaml
├── ssrf-sheriff.yaml
├── sub404.yaml
├── subbrute.yaml
├── subfinder.yaml
├── subgen.yaml
├── subjack.yaml
├── subjs.yaml
├── subs_all.yaml
├── subzy.yaml
├── sudomy.yaml
├── taborator.yaml
├── template-generator.yaml
├── testssl.sh.yaml
├── thc-hydra.yaml
├── tiscripts.yaml
├── tlsx.yaml
├── toxssin.yaml
├── tplmap.yaml
├── trivy.yaml
├── trufflehog.yaml
├── turbo-intruder.yaml
├── uncover.yaml
├── unfurl.yaml
├── urlgrab.yaml
├── urlhunter.yaml
├── urlprobe.yaml
├── uro.yaml
├── urx.yaml
├── wapiti.yaml
├── waybackurls.yaml
├── waymore.yaml
├── weaponised-XSS-payloads.yaml
├── web_cache_poison.yaml
├── websocket-connection-smuggler.yaml
├── wfuzz.yaml
├── wprecon.yaml
├── wpscan.yaml
├── ws-smuggler.yaml
├── wssip.yaml
├── wuzz.yaml
├── x8.yaml
├── xless.yaml
├── xnLinkFinder.yaml
├── xsinator.com.yaml
├── xss-cheatsheet-data.yaml
├── xsscrapy.yaml
├── xsser.yaml
├── xssor2.yaml
├── xsssniper.yaml
├── xurlfind3r.yaml
├── xxeserv.yaml
├── ysoserial.net.yaml
├── ysoserial.yaml
├── zap-browser-extension.yaml
├── zap-cli.yaml
├── zap-hud.yaml
├── zaproxy.yaml
├── zdns.yaml
└── zip-bomb.yaml
================================================
FILE CONTENTS
================================================
================================================
FILE: .github/FUNDING.yml
================================================
github: hahwul
================================================
FILE: .github/labeler.yml
================================================
⚔️ Weapons:
- changed-files:
- any-glob-to-any-file:
- weapons/**
⚙️ Development:
- changed-files:
- any-glob-to-any-file:
- scripts/**
- .github/labeler.yml
🎨 Image:
- changed-files:
- any-glob-to-any-file:
- images/**
🦺 Github Action:
- changed-files:
- any-glob-to-any-file: .github/workflows/**
================================================
FILE: .github/workflows/cd.yml
================================================
---
name: Continuous Deployment
on:
push:
branches: [main]
workflow_dispatch:
jobs:
Deploy:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Set up Ruby
uses: ruby/setup-ruby@v1
with:
ruby-version: 3.0
- name: Install dependencies
run: gem install erb yaml
- name: Run app
run: |
ruby ./scripts/erb.rb
- name: Make last_change
run: date > ./scripts/last_change
- name: Commit files
run: |
git config --local user.email "hahwul@gmail.com"
git config --local user.name "WHW"
git add README.md ./scripts/last_change
git add ./categorize/*
git commit -m "Deploy README.md and Categorize Docs"
- name: Push changes
uses: ad-m/github-push-action@master
with:
github_token: ${{ secrets.GITHUB_TOKEN }}
branch: ${{ github.ref }}
Contributors:
needs: Deploy
runs-on: ubuntu-latest
steps:
- uses: wow-actions/contributors-list@v1
with:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
round: true
svgPath: images/CONTRIBUTORS.svg
================================================
FILE: .github/workflows/labeler.yml
================================================
name: "Pull Request Labeler"
on: [pull_request_target]
jobs:
labeler:
permissions:
contents: read
pull-requests: write
runs-on: ubuntu-latest
steps:
- uses: actions/labeler@v5
================================================
FILE: .github/workflows/yaml-lint.yml
================================================
---
name: YAML Lint
on:
pull_request:
branches: [main]
jobs:
lintAllTheThings:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: yaml-lint
uses: ibiqlik/action-yamllint@v3
with:
file_or_dir: weapons/*.yaml
config_file: .yamllint.yml
================================================
FILE: .gitignore
================================================
.DS_Store
================================================
FILE: .yamllint.yml
================================================
---
rules:
anchors: enable
braces: enable
brackets: enable
colons: enable
commas: enable
comments:
level: warning
comments-indentation:
level: warning
document-end: disable
document-start:
level: warning
empty-lines: enable
empty-values: disable
float-values: disable
hyphens: enable
indentation: enable
key-duplicates: enable
key-ordering: disable
line-length: disable
new-line-at-end-of-file: enable
new-lines: enable
octal-values: disable
quoted-strings: disable
trailing-spaces: enable
truthy:
level: warning
================================================
FILE: AGENTS.md
================================================
# WebHackersWeapons Repository
WebHackersWeapons is a curated collection of web security tools and utilities. It contains 409+ security tools categorized by type (Army-knife, Proxy, Recon, Fuzzer, Scanner, Exploit, Utils, etc.), platform, language, and tags.
Always reference these instructions first and fallback to search or bash commands only when you encounter unexpected information that does not match the info here.
## Working Effectively
- **NEVER CANCEL**: All build operations complete in under 2 seconds. No timeouts needed.
- Bootstrap and validate the repository:
- Ruby 3.x with erb and yaml gems (pre-installed in GitHub Actions)
- `ruby ./scripts/erb.rb` -- builds README.md and categorize/* files. Takes ~0.3 seconds.
- `ruby ./scripts/validate_weapons.rb` -- validates weapon definitions. Takes ~0.1 seconds.
- `yamllint weapons/*.yaml` -- validates YAML syntax. Takes ~1 second.
- The build process is extremely fast - **ALL commands complete in under 2 seconds**.
## Repository Structure
Key directories and files:
- `weapons/*.yaml` -- Individual weapon definitions (409 files, 3800+ lines total)
- `scripts/erb.rb` -- Main build script that generates all documentation
- `scripts/validate_weapons.rb` -- Validation script for weapon definitions
- `README.md` -- Auto-generated main documentation (DO NOT edit manually)
- `categorize/langs/*.md` -- Auto-generated language-specific lists (19 languages)
- `categorize/tags/*.md` -- Auto-generated tag-specific lists (73 tags)
- `.github/workflows/` -- CI/CD automation
- `.yamllint.yml` -- YAML linting configuration
## Build Process
**CRITICAL**: The `README.md` and `categorize/*` files are AUTO-GENERATED. Never edit them manually.
Build and validate workflow:
1. `ruby ./scripts/erb.rb` -- Generates README.md and all categorize/* files
2. `ruby ./scripts/validate_weapons.rb` -- Shows validation warnings for incomplete entries
3. `yamllint weapons/*.yaml` -- Validates YAML syntax and formatting
All operations complete in under 2 seconds total.
## Adding New Weapons
Create a new file in `weapons/<toolname>.yaml` with this exact format:
```yaml
---
name: Tool Name
description: Tool description
url: https://github.com/owner/repo # Tool URL
category: tool # tool | tool-addon | browser-addon | bookmarklet
type: Scanner # Army-knife | Proxy | Recon | Fuzzer | Scanner | Exploit | Env | Utils | Etc
platform: [linux, macos, windows] # linux | macos | windows | firefox | safari | chrome | zap | burpsuite
lang: Python # Language: Go | Python | Ruby | JavaScript | etc.
tags: [xss, sqli] # Vulnerability/feature tags
```
**CRITICAL YAML Requirements**:
- File MUST end with a newline character (yamllint requirement)
- Use exact platform values: `linux`, `macos`, `windows`, `firefox`, `safari`, `chrome`, `zap`, `burpsuite`
- Use exact type values from the list above
- Use exact category values from the list above
## Validation Workflow
**ALWAYS run these steps after making changes:**
1. **YAML Validation**: `yamllint weapons/*.yaml`
2. **Build Validation**: `ruby ./scripts/erb.rb`
3. **Content Validation**: `ruby ./scripts/validate_weapons.rb`
4. **Manual Check**: Verify your tool appears in the generated README.md
## CI/CD Process
- **Pull Requests**: Automatically run YAML linting via `.github/workflows/yaml-lint.yml`
- **Main Branch**: Automatically regenerates README.md and categorize/* files via `.github/workflows/cd.yml`
- The CI uses Ruby 3.0 and installs `erb` and `yaml` gems
## Common Validation Issues
- **"no new line character at the end of file"**: Add a blank line at the end of YAML files
- **"none-lang" warnings**: Add appropriate `lang:` field for GitHub-hosted tools
- **"undefined method length"**: Ensure `tags:` field exists and is an array
- **"Is a directory" errors**: Normal warnings from validation script reading directory entries
## Error Examples
```bash
# Missing newline error:
::error file=weapons/tool.yaml,line=9,col=13::9:13 [new-line-at-end-of-file] no new line character at the end of file
# Fix by adding blank line at end of file:
echo "" >> weapons/tool.yaml
```
## Manual Validation Scenarios
After adding a new weapon, verify:
1. **YAML Syntax**: `yamllint weapons/yourfile.yaml` returns no errors
2. **Build Success**: `ruby ./scripts/erb.rb` completes without errors
3. **README Generation**: Your tool appears in the main README.md table
4. **Tag Creation**: If using new tags, verify `categorize/tags/newtag.md` is created
5. **Language Categorization**: Verify tool appears in `categorize/langs/Language.md`
## Timing Expectations
- YAML linting: ~1 second for all 409 files
- Build script: ~0.3 seconds to generate all documentation
- Validation script: ~0.1 seconds to check all weapons
- **Total validation time: ~1.5 seconds**
## Development Notes
- The repository contains 409+ weapon definitions
- 73 different tags for categorization
- 19 programming languages represented
- All documentation is auto-generated from YAML source files
- Images are stored in `/images/` directory for badges and logos
## Troubleshooting Workflows
### Complete Weapon Addition Workflow
```bash
# 1. Create weapon file
cat > weapons/newtool.yaml << EOF
---
name: New Tool
description: Description of the tool
url: https://github.com/owner/repo
category: tool
type: Scanner
platform: [linux, macos, windows]
lang: Python
tags: [xss]
EOF
# 2. Validate YAML syntax
yamllint weapons/newtool.yaml
# 3. Build documentation
ruby ./scripts/erb.rb
# 4. Verify tool appears in README
grep "New Tool" README.md
# 5. Check validation warnings
ruby ./scripts/validate_weapons.rb
```
### CI/CD Validation Process
The GitHub Actions workflows automatically:
1. **On PR**: Run `yamllint weapons/*.yaml`
2. **On merge to main**: Run `ruby ./scripts/erb.rb` and commit changes
## Git Workflow Best Practices
- **Fork the repository** before making changes
- **Create feature branches** for new weapons or modifications
- **Test locally** before pushing:
```bash
yamllint weapons/*.yaml
ruby ./scripts/erb.rb
git status # Check what files changed
```
- **Commit only** `weapons/*.yaml` changes in PRs
- **Never commit** auto-generated `README.md` or `categorize/*` files in PRs
## Do NOT Modify
**These files are auto-generated and will be overwritten:**
- `README.md`
- All files in `categorize/langs/`
- All files in `categorize/tags/`
**Only modify these directories:**
- `weapons/` -- Add new weapon YAML files
- `scripts/` -- Modify generation scripts (advanced users only)
- `images/` -- Add new badges or logos
================================================
FILE: CODE_OF_CONDUCT.md
================================================
# Contributor Covenant Code of Conduct
## Our Pledge
In the interest of fostering an open and welcoming environment, we as
contributors and maintainers pledge to making participation in our project and
our community a harassment-free experience for everyone, regardless of age, body
size, disability, ethnicity, sex characteristics, gender identity and expression,
level of experience, education, socio-economic status, nationality, personal
appearance, race, religion, or sexual identity and orientation.
## Our Standards
Examples of behavior that contributes to creating a positive environment
include:
* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members
Examples of unacceptable behavior by participants include:
* The use of sexualized language or imagery and unwelcome sexual attention or
advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic
address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a
professional setting
## Our Responsibilities
Project maintainers are responsible for clarifying the standards of acceptable
behavior and are expected to take appropriate and fair corrective action in
response to any instances of unacceptable behavior.
Project maintainers have the right and responsibility to remove, edit, or
reject comments, commits, code, wiki edits, issues, and other contributions
that are not aligned to this Code of Conduct, or to ban temporarily or
permanently any contributor for other behaviors that they deem inappropriate,
threatening, offensive, or harmful.
## Scope
This Code of Conduct applies both within project spaces and in public spaces
when an individual is representing the project or its community. Examples of
representing a project or community include using an official project e-mail
address, posting via an official social media account, or acting as an appointed
representative at an online or offline event. Representation of a project may be
further defined and clarified by project maintainers.
## Enforcement
Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by contacting the project team at hahwul@gmail.com. All
complaints will be reviewed and investigated and will result in a response that
is deemed necessary and appropriate to the circumstances. The project team is
obligated to maintain confidentiality with regard to the reporter of an incident.
Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good
faith may face temporary or permanent repercussions as determined by other
members of the project's leadership.
## Attribution
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
[homepage]: https://www.contributor-covenant.org
For answers to common questions about this code of conduct, see
https://www.contributor-covenant.org/faq
================================================
FILE: CONTRIBUTING.md
================================================
## ⚠️ Important
The paths below is automatically generated.
- `README.md`
- `categorize/*`
Please contribute only the `./weapons` and `./scripts`, `./images` directories 😉
## ❤️ Contribute
### First, Fork Repository
Fork this repository :D
### Second, Write `./weapons/<appname>.yaml` and Commit/PR
Write YAML Code.
```yaml
---
name: App Name
description: App Description
url: App URL # https://github.com/hahwul/dalfox
category: tool # tool / tool-addon / browser-addon / bookmarklet
type: # Army-knife / Proxy / Recon / Fuzzer / Scanner / Exploit / Env / Utils / Etc
platform:
- linux # linux
- macos # macos application
- windows # windows application
- firefox # firefox addon
- safari # safari addon
- chrome # chrome addon
- zap # anything to do with zap (addons, scripts, etc..)
- burpsuite # anything to do with burpsuite (extensions, payloads, etc..)
# If supported crossplatform (OS), you write out all three (linux/macos/windows)
# If supported zap and burpsuite addon, you write both (zap/burpsuite)
lang: # go / python / ruby / rust / etc...
tags: [] # xss / sqli / ssrf / oast / http / subdomains / etc...
```
*Sample*
```yaml
---
name: HUNT
description: Identifies common parameters vulnerable to certain vulnerability classes
url: https://github.com/bugcrowd/HUNT
category: tool-addon
type: Recon
platform: [linux, macos, windows, zap, burpsuite]
lang: Kotlin
tags: [param]
```

### Third, There's no third.
================================================
FILE: LICENSE
================================================
MIT License
Copyright (c) 2025 하훌
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
================================================
FILE: README.md
================================================
<div align="center">
<picture>
<source media="(prefers-color-scheme: dark)" srcset="images/whw-dark.png" width="500px;">
<source media="(prefers-color-scheme: light)" srcset="images/whw-light.png" width="500px;">
<img alt="WebHackersWeapons Logo" src="images/whw-dark.png" width="500px;">
</picture>
<p>A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting!</p>
</div>
<p align="center">
<a href="https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md">
<img src="https://img.shields.io/badge/CONTRIBUTIONS-WELCOME-000000?style=for-the-badge&labelColor=black"></a>
</p>
## Family project
[](https://github.com/hahwul/WebHackersWeapons)
[](https://github.com/hahwul/MobileHackersWeapons)
## Table of Contents
- [Weapons](#weapons)
- [Tools](#tools)
- [Bookmarklets](#bookmarklets)
- [Browser Addons](#browser-addons)
- [Burpsuite, Caido and ZAP Addons](#burpsuite-caido-and-zap-addons)
- [Contribute](CONTRIBUTING.md)
- [Thanks to contributor](#thanks-to-contributor)
## Weapons
*Attributes*
| | Attributes |
|-------|---------------------------------------------------|
| Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`|
| Tags | [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md) [`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md) [`pentest`](/categorize/tags/pentest.md) [`exploit`](/categorize/tags/exploit.md) [`infra`](/categorize/tags/infra.md) [`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md) [`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md) [`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md) [`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md) [`csp`](/categorize/tags/csp.md) [`param`](/categorize/tags/param.md) [`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md) [`attack-surface`](/categorize/tags/attack-surface.md) [`port`](/categorize/tags/port.md) [`favicon`](/categorize/tags/favicon.md) [`js-analysis`](/categorize/tags/js-analysis.md) [`takeover`](/categorize/tags/takeover.md) [`portscan`](/categorize/tags/portscan.md) [`domain`](/categorize/tags/domain.md) [`online`](/categorize/tags/online.md) [`graphql`](/categorize/tags/graphql.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md) [`cache-vuln`](/categorize/tags/cache-vuln.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md) [`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md) [`ssrf`](/categorize/tags/ssrf.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`header`](/categorize/tags/header.md) [`ssti`](/categorize/tags/ssti.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md) [`xss`](/categorize/tags/xss.md) [`s3`](/categorize/tags/s3.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md) [`broken-link`](/categorize/tags/broken-link.md) [`cors`](/categorize/tags/cors.md) [`sqli`](/categorize/tags/sqli.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md) [`open-redirect`](/categorize/tags/open-redirect.md) [`nosqli`](/categorize/tags/nosqli.md) [`oast`](/categorize/tags/oast.md) [`web-scanner`](/categorize/tags/web-scanner.md) [`aaa`](/categorize/tags/aaa.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`403`](/categorize/tags/403.md) [`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md) [`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md) [`aws`](/categorize/tags/aws.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md) [`xxe`](/categorize/tags/xxe.md) [`RMI`](/categorize/tags/RMI.md) [`rop`](/categorize/tags/rop.md) [`authentication`](/categorize/tags/authentication.md) [`zipbomb`](/categorize/tags/zipbomb.md) [`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md) [`deserialize`](/categorize/tags/deserialize.md) [`web3`](/categorize/tags/web3.md) [`gRPC-Web`](/categorize/tags/gRPC-Web.md) [`notify`](/categorize/tags/notify.md) [`documents`](/categorize/tags/documents.md) [`cookie`](/categorize/tags/cookie.md) [`note`](/categorize/tags/note.md) [`blind-xss`](/categorize/tags/blind-xss.md) [`encode`](/categorize/tags/encode.md) [`payload`](/categorize/tags/payload.md) [`darkmode`](/categorize/tags/darkmode.md) [`nuclei-templates`](/categorize/tags/nuclei-templates.md) [`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md) [`dom`](/categorize/tags/dom.md) [`race-condition`](/categorize/tags/race-condition.md) [`diff`](/categorize/tags/diff.md) [`clipboard`](/categorize/tags/clipboard.md) [`json`](/categorize/tags/json.md) [`browser-record`](/categorize/tags/browser-record.md) [`report`](/categorize/tags/report.md) |
| Langs | [`Java`](/categorize/langs/Java.md) [`Python`](/categorize/langs/Python.md) [`Ruby`](/categorize/langs/Ruby.md) [`Go`](/categorize/langs/Go.md) [`Shell`](/categorize/langs/Shell.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`Rust`](/categorize/langs/Rust.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`Crystal`](/categorize/langs/Crystal.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`C#`](/categorize/langs/C%23.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`Txt`](/categorize/langs/Txt.md) [`HTML`](/categorize/langs/HTML.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`CSS`](/categorize/langs/CSS.md) [`C++`](/categorize/langs/C++.md) [`PHP`](/categorize/langs/PHP.md) |
### Tools
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Java.md)|
|Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.||[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|[](/categorize/langs/Python.md)|
|Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|
|Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Java.md)|
|Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Ruby.md)|
|Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing ||[`live-audit`](/categorize/tags/live-audit.md)|[](/categorize/langs/Go.md)|
|Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ||[`infra`](/categorize/tags/infra.md)|[](/categorize/langs/Shell.md)|
|Proxy|[Glorp](https://github.com/denandz/glorp)|A CLI-based HTTP intercept and replay proxy||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Proxy|[Caido](https://caido.io)|A lightweight web security auditing toolkit||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Rust.md)|
|Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Proxy|[mitmproxy](https://github.com/mitmproxy/mitmproxy)|An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Python.md)|
|Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Ruby.md)|
|Proxy|[Echo Mirage](https://sourceforge.net/projects/echomirage.oldbutgold.p/)|A generic network proxy that uses DLL injection to capture and alter TCP traffic.||[`mitmproxy`](/categorize/tags/mitmproxy.md)||
|Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |||[](/categorize/langs/Shell.md)|
|Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information||[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|[](/categorize/langs/Go.md)|
|Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|||[](/categorize/langs/Go.md)|
|Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|||[](/categorize/langs/Python.md)|
|Recon|[Chaos Web](https://chaos.projectdiscovery.io)| actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.||||
|Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers||[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|[](/categorize/langs/Go.md)|
|Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.||[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.||[`osint`](/categorize/tags/osint.md)|[](/categorize/langs/Python.md)|
|Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ||[`subdomains`](/categorize/tags/subdomains.md)||
|Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |||[](/categorize/langs/Go.md)|
|Recon|[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|||[](/categorize/langs/Python.md)|
|Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. ||[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|[](/categorize/langs/Python.md)|
|Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[csprecon](https://github.com/edoardottt/csprecon)|Discover new target domains using Content Security Policy||[`csp`](/categorize/tags/csp.md)|[](/categorize/langs/Go.md)|
|Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |||[](/categorize/langs/Python.md)|
|Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |||[](/categorize/langs/Go.md)|
|Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection||[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|[](/categorize/langs/Go.md)|
|Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Rust.md)|
|Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |||[](/categorize/langs/Go.md)|
|Recon|[Sudomy](https://github.com/screetsec/Sudomy)|subdomain enumeration tool to collect subdomains and analyzing domains||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Shell.md)|
|Recon|[ParamWizard](https://github.com/iamunixtz/ParamWizard)|ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website.||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager||[`osint`](/categorize/tags/osint.md)|[](/categorize/langs/Rust.md)|
|Recon|[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|||[](/categorize/langs/Python.md)|
|Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|||[](/categorize/langs/Shell.md)|
|Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |||[](/categorize/langs/Python.md)|
|Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner ||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|Recon|[waymore](https://github.com/xnl-h4ck3r/waymore)|Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Python.md)|
|Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |||[](/categorize/langs/Go.md)|
|Recon|[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|||[](/categorize/langs/Go.md)|
|Recon|[scilla](https://github.com/edoardottt/scilla)|🏴☠️ Information Gathering tool 🏴☠️ dns/subdomain/port enumeration||[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|[](/categorize/langs/Go.md)|
|Recon|[urx](https://github.com/hahwul/urx)|Extracts URLs from OSINT Archives for Security Insights||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Rust.md)|
|Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[bbot](https://github.com/blacklanternsecurity/bbot)|OSINT automation for hackers||[`osint`](/categorize/tags/osint.md)|[](/categorize/langs/Python.md)|
|Recon|[favirecon](https://github.com/edoardottt/favirecon)|Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.||[`favicon`](/categorize/tags/favicon.md)|[](/categorize/langs/Go.md)|
|Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs ||[`subdomains`](/categorize/tags/subdomains.md)||
|Recon|[shosubgo](https://github.com/incogbyte/shosubgo)|Small tool to Grab subdomains using Shodan api.||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis||[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|[](/categorize/langs/Crystal.md)|
|Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |||[](/categorize/langs/Go.md)|
|Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices||[`osint`](/categorize/tags/osint.md)||
|Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them ||[`dns`](/categorize/tags/dns.md) [`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder)|A python tool used to discover endpoints (and potential parameters) for a given target||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Python.md)|
|Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |||[](/categorize/langs/Go.md)|
|Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. ||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Shell.md)|
|Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[goverview](https://github.com/j3ssie/goverview)|goverview - Get an overview of the list of URLs||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[BLUTO](https://github.com/darryllane/Bluto)|DNS Analysis Tool||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Python.md)|
|Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Go.md)|
|Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |||[](/categorize/langs/Shell.md)|
|Recon|[Sub404](https://github.com/r3curs1v3-pr0xy/sub404)|A python tool to check subdomain takeover vulnerability||[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|[](/categorize/langs/Go.md)|
|Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. ||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|Recon|[xurlfind3r](https://github.com/hueristiq/xurlfind3r)|A command-line utility designed to discover URLs for a given domain in a simple, efficient way.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|||[](/categorize/langs/Python.md)|
|Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Go.md)|
|Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Python.md)|
|Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |||[](/categorize/langs/Python.md)|
|Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services ||[`port`](/categorize/tags/port.md)|[](/categorize/langs/Python.md)|
|Recon|[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|||[](/categorize/langs/Go.md)|
|Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go ||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Go.md)|
|Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |||[](/categorize/langs/Shell.md)|
|Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/Go.md)|
|Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. ||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|||[](/categorize/langs/Python.md)|
|Recon|[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |||[](/categorize/langs/Python.md)|
|Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives ||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application ||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Go.md)|
|Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[BugBountyScanner](https://github.com/chvancooten/BugBountyScanner)|A Bash script and Docker image for Bug Bounty reconnaissance.|||[](/categorize/langs/Shell.md)|
|Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|||[](/categorize/langs/Rust.md)|
|Recon|[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |||[](/categorize/langs/Go.md)|
|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|||[](/categorize/langs/Ruby.md)|
|Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers ||[`domain`](/categorize/tags/domain.md)|[](/categorize/langs/Go.md)|
|Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)||
|Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Python.md)|
|Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|||[](/categorize/langs/Python.md)|
|Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[SubBrute](https://github.com/aboul3la/Sublist3r)|https://github.com/TheRook/subbrute||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Go.md)|
|Recon|[HostHunter](https://github.com/SpiderLabs/HostHunter)|Recon tool for discovering hostnames using OSINT techniques.||[`osint`](/categorize/tags/osint.md)|[](/categorize/langs/Python.md)|
|Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/C.md)|
|Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. ||[`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. ||[`osint`](/categorize/tags/osint.md) [`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Python.md)|
|Recon|[Lepus](https://github.com/gfek/Lepus)|Subdomain finder||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool||[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|[](/categorize/langs/Go.md)|
|Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)||
|Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |||[](/categorize/langs/JavaScript.md)|
|Recon|[graphw00f](https://github.com/dolevf/graphw00f)|GraphQL Server Engine Fingerprinting utility||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Recon|[jsluice](https://github.com/BishopFox/jsluice)|Extract URLs, paths, secrets, and other interesting bits from JavaScript||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Go.md)|
|Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.||[`url`](/categorize/tags/url.md) [`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Recon|[katana](https://github.com/projectdiscovery/katana)|A next-generation crawling and spidering framework.||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/Go.md)|
|Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker||[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|[](/categorize/langs/Go.md)|
|Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/Rust.md)|
|Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go ||[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|[](/categorize/langs/Go.md)|
|Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |||[](/categorize/langs/Go.md)|
|Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Python.md)|
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |||[](/categorize/langs/Ruby.md)|
|Recon|[Smap](https://github.com/s0md3v/smap/)|a drop-in replacement for Nmap powered by shodan.io||[`port`](/categorize/tags/port.md)|[](/categorize/langs/Go.md)|
|Recon|[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|||[](/categorize/langs/Rust.md)|
|Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL||[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|[](/categorize/langs/Go.md)|
|Recon|[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |||[](/categorize/langs/Python.md)|
|Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files ||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Python.md)|
|Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. ||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Rust.md)|
|Fuzzer|[ParamPamPam](https://github.com/Bo0oM/ParamPamPam)|This tool for brute discover GET and POST parameters.||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |||[](/categorize/langs/Python.md)|
|Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer ||[`path-traversal`](/categorize/tags/path-traversal.md)|[](/categorize/langs/Perl.md)|
|Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀||[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|[](/categorize/langs/Rust.md)|
|Fuzzer|[Clairvoyance](https://github.com/nikitastupin/clairvoyance)|Obtain GraphQL API schema even if the introspection is disabled||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[SmuggleFuzz](https://github.com/Moopinger/smugglefuzz/)|A rapid HTTP downgrade smuggling scanner written in Go.||[`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md)|[](/categorize/langs/Go.md)|
|Fuzzer|[BatchQL](https://github.com/assetnote/batchql)|GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool ||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Go.md)|
|Fuzzer|[SSRFire](https://github.com/ksharinarayanan/SSRFire)|An automated SSRF finder. Just give the domain name and your server and chill||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Shell.md)|
|Fuzzer|[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|||[](/categorize/langs/Go.md)|
|Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C ||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/C.md)|
|Fuzzer|[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |||[](/categorize/langs/Go.md)|
|Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go ||[`crlf`](/categorize/tags/crlf.md)|[](/categorize/langs/Shell.md)|
|Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |||[](/categorize/langs/C.md)|
|Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|||[](/categorize/langs/Shell.md)|
|Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |||[](/categorize/langs/C.md)|
|Fuzzer|[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |||[](/categorize/langs/Go.md)|
|Fuzzer|[headerpwn](https://github.com/devanshbatham/headerpwn)|A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers||[`header`](/categorize/tags/header.md)|[](/categorize/langs/Go.md)|
|Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/Go.md)|
|Fuzzer|[CrackQL](https://github.com/nicholasaleks/CrackQL)|CrackQL is a GraphQL password brute-force and fuzzing utility.||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|||[](/categorize/langs/Rust.md)|
|Fuzzer|[SSTImap](https://github.com/vladko312/SSTImap)|Automatic SSTI detection tool with interactive interface||[`ssti`](/categorize/tags/ssti.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker ||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/JavaScript.md)|
|Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Shell.md)|
|Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|Scanner|[Oralyzer](https://github.com/r0075h3ll/Oralyzer)|Open Redirection Analyzer|||[](/categorize/langs/Python.md)|
|Scanner|[osv-scanner](https://github.com/google/osv-scanner)|Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects||[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md)|[](/categorize/langs/Go.md)|
|Scanner|[PwnXSS](https://github.com/pwn0sec/PwnXSS)|Vulnerability (XSS) scanner exploit||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|||[](/categorize/langs/Perl.md)|
|Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets||[`s3`](/categorize/tags/s3.md)|[](/categorize/langs/Python.md)|
|Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/C.md)|
|Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |||[](/categorize/langs/Python.md)|
|Scanner|[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |||[](/categorize/langs/Python.md)|
|Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more||[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|[](/categorize/langs/Go.md)|
|Scanner|[Deadsniper](https://github.com/port19x/deadsniper)|A fast, specialized dead-link checker||[`broken-link`](/categorize/tags/broken-link.md)|[](/categorize/langs/Go.md)|
|Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|||[](/categorize/langs/Go.md)|
|Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner ||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Python.md)|
|Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns||[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|[](/categorize/langs/Python.md)|
|Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.||[`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Python.md)|
|Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.||[`xss`](/categorize/tags/xss.md)||
|Scanner|[scan4all](https://github.com/hktalent/scan4all)|Official repository vuls Scan|||[](/categorize/langs/Go.md)|
|Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect||[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|[](/categorize/langs/Python.md)|
|Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. ||[`nosqli`](/categorize/tags/nosqli.md)|[](/categorize/langs/Python.md)|
|Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |||[](/categorize/langs/Go.md)|
|Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Ruby.md)|
|Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Python.md)|
|Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Scanner|[CMSmap](https://github.com/dionach/CMSmap)|CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.||[`web-scanner`](/categorize/tags/web-scanner.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md)|[](/categorize/langs/Python.md)|
|Scanner|[NoXss](https://github.com/lwzSoviet/)|Faster xss scanner,support reflected-xss and dom-xss||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[pphack](https://github.com/edoardottt/pphack)|The Most Advanced Client-Side Prototype Pollution Scanner||[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|[](/categorize/langs/Go.md)|
|Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner||[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|[](/categorize/langs/JavaScript.md)|
|Scanner|[FockCache](https://github.com/tismayil/fockcache)|Minimalized Test Cache Poisoning||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Go.md)|
|Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/JavaScript.md)|
|Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |||[](/categorize/langs/Ruby.md)|
|Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool||[`nosqli`](/categorize/tags/nosqli.md)|[](/categorize/langs/Go.md)|
|Scanner|[depenfusion](https://github.com/benjamin-mauss/depenfusion)|A powerful pentesting tool for detecting and exploiting dependency confusion vulnerabilities in Node.js projects||[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|[](/categorize/langs/Python.md)|
|Scanner|[xsssniper](https://github.com/gbrindisi/xsssniper)|An automatic XSS discovery tool||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions||[`ssl`](/categorize/tags/ssl.md)|[](/categorize/langs/Java.md)|
|Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.||[`403`](/categorize/tags/403.md)|[](/categorize/langs/Go.md)|
|Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port ||[`ssl`](/categorize/tags/ssl.md)|[](/categorize/langs/Shell.md)|
|Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Scanner|[SQLiDetector](https://github.com/eslam3kl/SQLiDetector)|Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|||[](/categorize/langs/Go.md)|
|Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents ||[`s3`](/categorize/tags/s3.md)|[](/categorize/langs/Python.md)|
|Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|||[](/categorize/langs/Go.md)|
|Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Go.md)|
|Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|||[](/categorize/langs/Python.md)|
|Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker ||[`header`](/categorize/tags/header.md)|[](/categorize/langs/Go.md)|
|Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.||[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|[](/categorize/langs/Go.md)|
|Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |||[](/categorize/langs/Python.md)|
|Scanner|[ConfusedDotnet](https://github.com/visma-prodsec/ConfusedDotnet)|Tool to check for dependency confusion vulnerabilities in NuGet package management systems||[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|[](/categorize/langs/C%23.md)|
|Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|||[](/categorize/langs/Python.md)|
|Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|||[](/categorize/langs/Go.md)|
|Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Go.md)|
|Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection||[`header`](/categorize/tags/header.md)|[](/categorize/langs/Go.md)|
|Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go ||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Go.md)|
|Scanner|[S3cret Scanner](https://github.com/Eilonh/s3crets_scanner)|Hunting For Secrets Uploaded To Public S3 Buckets||[`s3`](/categorize/tags/s3.md)|[](/categorize/langs/Python.md)|
|Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner ||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Go.md)|
|Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |||[](/categorize/langs/Python.md)|
|Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability ||[`ssl`](/categorize/tags/ssl.md)|[](/categorize/langs/Python.md)|
|Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.||[`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Python.md)|
|Scanner|[trufflehog](https://github.com/trufflesecurity/trufflehog)|Find and verify credentials in git repositories, filesystems, and S3 buckets||[`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md)|[](/categorize/langs/Go.md)|
|Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Go.md)|
|Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|||[](/categorize/langs/Python.md)|
|Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome||[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|[](/categorize/langs/Go.md)|
|Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |||[](/categorize/langs/Python.md)|
|Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|||[](/categorize/langs/JavaScript.md)|
|Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |||[](/categorize/langs/Go.md)|
|Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems||[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|[](/categorize/langs/Go.md)|
|Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |||[](/categorize/langs/Perl.md)|
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |||[](/categorize/langs/Ruby.md)|
|Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)||[`broken-link`](/categorize/tags/broken-link.md)|[](/categorize/langs/Ruby.md)|
|Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Scanner|[smugglex](https://github.com/hahwul/smugglex)|Rust-powered HTTP Request Smuggling Scanner||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Rust.md)|
|Scanner|[semgrep](https://github.com/semgrep/semgrep)|Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.||[`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md)|[](/categorize/langs/Python.md)|
|Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |||[](/categorize/langs/JavaScript.md)|
|Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Shell.md)|
|Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 ||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Python.md)|
|Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |||[](/categorize/langs/Python.md)|
|Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it||[`403`](/categorize/tags/403.md)|[](/categorize/langs/Go.md)|
|Scanner|[dependency-confusion-scanner](https://github.com/Yaniv-git/dependency-confusion-scanner)|This small repo is meant to scan Github's repositories for potential Dependency confusion vulnerabilities.||[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|[](/categorize/langs/Python.md)|
|Scanner|[XssPy](https://github.com/faizann24/)|Web Application XSS Scanner||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner||||
|Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. ||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Scanner|[wapiti](https://github.com/wapiti-scanner/wapiti)|Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications.||[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`web-scanner`](/categorize/tags/web-scanner.md)|[](/categorize/langs/Python.md)|
|Scanner|[deadlinks](https://github.com/butuzov/deadlinks)|Health checks for your documentation links.||[`broken-link`](/categorize/tags/broken-link.md)|[](/categorize/langs/Python.md)|
|Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection||[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|[](/categorize/langs/Python.md)|
|Exploit|[ghauri](https://github.com/r0oth3x49/ghauri)|An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Ruby.md)|
|Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Exploit|[BaRMIe](https://github.com/NickstaDB/BaRMIe)|Java RMI enumeration and attack tool.||[`RMI`](/categorize/tags/RMI.md)|[](/categorize/langs/Java.md)|
|Exploit|[of-CORS](https://github.com/trufflesecurity/of-CORS)|Identifying and exploiting CORS misconfigurations on the internal networks||[`cors`](/categorize/tags/cors.md)|[](/categorize/langs/Python.md)|
|Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|||[](/categorize/langs/Go.md)|
|Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/TypeScript.md)|
|Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Ruby.md)|
|Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers ||[`ssrf`](/categorize/tags/ssrf.md)|[](/categorize/langs/Python.md)|
|Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|||[](/categorize/langs/Python.md)|
|Exploit|[ropr](https://github.com/Ben-Lichtman/ropr)|A blazing fast™ multithreaded ROP Gadget finder. ropper||[`rop`](/categorize/tags/rop.md)|[](/categorize/langs/Rust.md)|
|Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|||[](/categorize/langs/JavaScript.md)|
|Exploit|[Liffy](https://github.com/mzfr/liffy)|Local file inclusion exploitation tool||[`lfi`](/categorize/tags/lfi.md)|[](/categorize/langs/Python.md)|
|Exploit|[jwt_tool](https://github.com/ticarpi/jwt_tool)|A toolkit for testing, tweaking and cracking JSON Web Tokens||[`jwt`](/categorize/tags/jwt.md) [`authentication`](/categorize/tags/authentication.md)|[](/categorize/langs/Python.md)|
|Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |||[](/categorize/langs/Shell.md)|
|Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)|Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities.||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Perl.md)|
|Utils|[zip-bomb](https://github.com/damianrusinek/zip-bomb)|Create a ZIPBomb for a given uncompressed size (flat and nested modes).||[`zipbomb`](/categorize/tags/zipbomb.md)|[](/categorize/langs/Python.md)|
|Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|||[](/categorize/langs/Go.md)|
|Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection ||[`http`](/categorize/tags/http.md)|[](/categorize/langs/Go.md)|
|Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)||[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|[](/categorize/langs/Python.md)|
|Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges||[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|[](/categorize/langs/Go.md)|
|Utils|[GadgetProbe](https://github.com/BishopFox/GadgetProbe)|Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.||[`deserialize`](/categorize/tags/deserialize.md)|[](/categorize/langs/Java.md)|
|Utils|[dsieve](https://github.com/trickest/dsieve)|Filter and enrich a list of subdomains by level||[`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Go.md)|
|Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|||[](/categorize/langs/JavaScript.md)|
|Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |||[](/categorize/langs/JavaScript.md)|
|Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester ||[`sqli`](/categorize/tags/sqli.md)|[](/categorize/langs/Python.md)|
|Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.||[`notify`](/categorize/tags/notify.md)|[](/categorize/langs/Go.md)|
|Utils|[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |||[](/categorize/langs/Go.md)|
|Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Python.md)|
|Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|||[](/categorize/langs/Go.md)|
|Utils|[bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)|Some files for bruteforcing certain things.||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/Txt.md)|
|Utils|[mubeng](https://github.com/kitabisa/mubeng)|An incredibly fast proxy checker & IP rotator with ease.|||[](/categorize/langs/Go.md)|
|Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|||[](/categorize/langs/Go.md)|
|Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|||[](/categorize/langs/HTML.md)|
|Utils|[fff](https://github.com/tomnomnom/fff)|The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|||[](/categorize/langs/Rust.md)|
|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||||[](/categorize/langs/BlitzBasic.md)|
|Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|||[](/categorize/langs/Python.md)|
|Utils|[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|||[](/categorize/langs/Go.md)|
|Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|||[](/categorize/langs/Go.md)|
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
|Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. ||[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters ||[`deserialize`](/categorize/tags/deserialize.md)|[](/categorize/langs/C%23.md)|
|Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. ||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Go.md)|
|Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |||[](/categorize/langs/Python.md)|
|Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Ruby.md)|
|Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/Txt.md)|
|Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|||[](/categorize/langs/Rust.md)|
|Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.||[`crawl`](/categorize/tags/crawl.md)|[](/categorize/langs/HTML.md)|
|Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Go.md)|
|Utils|[eoyc](https://github.com/hahwul/eoyc)|Encoding Only Your Choices||[`encode`](/categorize/tags/encode.md)|[](/categorize/langs/Crystal.md)|
|Utils|[gxss](https://github.com/rverton/gxss)|Blind XSS service alerting over slack or email||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Go.md)|
|Utils|[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep ||||
|Utils|[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |||[](/categorize/langs/Python.md)|
|Utils|[reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator)|Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)||[`payload`](/categorize/tags/payload.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1||[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google||[`csp`](/categorize/tags/csp.md)||
|Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Go.md)|
|Utils|[REcollapse](https://github.com/0xacb/recollapse)|REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications||[`fuzz`](/categorize/tags/fuzz.md)|[](/categorize/langs/Python.md)|
|Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[SerializationDumper](https://github.com/NickstaDB/SerializationDumper)|A tool to dump Java serialization streams in a more human readable form.||[`deserialize`](/categorize/tags/deserialize.md)|[](/categorize/langs/Java.md)|
|Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |||[](/categorize/langs/Shell.md)|
|Utils|[httptoolkit](https://github.com/httptoolkit/httptoolkit)|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac||||
|Utils|[nuclei-templates](https://github.com/projectdiscovery/nuclei-templates)|Community curated list of templates for the nuclei engine to find security vulnerabilities.||[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|[](/categorize/langs/Go.md)|
|Utils|[pdtm](https://github.com/projectdiscovery/pdtm)|ProjectDiscovery's Open Source Tool Manager||[`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md)|[](/categorize/langs/Go.md)|
|Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly||[`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Shell.md)|
|Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[SequenceDiagram](https://sequencediagram.org)|Online tool for creating UML sequence diagrams||[`online`](/categorize/tags/online.md)||
|Utils|[blistener](https://github.com/fyxme/blistener)|Blind-XSS listener with payloads||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Go.md)|
|Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[h2spacex](https://github.com/nxenon/h2spacex)|HTTP/2 Single Packet Attack low level library based on Scapy||[`race-condition`](/categorize/tags/race-condition.md)|[](/categorize/langs/Python.md)|
|Utils|[difftastic](https://github.com/Wilfred/difftastic)|a structural diff that understands syntax||[`diff`](/categorize/tags/diff.md)|[](/categorize/langs/Rust.md)|
|Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|||[](/categorize/langs/Rust.md)|
|Utils|[httpie](https://github.com/httpie/httpie)|modern, user-friendly command-line HTTP client for the API era||[`http`](/categorize/tags/http.md)|[](/categorize/langs/Python.md)|
|Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|||[](/categorize/langs/JavaScript.md)|
|Utils|[xless](https://github.com/mazen160/xless)|The Serverless Blind XSS App||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |||[](/categorize/langs/Go.md)|
|Utils|[Clipboard](https://github.com/Slackadays/Clipboard)|An external brain that remembers anything, anytime, anywhere.||[`clipboard`](/categorize/tags/clipboard.md)|[](/categorize/langs/C++.md)|
|Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable!||[`json`](/categorize/tags/json.md)|[](/categorize/langs/Go.md)|
|Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|||[](/categorize/langs/C++.md)|
|Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack||[`notify`](/categorize/tags/notify.md)|[](/categorize/langs/Go.md)|
|Utils|[ZipBomb](https://github.com/abdulfatir/ZipBomb)|A simple implementation of ZipBomb in Python||[`zipbomb`](/categorize/tags/zipbomb.md)|[](/categorize/langs/Python.md)|
|Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.||||
|Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. ||[`s3`](/categorize/tags/s3.md)|[](/categorize/langs/Go.md)|
|Utils|[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |||[](/categorize/langs/JavaScript.md)|
|Utils|[grc](https://github.com/garabik/grc)|generic colouriser|||[](/categorize/langs/Python.md)|
|Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. ||[`deserialize`](/categorize/tags/deserialize.md)|[](/categorize/langs/Java.md)|
|Utils|[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|||[](/categorize/langs/Go.md)|
|Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack||[`notify`](/categorize/tags/notify.md)|[](/categorize/langs/Shell.md)|
|Utils|[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|||[](/categorize/langs/Go.md)|
|Utils|[race-the-web](https://github.com/TheHackerDev/race-the-web)|Tests for race conditions in web applications by sending out a user-specified number of requests to a target URL (or URLs) simultaneously, and then compares the responses from the server for uniqueness.||[`race-condition`](/categorize/tags/race-condition.md)|[](/categorize/langs/Go.md)|
|Utils|[hoppscotch](https://github.com/hoppscotch/hoppscotch)|Open source API development ecosystem||[`http`](/categorize/tags/http.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|||[](/categorize/langs/Go.md)|
|Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |||[](/categorize/langs/Go.md)|
|Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. ||[`xss`](/categorize/tags/xss.md)||
|Utils|[nuclei-wordfence-cve](https://github.com/topscoder/nuclei-wordfence-cve)|Every single day new templates are added to this repo based on updates on Wordfence.com||[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|[](/categorize/langs/Python.md)|
|Utils|[godeclutter](https://github.com/c3l3si4n/godeclutter)|Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[missing-cve-nuclei-templates](https://github.com/edoardottt/missing-cve-nuclei-templates)|Weekly updated list of missing CVEs in nuclei templates official repository||[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|[](/categorize/langs/Txt.md)|
|Utils|[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |||[](/categorize/langs/Go.md)|
|Utils|[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |||[](/categorize/langs/Python.md)|
|Utils|[XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher)|Find blind XSS but why not gather data while you're at it.||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Python.md)|
|Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |||[](/categorize/langs/C%23.md)|
|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |||[](/categorize/langs/Ruby.md)|
|Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|||[](/categorize/langs/C.md)|
|Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker||[`infra`](/categorize/tags/infra.md)|[](/categorize/langs/Python.md)|
|Utils|[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|||[](/categorize/langs/Go.md)|
|Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. ||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/PHP.md)|
|Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph ||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[GQLSpection](https://github.com/doyensec/GQLSpection)|parses GraphQL introspection schema and generates possible queries||[`graphql`](/categorize/tags/graphql.md)|[](/categorize/langs/Python.md)|
|Utils|[cent](https://github.com/xm1k3/cent)|Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.||[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|[](/categorize/langs/Go.md)|
|Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) ||[`report`](/categorize/tags/report.md)|[](/categorize/langs/Shell.md)|
|Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.||||
|Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|
|Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|||[](/categorize/langs/Ruby.md)|
|Env|[Crimson](https://github.com/Karmaz95/crimson)|Web Application Security Testing automation.|||[](/categorize/langs/Python.md)|
### Bookmarklets
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
### Browser Addons
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Proxy|[rep](https://github.com/repplus/rep)|Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis||[`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md)|[](/categorize/langs/JavaScript.md)|
|Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website||||
|Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|||[](/categorize/langs/JavaScript.md)|
|Utils|[PwnFox](https://github.com/yeswehack/PwnFox)|Firefox/Burp extension that provide usefull tools for your security audit.|||[](/categorize/langs/JavaScript.md)|
|Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies||[`cookie`](/categorize/tags/cookie.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[Firefox Multi-Account Containers](https://github.com/mozilla/multi-account-containers)|Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs|||[](/categorize/langs/JavaScript.md)|
|Utils|[firefox-container-proxy](https://github.com/bekh6ex/firefox-container-proxy)|Assign a proxy to a Firefox container|||[](/categorize/langs/JavaScript.md)|
|Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|||[](/categorize/langs/JavaScript.md)|
|Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[DOMLogger++](https://github.com/kevin-mizu/domloggerpp)|A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.||[`dom`](/categorize/tags/dom.md) [`xss`](/categorize/tags/xss.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|||[](/categorize/langs/TypeScript.md)|
|Utils|[ZAP Browser Extension](https://github.com/zaproxy/browser-extension/)|A browser extension which allows ZAP to interact directly with the browser.||[`browser-record`](/categorize/tags/browser-record.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[User-Agent Switcher](https://addons.mozilla.org/ko/firefox/addon/user-agent-switcher-revived/)|quick and easy way to switch between user-agents.||||
|Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site||||
|Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||[](/categorize/langs/JavaScript.md)|
|Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.||[`cookie`](/categorize/tags/cookie.md)|[](/categorize/langs/JavaScript.md)|
|Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site||[`darkmode`](/categorize/tags/darkmode.md)|[](/categorize/langs/TypeScript.md)|
### Burpsuite, Caido and ZAP Addons
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Kotlin.md)|
|Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)|||||
|Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters||[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|[](/categorize/langs/Java.md)|
|Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters||[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|[](/categorize/langs/Java.md)|
|Recon|[Dr. Watson](https://github.com/prodigysml/Dr.-Watson)|Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information||[`param`](/categorize/tags/param.md) [`subdomains`](/categorize/tags/subdomains.md)|[](/categorize/langs/Python.md)|
|Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)|||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/Python.md)|
|Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)|||[`js-analysis`](/categorize/tags/js-analysis.md)|[](/categorize/langs/JavaScript.md)|
|Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)|||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Java.md)|
|Fuzzer|[GAP](https://github.com/xnl-h4ck3r/GAP-Burp-Extension)|This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on.||[`param`](/categorize/tags/param.md)|[](/categorize/langs/Python.md)|
|Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|Param Miner||[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|[](/categorize/langs/Java.md)|
|Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)|||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Java.md)|
|Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)|||[`aaa`](/categorize/tags/aaa.md)|[](/categorize/langs/Python.md)|
|Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)|||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Java.md)|
|Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)|||[`csp`](/categorize/tags/csp.md)|[](/categorize/langs/Java.md)|
|Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)|||[`smuggle`](/categorize/tags/smuggle.md)|[](/categorize/langs/Java.md)|
|Scanner|[Autorize](https://github.com/Quitten/Autorize)|||[`aaa`](/categorize/tags/aaa.md)|[](/categorize/langs/Python.md)|
|Utils|[Web3 Decoder](https://github.com/nccgroup/web3-decoder)|Burp Extension for Web3||[`web3`](/categorize/tags/web3.md)|[](/categorize/langs/Java.md)|
|Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||||[](/categorize/langs/Python.md)|
|Utils|[gRPC-Web Pentest Suite](https://github.com/nxenon/grpc-pentest-suite)|gRPC-Pentest-Suite is set of tools for pentesting / hacking gRPC Web (gRPC-Web) applications.||[`gRPC-Web`](/categorize/tags/gRPC-Web.md)|[](/categorize/langs/Python.md)|
|Utils|[pcap-burp](https://github.com/nccgroup/pcap-burp)|Pcap importer for Burp|||[](/categorize/langs/Java.md)|
|Utils|[safecopy](https://github.com/yashrs/safecopy)||||[](/categorize/langs/Java.md)|
|Utils|[argumentinjectionhammer](https://github.com/nccgroup/argumentinjectionhammer)|A Burp Extension designed to identify argument injection vulnerabilities.|||[](/categorize/langs/Python.md)|
|Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||||[](/categorize/langs/JavaScript.md)|
|utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||||[](/categorize/langs/Java.md)|
|Utils|[notebook](https://github.com/caido-community/notebook)|Notebook Caido Plugin||[`note`](/categorize/tags/note.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[AWSSigner](https://github.com/NetSPI/AWSSigner)|Burp Extension for AWS Signing|||[](/categorize/langs/Java.md)|
|Utils|[Map Local](https://github.com/Keindel/owasp-zap-maplocal-addon)|ZAP add-on which allows mapping of responses to content of a chosen local file.|||[](/categorize/langs/Java.md)|
|Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||||[](/categorize/langs/Java.md)|
|Utils|[inql](https://github.com/doyensec/inql)||||[](/categorize/langs/Python.md)|
|Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||||[](/categorize/langs/Kotlin.md)|
|Utils|[reflect](https://github.com/cak/reflect)||||[](/categorize/langs/Kotlin.md)|
|Utils|[Stepper](https://github.com/CoreyD97/Stepper)||||[](/categorize/langs/Java.md)|
|Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||||[](/categorize/langs/Java.md)|
|Utils|[taborator](https://github.com/hackvertor/taborator)|||[`oast`](/categorize/tags/oast.md)|[](/categorize/langs/Java.md)|
|Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better||[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.||[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|||[](/categorize/langs/Java.md)|
|Utils|[Berserko](https://github.com/nccgroup/Berserko)|Burp Suite extension to perform Kerberos authentication|||[](/categorize/langs/Java.md)|
|Utils|[caidope](https://github.com/skitttles-berry/caidope)|caidope - caido plugin|||[](/categorize/langs/TypeScript.md)|
|Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||||[](/categorize/langs/BlitzBasic.md)|
|Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||||[](/categorize/langs/Kotlin.md)|
|Utils|[femida](https://github.com/wish-i-was/femida)||||[](/categorize/langs/Python.md)|
|Utils|[Decoder-Improved](https://github.com/nccgroup/Decoder-Improved)|Improved decoder for Burp Suite|||[](/categorize/langs/Java.md)|
|Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||||[](/categorize/langs/Java.md)|
|Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|||[](/categorize/langs/Java.md)|
|Utils|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)|Automated HTTP Request Repeating With Burp Suite|||[](/categorize/langs/Java.md)|
|Utils|[blackboxprotobuf](https://github.com/nccgroup/blackboxprotobuf)|Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.|||[](/categorize/langs/Python.md)|
|Utils|[HTTPSignatures](https://github.com/nccgroup/HTTPSignatures)|A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.|||[](/categorize/langs/Java.md)|
|Utils|[CaidoReflector](https://github.com/bebiksior/CaidoReflector)|Automatically look for paramater reflections in the HTTP response||[`xss`](/categorize/tags/xss.md)|[](/categorize/langs/TypeScript.md)|
|Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||||[](/categorize/langs/Java.md)|
|utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)|||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/Java.md)|
## Thanks to (Contributor)
WHW's open-source project and made it with ❤️ if you want contribute this project, please see [CONTRIBUTING.md](https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md) and Pull-Request with cool your contents.
[](https://github.com/hahwul/WebHackersWeapons/graphs/contributors)
================================================
FILE: SECURITY.md
================================================
# Security Policy
## Supported Versions
Use this section to tell people about which versions of your project are
currently being supported with security updates.
| Version | Supported |
| ------- | ------------------ |
| 5.1.x | :white_check_mark: |
| 5.0.x | :x: |
| 4.0.x | :white_check_mark: |
| < 4.0 | :x: |
## Reporting a Vulnerability
Use this section to tell people how to report a vulnerability.
Tell them where to go, how often they can expect to get an update on a
reported vulnerability, what to expect if the vulnerability is accepted or
declined, etc.
================================================
FILE: categorize/langs/BlitzBasic.md
================================================
## Tools Made of BlitzBasic
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||||[](/categorize/langs/BlitzBasic.md)|
|Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||||[](/categorize/langs/BlitzBasic.md)|
================================================
FILE: categorize/langs/C#.md
================================================
## Tools Made of C#
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Scanner|[ConfusedDotnet](https://github.com/visma-prodsec/ConfusedDotnet)|Tool to check for dependency confusion vulnerabilities in NuGet package management systems||[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|[](/categorize/langs/C%23.md)|
|Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters ||[`deserialize`](/categorize/tags/deserialize.md)|[](/categorize/langs/C%23.md)|
|Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |||[](/categorize/langs/C%23.md)|
================================================
FILE: categorize/langs/C++.md
================================================
## Tools Made of C++
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Utils|[Clipboard](https://github.com/Slackadays/Clipboard)|An external brain that remembers anything, anytime, anywhere.||[`clipboard`](/categorize/tags/clipboard.md)|[](/categorize/langs/C++.md)|
|Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|||[](/categorize/langs/C++.md)|
================================================
FILE: categorize/langs/C.md
================================================
## Tools Made of C
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/C.md)|
|Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C ||[`jwt`](/categorize/tags/jwt.md)|[](/categorize/langs/C.md)|
|Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |||[](/categorize/langs/C.md)|
|Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |||[](/categorize/langs/C.md)|
|Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. ||[`portscan`](/categorize/tags/portscan.md)|[](/categorize/langs/C.md)|
|Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|||[](/categorize/langs/C.md)|
================================================
FILE: categorize/langs/CSS.md
================================================
## Tools Made of CSS
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote||[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|[](/categorize/langs/CSS.md)|
================================================
FILE: categorize/langs/Crystal.md
================================================
## Tools Made of Crystal
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis||[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|[](/categorize/langs/Crystal.md)|
|Utils|[eoyc](https://github.com/hahwul/eoyc)|Encoding Only Your Choices||[`encode`](/categorize/tags/encode.md)|[](/categorize/langs/Crystal.md)|
================================================
FILE: categorize/langs/Go.md
================================================
## Tools Made of Go
| Type | Name | Description | Star | Tags | Badges |
| --- | --- | --- | --- | --- | --- |
|Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing ||[`live-audit`](/categorize/tags/live-audit.md)|[](/categorize/langs/Go.md)|
|Proxy|[Glorp](https://github.com/denandz/glorp)|A CLI-based HTTP intercept and replay proxy||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Go.md)|
|Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information||[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|[](/categorize/langs/Go.md)|
|Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|||[](/categorize/langs/Go.md)|
|Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers||[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|[](/categorize/langs/Go.md)|
|Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.||[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|[](/categorize/langs/Go.md)|
|Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |||[](/categorize/langs/Go.md)|
|Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain ||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[csprecon](https://github.com/edoardottt/csprecon)|Discover new target domains using Content Security Policy||[`csp`](/categorize/tags/csp.md)|[](/categorize/langs/Go.md)|
|Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |||[](/categorize/langs/Go.md)|
|Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection||[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|[](/categorize/langs/Go.md)|
|Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |||[](/categorize/langs/Go.md)|
|Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.||[`url`](/categorize/tags/url.md)|[](/categorize/langs/Go.md)|
|Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |||[](/categorize/langs/Go.md)|
|Recon|[github-endpoin
gitextract_zmpygua0/
├── .github/
│ ├── FUNDING.yml
│ ├── labeler.yml
│ └── workflows/
│ ├── cd.yml
│ ├── labeler.yml
│ └── yaml-lint.yml
├── .gitignore
├── .yamllint.yml
├── AGENTS.md
├── CODE_OF_CONDUCT.md
├── CONTRIBUTING.md
├── LICENSE
├── README.md
├── SECURITY.md
├── categorize/
│ ├── langs/
│ │ ├── BlitzBasic.md
│ │ ├── C#.md
│ │ ├── C++.md
│ │ ├── C.md
│ │ ├── CSS.md
│ │ ├── Crystal.md
│ │ ├── Go.md
│ │ ├── HTML.md
│ │ ├── Java.md
│ │ ├── JavaScript.md
│ │ ├── Kotlin.md
│ │ ├── PHP.md
│ │ ├── Perl.md
│ │ ├── Python.md
│ │ ├── Ruby.md
│ │ ├── Rust.md
│ │ ├── Shell.md
│ │ ├── Txt.md
│ │ └── TypeScript.md
│ └── tags/
│ ├── 403.md
│ ├── RMI.md
│ ├── aaa.md
│ ├── apk.md
│ ├── asn.md
│ ├── asset-discovery.md
│ ├── attack-surface.md
│ ├── authentication.md
│ ├── aws.md
│ ├── blind-xss.md
│ ├── broken-link.md
│ ├── browser-record.md
│ ├── cache-vuln.md
│ ├── certificates.md
│ ├── cidr.md
│ ├── clipboard.md
│ ├── cloud.md
│ ├── code-analysis.md
│ ├── container-security.md
│ ├── cookie.md
│ ├── cors.md
│ ├── crawl.md
│ ├── credentials.md
│ ├── crlf.md
│ ├── csp.md
│ ├── darkmode.md
│ ├── dependency-confusion.md
│ ├── dependency-scanning.md
│ ├── deserialize.md
│ ├── diff.md
│ ├── dns.md
│ ├── documents.md
│ ├── dom.md
│ ├── domain.md
│ ├── encode.md
│ ├── endpoint.md
│ ├── exploit.md
│ ├── favicon.md
│ ├── forensics.md
│ ├── fuzz.md
│ ├── gRPC-Web.md
│ ├── graphql.md
│ ├── header.md
│ ├── http.md
│ ├── infra.md
│ ├── ip-manipulation.md
│ ├── js-analysis.md
│ ├── json.md
│ ├── jwt.md
│ ├── lfi.md
│ ├── live-audit.md
│ ├── mitmproxy.md
│ ├── network-mapping.md
│ ├── network.md
│ ├── nosqli.md
│ ├── note.md
│ ├── notify.md
│ ├── nuclei-templates.md
│ ├── oast.md
│ ├── online.md
│ ├── open-redirect.md
│ ├── osint.md
│ ├── package-manager.md
│ ├── param.md
│ ├── path-traversal.md
│ ├── payload.md
│ ├── pentest.md
│ ├── permutation.md
│ ├── port.md
│ ├── portscan.md
│ ├── prototype-pollution.md
│ ├── prototypepollution.md
│ ├── race-condition.md
│ ├── recon.md
│ ├── repeater.md
│ ├── report.md
│ ├── rfi.md
│ ├── rop.md
│ ├── s3.md
│ ├── sast.md
│ ├── sbom.md
│ ├── secret-scanning.md
│ ├── security.md
│ ├── smuggle.md
│ ├── social-engineering.md
│ ├── sqli.md
│ ├── ssl.md
│ ├── ssrf.md
│ ├── ssti.md
│ ├── steganography.md
│ ├── subdomains.md
│ ├── takeover.md
│ ├── terraform.md
│ ├── tls.md
│ ├── tools-management.md
│ ├── url.md
│ ├── vulnerability-scanner.md
│ ├── web-scanner.md
│ ├── web3.md
│ ├── wordlist.md
│ ├── xss.md
│ ├── xxe.md
│ └── zipbomb.md
├── scripts/
│ ├── erb.rb
│ ├── for_migration/
│ │ ├── apply_platform.rb
│ │ ├── fetch_lang.rb
│ │ └── migration.rb
│ ├── last_change
│ └── validate_weapons.rb
└── weapons/
├── 230-OOB.yaml
├── 3klCon.yaml
├── AWSBucketDump.yaml
├── AWSSigner.yaml
├── Amass.yaml
├── Arjun.yaml
├── Assetnote_Wordlists.yaml
├── Atlas.yaml
├── AuthMatrix.yaml
├── AutoRepeater.yaml
├── Autorize.yaml
├── BLUTO.yaml
├── BaRMIe.yaml
├── BatchQL.yaml
├── Berserko.yaml
├── Blacklist3r.yaml
├── BruteX.yaml
├── Bug-Bounty-Toolz.yaml
├── BugBountyScanner.yaml
├── BurpBounty.yaml
├── BurpCustomizer.yaml
├── BurpJSLinkFinder.yaml
├── BurpSuite-Secret_Finder.yaml
├── BurpSuite.yaml
├── BurpSuiteHTTPSmuggler.yaml
├── BurpSuiteLoggerPlusPlus.yaml
├── CMSmap.yaml
├── CSP_Evaluator.yaml
├── CT_subdomains.yaml
├── CaidoReflector.yaml
├── Chaos_Web.yaml
├── Chromium-based-XSS-Taint-Tracking.yaml
├── Clipboard.yaml
├── ConfusedDotnet.yaml
├── CorsMe.yaml
├── Corsy.yaml
├── CrackQL.yaml
├── CyberChef.yaml
├── DNSDumpster.yaml
├── DOMPurify.yaml
├── DSSS.yaml
├── Dark_Reader.yaml
├── Dark_Reader_for_Safari.yaml
├── Decoder-Improved.yaml
├── DeepViolet.yaml
├── DirDar.yaml
├── DotGit.yaml
├── Dr. Watson.yaml
├── EchoMirage.yaml
├── Edit-This-Cookie.yaml
├── Emissary.yaml
├── EvenBetter.yaml
├── EvenBetterExtensions.yaml
├── FavFreak.yaml
├── Findsploit.yaml
├── Firefox Multi-Account Containers.yaml
├── FockCache.yaml
├── GAP.yaml
├── GQLSpection.yaml
├── GadgetProbe.yaml
├── Gf-Patterns.yaml
├── GitMiner.yaml
├── Glorp.yaml
├── Glue.yaml
├── Gopherus.yaml
├── GraphQLmap.yaml
├── HRS.yaml
├── HTTPSignatures.yaml
├── HUNT.yaml
├── Hack-Tools.yaml
├── HostHunter.yaml
├── Hunt3r.yaml
├── HydraRecon.yaml
├── IntruderPayloads.yaml
├── JSFScan.sh.yaml
├── LFISuite.yaml
├── LOXS.yaml
├── Lepus.yaml
├── LinkFinder.yaml
├── MM3_ProxySwitch.yaml
├── NoSQLMap.yaml
├── NoXss.yaml
├── OneForAll.yaml
├── OpenRedireX.yaml
├── Oralyzer.yaml
├── Osmedeus.yaml
├── PPScan.yaml
├── ParamPamPam.yaml
├── ParamSpider.yaml
├── ParamWizard.yaml
├── Parth.yaml
├── PayloadsAllTheThings.yaml
├── Phoenix.yaml
├── Photon.yaml
├── PoC-in-GitHub.yaml
├── PwnFox.yaml
├── PwnXSS.yaml
├── REcollapse.yaml
├── Redcloud.yaml
├── RustScan.yaml
├── S3Scanner.yaml
├── S3cret Scanner.yaml
├── SQLNinja.yaml
├── SQLiDetector.yaml
├── SSRFire.yaml
├── SSRFmap.yaml
├── SSTImap.yaml
├── STEWS.yaml
├── SecLists.yaml
├── SecretFinder.yaml
├── SecurityTrails.yaml
├── SequenceDiagram.yaml
├── SerializationDumper.yaml
├── Shodan.yaml
├── Silver.yaml
├── Sn1per.yaml
├── Stepper.yaml
├── Striker.yaml
├── SubOver.yaml
├── Sublist3r.yaml
├── Taipan.yaml
├── TukTuk.yaml
├── User-Agent_Switcher.yaml
├── V3n0M-Scanner.yaml
├── VHostScan.yaml
├── Wayback_Machine.yaml
├── Web-Cache-Vulnerability-Scanner.yaml
├── Web3 Decoder.yaml
├── XSRFProbe.yaml
├── XSS-Catcher.yaml
├── XSStrike.yaml
├── XSpear.yaml
├── XXEinjector.yaml
├── XXExploiter.yaml
├── XssPy.yaml
├── ZipBomb.yaml
├── a2sv.yaml
├── altdns.yaml
├── alterx.yaml
├── anew.yaml
├── apkleaks.yaml
├── aquatone.yaml
├── arachni.yaml
├── argumentinjectionhammer.yaml
├── asnmap.yaml
├── assetfinder.yaml
├── attack-surface-detector-burp.yaml
├── attack-surface-detector-zap.yaml
├── autochrome.yaml
├── autopoisoner.yaml
├── axiom.yaml
├── bat.yaml
├── baudrillard-suite.yaml
├── bbot.yaml
├── beef.yaml
├── blackboxprotobuf.yaml
├── blistener.yaml
├── boast.yaml
├── bountyplz.yaml
├── bruteforce-lists.yaml
├── burl.yaml
├── burp-exporter.yaml
├── burp-piper.yaml
├── burp-retire-js.yaml
├── burp-send-to.yaml
├── c-jwt-cracker.yaml
├── caido.yaml
├── caidope.yaml
├── can-i-take-over-xyz.yaml
├── cariddi.yaml
├── cc.py.yaml
├── cent.yaml
├── cf-check.yaml
├── chaos-client.yaml
├── clairvoyance.yaml
├── clear-cache.yaml
├── cloud-audit.yaml
├── cloudlist.yaml
├── collaborator-everywhere.yaml
├── commix.yaml
├── community-scripts.yaml
├── confused.yaml
├── cookie-quick-manager.yaml
├── corsair_scan.yaml
├── crawlergo.yaml
├── crimson.yaml
├── crlfuzz.yaml
├── csp-auditor.yaml
├── csprecon.yaml
├── curl.yaml
├── dalfox.yaml
├── deadfinder.yaml
├── deadlinks.yaml
├── deadsniper.yaml
├── dependency-confusion-scanner.yaml
├── depenfusion.yaml
├── difftastic.yaml
├── dirsearch.yaml
├── ditto.yaml
├── dmut.yaml
├── dnsobserver.yaml
├── dnsprobe.yaml
├── dnsvalidator.yaml
├── dnsx.yaml
├── docem.yaml
├── domdig.yaml
├── domloggerpp.yaml
├── dontgo403.yaml
├── dotdotpwn.yaml
├── dsieve.yaml
├── eoyc.yaml
├── eval_villain.yaml
├── evil-proxy.yaml
├── ezXSS.yaml
├── favirecon.yaml
├── femida.yaml
├── feroxbuster.yaml
├── fff.yaml
├── ffuf.yaml
├── fhc.yaml
├── findom-xss.yaml
├── findomain.yaml
├── firefox-container-proxy.yaml
├── fuzzparam.yaml
├── fzf.yaml
├── gRPC-Pentest-Suite.yaml
├── gau.yaml
├── gauplus.yaml
├── gee.yaml
├── getJS.yaml
├── gf.yaml
├── ghauri.yaml
├── gitGraber.yaml
├── github-endpoints.yaml
├── github-regexp.yaml
├── github-search.yaml
├── github-subdomains.yaml
├── gitleaks.yaml
├── gitls.yaml
├── gitrob.yaml
├── go-dork.yaml
├── gobuster.yaml
├── godeclutter.yaml
├── gospider.yaml
├── gotator.yaml
├── gotestwaf.yaml
├── goverview.yaml
├── gowitness.yaml
├── graphql-voyager.yaml
├── graphw00f.yaml
├── grc.yaml
├── grex.yaml
├── gron.yaml
├── gxss.yaml
├── h2csmuggler.yaml
├── h2spacex.yaml
├── hacks.yaml
├── hakcheckurl.yaml
├── hakrawler.yaml
├── hakrevdns.yaml
├── haktrails.yaml
├── hashcat.yaml
├── hbxss.yaml
├── headerpwn.yaml
├── headi.yaml
├── hetty.yaml
├── hinject.yaml
├── hoppscotch.yaml
├── htcat.yaml
├── http-request-smuggler.yaml
├── http-request-smuggling.yaml
├── http-script-generator.yaml
├── http2smugl.yaml
├── httpie.yaml
├── httprobe.yaml
├── httptoolkit.yaml
├── httpx.yaml
├── hurl.yaml
├── inql.yaml
├── interactsh.yaml
├── intrigue-core.yaml
├── jaeles.yaml
├── jsfuck.yaml
├── jsluice.yaml
├── jsonwebtoken.github.io.yaml
├── jsprime.yaml
├── jwt-cracker.yaml
├── jwt-hack.yaml
├── jwt_tool.yaml
├── katana.yaml
├── kiterunner.yaml
├── knife.yaml
├── knock.yaml
├── lazyrecon.yaml
├── liffy.yaml
├── longtongue.yaml
├── mapcidr.yaml
├── masscan.yaml
├── medusa.yaml
├── meg.yaml
├── megplus.yaml
├── metasploit.yaml
├── missing-cve-nuclei-templates.yaml
├── mitmproxy.yaml
├── mubeng.yaml
├── naabu.yaml
├── neonmarker.yaml
├── nikto.yaml
├── nmap.yaml
├── noir.yaml
├── nosqli.yaml
├── notebook.yaml
├── nuclei-templates.yaml
├── nuclei-wordfence-cve.yaml
├── nuclei.yaml
├── ob_hacky_slack.yaml
├── of-CORS.yaml
├── osv-scanner.yaml
├── owasp-zap-jwt-addon.yaml
├── owasp-zap-maplocal-addon.yaml
├── oxml_xxe.yaml
├── pagodo.yaml
├── param-miner.yaml
├── parameth.yaml
├── pcap-burp.yaml
├── pdtm.yaml
├── pentest-env.yaml
├── pentest-tools.yaml
├── pet.yaml
├── plution.yaml
├── postMessage-tracker.yaml
├── ppfuzz.yaml
├── pphack.yaml
├── ppmap.yaml
├── proxify.yaml
├── puredns.yaml
├── pwncat.yaml
├── qsreplace.yaml
├── quickjack.yaml
├── race-the-web.yaml
├── rapidscan.yaml
├── recon_profile.yaml
├── reconftw.yaml
├── reflect.yaml
├── reflected-parameters.yaml
├── rengine.yaml
├── rep.yaml
├── reverse-shell-generator.yaml
├── ronin.yaml
├── ropr.yaml
├── rusolver.yaml
├── s3reverse.yaml
├── safecopy.yaml
├── scan4all.yaml
├── scilla.yaml
├── security-crawl-maze.yaml
├── security-research-pocs.yaml
├── semgrep.yaml
├── shosubgo.yaml
├── shuffledns.yaml
├── singularity.yaml
├── slackcat.yaml
├── smap.yaml
├── smugglefuzz.yaml
├── smuggler.yaml
├── smugglex.yaml
├── sn0int.yaml
├── spiderfoot.yaml
├── sqliv.yaml
├── sqlmap.yaml
├── ssrf-sheriff.yaml
├── sub404.yaml
├── subbrute.yaml
├── subfinder.yaml
├── subgen.yaml
├── subjack.yaml
├── subjs.yaml
├── subs_all.yaml
├── subzy.yaml
├── sudomy.yaml
├── taborator.yaml
├── template-generator.yaml
├── testssl.sh.yaml
├── thc-hydra.yaml
├── tiscripts.yaml
├── tlsx.yaml
├── toxssin.yaml
├── tplmap.yaml
├── trivy.yaml
├── trufflehog.yaml
├── turbo-intruder.yaml
├── uncover.yaml
├── unfurl.yaml
├── urlgrab.yaml
├── urlhunter.yaml
├── urlprobe.yaml
├── uro.yaml
├── urx.yaml
├── wapiti.yaml
├── waybackurls.yaml
├── waymore.yaml
├── weaponised-XSS-payloads.yaml
├── web_cache_poison.yaml
├── websocket-connection-smuggler.yaml
├── wfuzz.yaml
├── wprecon.yaml
├── wpscan.yaml
├── ws-smuggler.yaml
├── wssip.yaml
├── wuzz.yaml
├── x8.yaml
├── xless.yaml
├── xnLinkFinder.yaml
├── xsinator.com.yaml
├── xss-cheatsheet-data.yaml
├── xsscrapy.yaml
├── xsser.yaml
├── xssor2.yaml
├── xsssniper.yaml
├── xurlfind3r.yaml
├── xxeserv.yaml
├── ysoserial.net.yaml
├── ysoserial.yaml
├── zap-browser-extension.yaml
├── zap-cli.yaml
├── zap-hud.yaml
├── zaproxy.yaml
├── zdns.yaml
└── zip-bomb.yaml
SYMBOL INDEX (7 symbols across 2 files) FILE: scripts/erb.rb function generate_badge (line 4) | def generate_badge array function generate_tags (line 31) | def generate_tags array FILE: scripts/for_migration/migration.rb function get_os (line 5) | def get_os install function get_browser (line 19) | def get_browser str function get_url (line 43) | def get_url str function get_lang (line 53) | def get_lang url function migrate (line 59) | def migrate jsonfile, category
Condensed preview — 570 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (656K chars).
[
{
"path": ".github/FUNDING.yml",
"chars": 14,
"preview": "github: hahwul"
},
{
"path": ".github/labeler.yml",
"chars": 328,
"preview": "⚔️ Weapons:\n- changed-files:\n - any-glob-to-any-file: \n - weapons/**\n\n⚙️ Development:\n- changed-files:\n - any-glob-"
},
{
"path": ".github/workflows/cd.yml",
"chars": 1201,
"preview": "---\nname: Continuous Deployment\non:\n push:\n branches: [main]\n workflow_dispatch:\njobs:\n Deploy:\n runs-on: ubunt"
},
{
"path": ".github/workflows/labeler.yml",
"chars": 206,
"preview": "name: \"Pull Request Labeler\"\non: [pull_request_target]\n\njobs:\n labeler:\n permissions:\n contents: read\n pul"
},
{
"path": ".github/workflows/yaml-lint.yml",
"chars": 313,
"preview": "---\nname: YAML Lint\non:\n pull_request:\n branches: [main]\njobs:\n lintAllTheThings:\n runs-on: ubuntu-latest\n st"
},
{
"path": ".gitignore",
"chars": 9,
"preview": ".DS_Store"
},
{
"path": ".yamllint.yml",
"chars": 574,
"preview": "---\nrules:\n anchors: enable\n braces: enable\n brackets: enable\n colons: enable\n commas: enable\n comments:\n level"
},
{
"path": "AGENTS.md",
"chars": 6582,
"preview": "# WebHackersWeapons Repository\nWebHackersWeapons is a curated collection of web security tools and utilities. It contain"
},
{
"path": "CODE_OF_CONDUCT.md",
"chars": 3348,
"preview": "# Contributor Covenant Code of Conduct\n\n## Our Pledge\n\nIn the interest of fostering an open and welcoming environment, w"
},
{
"path": "CONTRIBUTING.md",
"chars": 1617,
"preview": "## ⚠️ Important\nThe paths below is automatically generated. \n\n- `README.md`\n- `categorize/*`\n\nPlease contribute only the"
},
{
"path": "LICENSE",
"chars": 1059,
"preview": "MIT License\n\nCopyright (c) 2025 하훌\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this"
},
{
"path": "README.md",
"chars": 168709,
"preview": "\n<div align=\"center\">\n <picture>\n <source media=\"(prefers-color-scheme: dark)\" srcset=\"images/whw-dark.png\" width=\"5"
},
{
"path": "SECURITY.md",
"chars": 619,
"preview": "# Security Policy\n\n## Supported Versions\n\nUse this section to tell people about which versions of your project are\ncurre"
},
{
"path": "categorize/langs/BlitzBasic.md",
"chars": 760,
"preview": "\n## Tools Made of BlitzBasic\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/langs/C#.md",
"chars": 1211,
"preview": "\n## Tools Made of C#\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanne"
},
{
"path": "categorize/langs/C++.md",
"chars": 884,
"preview": "\n## Tools Made of C++\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/langs/C.md",
"chars": 2317,
"preview": "\n## Tools Made of C\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|["
},
{
"path": "categorize/langs/CSS.md",
"chars": 532,
"preview": "\n## Tools Made of CSS\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/langs/Crystal.md",
"chars": 874,
"preview": "\n## Tools Made of Crystal\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|R"
},
{
"path": "categorize/langs/Go.md",
"chars": 49137,
"preview": "\n## Tools Made of Go\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-K"
},
{
"path": "categorize/langs/HTML.md",
"chars": 972,
"preview": "\n## Tools Made of HTML\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Util"
},
{
"path": "categorize/langs/Java.md",
"chars": 12816,
"preview": "\n## Tools Made of Java\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army"
},
{
"path": "categorize/langs/JavaScript.md",
"chars": 14106,
"preview": "\n## Tools Made of JavaScript\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/langs/Kotlin.md",
"chars": 1456,
"preview": "\n## Tools Made of Kotlin\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Re"
},
{
"path": "categorize/langs/PHP.md",
"chars": 544,
"preview": "\n## Tools Made of PHP\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/langs/Perl.md",
"chars": 1454,
"preview": "\n## Tools Made of Perl\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzz"
},
{
"path": "categorize/langs/Python.md",
"chars": 45921,
"preview": "\n## Tools Made of Python\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Ar"
},
{
"path": "categorize/langs/Ruby.md",
"chars": 5528,
"preview": "\n## Tools Made of Ruby\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army"
},
{
"path": "categorize/langs/Rust.md",
"chars": 5527,
"preview": "\n## Tools Made of Rust\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Prox"
},
{
"path": "categorize/langs/Shell.md",
"chars": 7178,
"preview": "\n## Tools Made of Shell\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Arm"
},
{
"path": "categorize/langs/Txt.md",
"chars": 1517,
"preview": "\n## Tools Made of Txt\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/langs/TypeScript.md",
"chars": 4872,
"preview": "\n## Tools Made of TypeScript\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/403.md",
"chars": 830,
"preview": "\n## Tools for 403\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/RMI.md",
"chars": 446,
"preview": "\n## Tools for RMI\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Exploit|["
},
{
"path": "categorize/tags/aaa.md",
"chars": 801,
"preview": "\n## Tools for aaa\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/apk.md",
"chars": 548,
"preview": "\n## Tools for apk\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[ap"
},
{
"path": "categorize/tags/asn.md",
"chars": 560,
"preview": "\n## Tools for asn\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[as"
},
{
"path": "categorize/tags/asset-discovery.md",
"chars": 565,
"preview": "\n## Tools for asset-discovery\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/attack-surface.md",
"chars": 1761,
"preview": "\n## Tools for attack-surface\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/authentication.md",
"chars": 543,
"preview": "\n## Tools for authentication\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/aws.md",
"chars": 655,
"preview": "\n## Tools for aws\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/blind-xss.md",
"chars": 2463,
"preview": "\n## Tools for blind-xss\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Uti"
},
{
"path": "categorize/tags/broken-link.md",
"chars": 1190,
"preview": "\n## Tools for broken-link\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|S"
},
{
"path": "categorize/tags/browser-record.md",
"chars": 651,
"preview": "\n## Tools for browser-record\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/cache-vuln.md",
"chars": 2571,
"preview": "\n## Tools for cache-vuln\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fu"
},
{
"path": "categorize/tags/certificates.md",
"chars": 572,
"preview": "\n## Tools for certificates\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|"
},
{
"path": "categorize/tags/cidr.md",
"chars": 596,
"preview": "\n## Tools for cidr\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[m"
},
{
"path": "categorize/tags/clipboard.md",
"chars": 494,
"preview": "\n## Tools for clipboard\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Uti"
},
{
"path": "categorize/tags/cloud.md",
"chars": 1099,
"preview": "\n## Tools for cloud\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|["
},
{
"path": "categorize/tags/code-analysis.md",
"chars": 586,
"preview": "\n## Tools for code-analysis\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n"
},
{
"path": "categorize/tags/container-security.md",
"chars": 671,
"preview": "\n## Tools for container-security\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | -"
},
{
"path": "categorize/tags/cookie.md",
"chars": 1059,
"preview": "\n## Tools for cookie\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|"
},
{
"path": "categorize/tags/cors.md",
"chars": 1620,
"preview": "\n## Tools for cors\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|"
},
{
"path": "categorize/tags/crawl.md",
"chars": 4105,
"preview": "\n## Tools for crawl\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-Kn"
},
{
"path": "categorize/tags/credentials.md",
"chars": 584,
"preview": "\n## Tools for credentials\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|S"
},
{
"path": "categorize/tags/crlf.md",
"chars": 978,
"preview": "\n## Tools for crlf\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer|["
},
{
"path": "categorize/tags/csp.md",
"chars": 1040,
"preview": "\n## Tools for csp\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[cs"
},
{
"path": "categorize/tags/darkmode.md",
"chars": 1605,
"preview": "\n## Tools for darkmode\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Util"
},
{
"path": "categorize/tags/dependency-confusion.md",
"chars": 1944,
"preview": "\n## Tools for dependency-confusion\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/dependency-scanning.md",
"chars": 626,
"preview": "\n## Tools for dependency-scanning\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | "
},
{
"path": "categorize/tags/deserialize.md",
"chars": 1810,
"preview": "\n## Tools for deserialize\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|U"
},
{
"path": "categorize/tags/diff.md",
"chars": 459,
"preview": "\n## Tools for diff\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[d"
},
{
"path": "categorize/tags/dns.md",
"chars": 5086,
"preview": "\n## Tools for dns\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[pu"
},
{
"path": "categorize/tags/documents.md",
"chars": 1926,
"preview": "\n## Tools for documents\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Uti"
},
{
"path": "categorize/tags/dom.md",
"chars": 658,
"preview": "\n## Tools for dom\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[DO"
},
{
"path": "categorize/tags/domain.md",
"chars": 449,
"preview": "\n## Tools for domain\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|"
},
{
"path": "categorize/tags/encode.md",
"chars": 1508,
"preview": "\n## Tools for encode\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|"
},
{
"path": "categorize/tags/endpoint.md",
"chars": 2192,
"preview": "\n## Tools for endpoint\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Reco"
},
{
"path": "categorize/tags/exploit.md",
"chars": 1267,
"preview": "\n## Tools for exploit\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-"
},
{
"path": "categorize/tags/favicon.md",
"chars": 541,
"preview": "\n## Tools for favicon\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon"
},
{
"path": "categorize/tags/forensics.md",
"chars": 816,
"preview": "\n## Tools for forensics\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Arm"
},
{
"path": "categorize/tags/fuzz.md",
"chars": 951,
"preview": "\n## Tools for fuzz\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer|["
},
{
"path": "categorize/tags/gRPC-Web.md",
"chars": 580,
"preview": "\n## Tools for gRPC-Web\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Util"
},
{
"path": "categorize/tags/graphql.md",
"chars": 2874,
"preview": "\n## Tools for graphql\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon"
},
{
"path": "categorize/tags/header.md",
"chars": 1191,
"preview": "\n## Tools for header\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer"
},
{
"path": "categorize/tags/http.md",
"chars": 1567,
"preview": "\n## Tools for http\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Proxy|[r"
},
{
"path": "categorize/tags/infra.md",
"chars": 851,
"preview": "\n## Tools for infra\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-Kn"
},
{
"path": "categorize/tags/ip-manipulation.md",
"chars": 607,
"preview": "\n## Tools for ip-manipulation\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/js-analysis.md",
"chars": 3697,
"preview": "\n## Tools for js-analysis\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|R"
},
{
"path": "categorize/tags/json.md",
"chars": 418,
"preview": "\n## Tools for json\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[g"
},
{
"path": "categorize/tags/jwt.md",
"chars": 2455,
"preview": "\n## Tools for jwt\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer|[c"
},
{
"path": "categorize/tags/lfi.md",
"chars": 1454,
"preview": "\n## Tools for lfi\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/live-audit.md",
"chars": 1303,
"preview": "\n## Tools for live-audit\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Ar"
},
{
"path": "categorize/tags/mitmproxy.md",
"chars": 3490,
"preview": "\n## Tools for mitmproxy\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Arm"
},
{
"path": "categorize/tags/network-mapping.md",
"chars": 572,
"preview": "\n## Tools for network-mapping\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/network.md",
"chars": 599,
"preview": "\n## Tools for network\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/tags/nosqli.md",
"chars": 834,
"preview": "\n## Tools for nosqli\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanne"
},
{
"path": "categorize/tags/note.md",
"chars": 494,
"preview": "\n## Tools for note\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[n"
},
{
"path": "categorize/tags/notify.md",
"chars": 1246,
"preview": "\n## Tools for notify\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|"
},
{
"path": "categorize/tags/nuclei-templates.md",
"chars": 1937,
"preview": "\n## Tools for nuclei-templates\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | ---"
},
{
"path": "categorize/tags/oast.md",
"chars": 2436,
"preview": "\n## Tools for oast\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|"
},
{
"path": "categorize/tags/online.md",
"chars": 1138,
"preview": "\n## Tools for online\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|"
},
{
"path": "categorize/tags/open-redirect.md",
"chars": 625,
"preview": "\n## Tools for open-redirect\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n"
},
{
"path": "categorize/tags/osint.md",
"chars": 2882,
"preview": "\n## Tools for osint\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-kn"
},
{
"path": "categorize/tags/package-manager.md",
"chars": 547,
"preview": "\n## Tools for package-manager\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/param.md",
"chars": 4665,
"preview": "\n## Tools for param\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|["
},
{
"path": "categorize/tags/path-traversal.md",
"chars": 493,
"preview": "\n## Tools for path-traversal\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/payload.md",
"chars": 563,
"preview": "\n## Tools for payload\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "categorize/tags/pentest.md",
"chars": 1297,
"preview": "\n## Tools for pentest\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-"
},
{
"path": "categorize/tags/permutation.md",
"chars": 589,
"preview": "\n## Tools for permutation\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|R"
},
{
"path": "categorize/tags/port.md",
"chars": 1222,
"preview": "\n## Tools for port\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[s"
},
{
"path": "categorize/tags/portscan.md",
"chars": 1733,
"preview": "\n## Tools for portscan\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Reco"
},
{
"path": "categorize/tags/prototype-pollution.md",
"chars": 2444,
"preview": "\n## Tools for prototype-pollution\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | "
},
{
"path": "categorize/tags/prototypepollution.md",
"chars": 2443,
"preview": "\n## Tools for prototypepollution\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | -"
},
{
"path": "categorize/tags/race-condition.md",
"chars": 1044,
"preview": "\n## Tools for race-condition\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |"
},
{
"path": "categorize/tags/recon.md",
"chars": 1224,
"preview": "\n## Tools for recon\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Army-kn"
},
{
"path": "categorize/tags/repeater.md",
"chars": 519,
"preview": "\n## Tools for repeater\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Prox"
},
{
"path": "categorize/tags/report.md",
"chars": 538,
"preview": "\n## Tools for report\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|"
},
{
"path": "categorize/tags/rfi.md",
"chars": 621,
"preview": "\n## Tools for rfi\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/rop.md",
"chars": 464,
"preview": "\n## Tools for rop\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Exploit|["
},
{
"path": "categorize/tags/s3.md",
"chars": 1607,
"preview": "\n## Tools for s3\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|[A"
},
{
"path": "categorize/tags/sast.md",
"chars": 577,
"preview": "\n## Tools for sast\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|"
},
{
"path": "categorize/tags/sbom.md",
"chars": 657,
"preview": "\n## Tools for sbom\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|"
},
{
"path": "categorize/tags/secret-scanning.md",
"chars": 588,
"preview": "\n## Tools for secret-scanning\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/security.md",
"chars": 660,
"preview": "\n## Tools for security\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scan"
},
{
"path": "categorize/tags/smuggle.md",
"chars": 3101,
"preview": "\n## Tools for smuggle\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzze"
},
{
"path": "categorize/tags/social-engineering.md",
"chars": 825,
"preview": "\n## Tools for social-engineering\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | -"
},
{
"path": "categorize/tags/sqli.md",
"chars": 3722,
"preview": "\n## Tools for sqli\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|"
},
{
"path": "categorize/tags/ssl.md",
"chars": 1597,
"preview": "\n## Tools for ssl\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[tl"
},
{
"path": "categorize/tags/ssrf.md",
"chars": 2655,
"preview": "\n## Tools for ssrf\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer|["
},
{
"path": "categorize/tags/ssti.md",
"chars": 476,
"preview": "\n## Tools for ssti\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Fuzzer|["
},
{
"path": "categorize/tags/steganography.md",
"chars": 820,
"preview": "\n## Tools for steganography\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n"
},
{
"path": "categorize/tags/subdomains.md",
"chars": 10950,
"preview": "\n## Tools for subdomains\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Re"
},
{
"path": "categorize/tags/takeover.md",
"chars": 1682,
"preview": "\n## Tools for takeover\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Reco"
},
{
"path": "categorize/tags/terraform.md",
"chars": 661,
"preview": "\n## Tools for terraform\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Sca"
},
{
"path": "categorize/tags/tls.md",
"chars": 563,
"preview": "\n## Tools for tls\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[tl"
},
{
"path": "categorize/tags/tools-management.md",
"chars": 548,
"preview": "\n## Tools for tools-management\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | ---"
},
{
"path": "categorize/tags/url.md",
"chars": 8871,
"preview": "\n## Tools for url\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Recon|[ap"
},
{
"path": "categorize/tags/vulnerability-scanner.md",
"chars": 2196,
"preview": "\n## Tools for vulnerability-scanner\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- "
},
{
"path": "categorize/tags/web-scanner.md",
"chars": 1142,
"preview": "\n## Tools for web-scanner\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|S"
},
{
"path": "categorize/tags/web3.md",
"chars": 474,
"preview": "\n## Tools for web3\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils|[W"
},
{
"path": "categorize/tags/wordlist.md",
"chars": 1943,
"preview": "\n## Tools for wordlist\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Reco"
},
{
"path": "categorize/tags/xss.md",
"chars": 12461,
"preview": "\n## Tools for xss\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Scanner|["
},
{
"path": "categorize/tags/xxe.md",
"chars": 1662,
"preview": "\n## Tools for xxe\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Exploit|["
},
{
"path": "categorize/tags/zipbomb.md",
"chars": 869,
"preview": "\n## Tools for zipbomb\n\n| Type | Name | Description | Star | Tags | Badges |\n| --- | --- | --- | --- | --- | --- |\n|Utils"
},
{
"path": "scripts/erb.rb",
"chars": 7570,
"preview": "require 'erb'\nrequire 'yaml'\n\ndef generate_badge array\n badge = \"\"\n array.each { |t|\n case t\n when '"
},
{
"path": "scripts/for_migration/apply_platform.rb",
"chars": 365,
"preview": "require 'yaml'\n\nDir.entries(\"./weapons\").each do | name |\n if name.strip != \".\" || name != \"..\"\n begin\n "
},
{
"path": "scripts/for_migration/fetch_lang.rb",
"chars": 933,
"preview": "# https://api.github.com/repos/hahwul/dalfox/languages\n#\n#\nrequire 'yaml'\n\nlangs = []\nDir.entries(\"./weapons\").each do |"
},
{
"path": "scripts/for_migration/migration.rb",
"chars": 2276,
"preview": "require 'json'\nrequire 'yaml'\nrequire \"uri\"\n\ndef get_os install\n lst = []\n if install['Linux'].length > 1\n "
},
{
"path": "scripts/last_change",
"chars": 29,
"preview": "Fri Mar 20 11:27:24 UTC 2026\n"
},
{
"path": "scripts/validate_weapons.rb",
"chars": 654,
"preview": "require 'yaml'\n\nDir.entries(\"./weapons\").each do | name |\n if name.strip != \".\" || name != \"..\"\n begin\n "
},
{
"path": "weapons/230-OOB.yaml",
"chars": 217,
"preview": "---\nname: 230-OOB\ndescription: An Out-of-Band XXE server for retrieving file contents over FTP.\nurl: https://github.com/"
},
{
"path": "weapons/3klCon.yaml",
"chars": 298,
"preview": "---\nname: 3klCon\ndescription: Automation Recon tool which works with Large & Medium scopes. It performs\n more than 20 t"
},
{
"path": "weapons/AWSBucketDump.yaml",
"chars": 232,
"preview": "---\nname: AWSBucketDump\ndescription: Security Tool to Look For Interesting Files in S3 Buckets\nurl: https://github.com/j"
},
{
"path": "weapons/AWSSigner.yaml",
"chars": 203,
"preview": "---\nname: AWSSigner\ndescription: Burp Extension for AWS Signing\nurl: https://github.com/NetSPI/AWSSigner\ncategory: tool-"
},
{
"path": "weapons/Amass.yaml",
"chars": 209,
"preview": "---\nname: Amass\ndescription: 'In-depth Attack Surface Mapping and Asset Discovery '\nurl: https://github.com/OWASP/Amass\n"
},
{
"path": "weapons/Arjun.yaml",
"chars": 189,
"preview": "---\nname: Arjun\ndescription: 'HTTP parameter discovery suite. '\nurl: https://github.com/s0md3v/Arjun\ncategory: tool\ntype"
},
{
"path": "weapons/Assetnote_Wordlists.yaml",
"chars": 237,
"preview": "---\nname: Assetnote Wordlists\ndescription: Automated & Manual Wordlists provided by Assetnote\nurl: https://github.com/as"
},
{
"path": "weapons/Atlas.yaml",
"chars": 186,
"preview": "---\nname: Atlas\ndescription: 'Quick SQLMap Tamper Suggester '\nurl: https://github.com/m4ll0k/Atlas\ncategory: tool\ntype: "
},
{
"path": "weapons/AuthMatrix.yaml",
"chars": 193,
"preview": "---\nname: AuthMatrix\ndescription:\nurl: https://github.com/SecurityInnovation/AuthMatrix\ncategory: tool-addon\ntype: Scann"
},
{
"path": "weapons/AutoRepeater.yaml",
"chars": 235,
"preview": "---\nname: AuthMatrix\ndescription: Automated HTTP Request Repeating With Burp Suite\nurl: https://github.com/SecurityInnov"
},
{
"path": "weapons/Autorize.yaml",
"chars": 178,
"preview": "---\nname: Autorize\ndescription:\nurl: https://github.com/Quitten/Autorize\ncategory: tool-addon\ntype: Scanner\nplatform: [l"
},
{
"path": "weapons/BLUTO.yaml",
"chars": 174,
"preview": "---\nname: BLUTO\ndescription: DNS Analysis Tool\nurl: https://github.com/darryllane/Bluto\ncategory: tool\ntype: Recon\nplatf"
},
{
"path": "weapons/BaRMIe.yaml",
"chars": 195,
"preview": "---\nname: BaRMIe\ndescription: Java RMI enumeration and attack tool.\nurl: https://github.com/NickstaDB/BaRMIe\ncategory: t"
},
{
"path": "weapons/BatchQL.yaml",
"chars": 262,
"preview": "---\nname: BatchQL\ndescription: GraphQL security auditing script with a focus on performing batch GraphQL\n queries and m"
},
{
"path": "weapons/Berserko.yaml",
"chars": 228,
"preview": "---\nname: Berserko\ndescription: Burp Suite extension to perform Kerberos authentication\nurl: https://github.com/nccgroup"
},
{
"path": "weapons/Blacklist3r.yaml",
"chars": 185,
"preview": "---\nname: Blacklist3r\ndescription: 'project-blacklist3r '\nurl: https://github.com/NotSoSecure/Blacklist3r\ncategory: tool"
},
{
"path": "weapons/BruteX.yaml",
"chars": 208,
"preview": "---\nname: BruteX\ndescription: Automatically brute force all services running on a target.\nurl: https://github.com/1N3/Br"
},
{
"path": "weapons/Bug-Bounty-Toolz.yaml",
"chars": 197,
"preview": "---\nname: Bug-Bounty-Toolz\ndescription: 'BBT - Bug Bounty Tools '\nurl: https://github.com/m4ll0k/Bug-Bounty-Toolz\ncatego"
},
{
"path": "weapons/BugBountyScanner.yaml",
"chars": 237,
"preview": "---\nname: BugBountyScanner\ndescription: A Bash script and Docker image for Bug Bounty reconnaissance.\nurl: https://githu"
},
{
"path": "weapons/BurpBounty.yaml",
"chars": 180,
"preview": "---\nname: BurpBounty\ndescription:\nurl: https://github.com/wagiro/BurpBounty\ncategory: tool-addon\ntype: Utils\nplatform: ["
},
{
"path": "weapons/BurpCustomizer.yaml",
"chars": 225,
"preview": "---\nname: BurpCustomizer\ndescription: Because just a dark theme wasn't enough!\nurl: https://github.com/CoreyD97/BurpCust"
},
{
"path": "weapons/BurpJSLinkFinder.yaml",
"chars": 201,
"preview": "---\nname: BurpJSLinkFinder\ndescription:\nurl: https://github.com/InitRoot/BurpJSLinkFinder\ncategory: tool-addon\ntype: Rec"
},
{
"path": "weapons/BurpSuite-Secret_Finder.yaml",
"chars": 195,
"preview": "---\nname: BurpSuite-Secret_Finder\ndescription:\nurl: https://github.com/m4ll0k/BurpSuite-Secret_Finder\ncategory: tool-add"
},
{
"path": "weapons/BurpSuite.yaml",
"chars": 214,
"preview": "---\nname: BurpSuite\ndescription: The BurpSuite Project\nurl: https://portswigger.net/burp\ncategory: tool\ntype: Army-Knife"
},
{
"path": "weapons/BurpSuiteHTTPSmuggler.yaml",
"chars": 207,
"preview": "---\nname: BurpSuiteHTTPSmuggler\ndescription:\nurl: https://github.com/nccgroup/BurpSuiteHTTPSmuggler\ncategory: tool-addon"
},
{
"path": "weapons/BurpSuiteLoggerPlusPlus.yaml",
"chars": 202,
"preview": "---\nname: BurpSuiteLoggerPlusPlus\ndescription:\nurl: https://github.com/nccgroup/BurpSuiteLoggerPlusPlus\ncategory: tool-a"
},
{
"path": "weapons/CMSmap.yaml",
"chars": 312,
"preview": "---\nname: CMSmap\ndescription: CMSmap is a python open source CMS scanner that automates the process of detecting securit"
},
{
"path": "weapons/CSP_Evaluator.yaml",
"chars": 191,
"preview": "---\nname: CSP Evaluator\ndescription: Online CSP Evaluator from google\nurl: https://csp-evaluator.withgoogle.com\ncategory"
},
{
"path": "weapons/CT_subdomains.yaml",
"chars": 261,
"preview": "---\nname: CT_subdomains\ndescription: 'An hourly updated list of subdomains gathered from certificate transparency\n logs"
},
{
"path": "weapons/CaidoReflector.yaml",
"chars": 256,
"preview": "---\nname: CaidoReflector\ndescription: Automatically look for paramater reflections in the HTTP response\nurl: https://git"
},
{
"path": "weapons/Chaos_Web.yaml",
"chars": 280,
"preview": "---\nname: Chaos Web\ndescription: \" actively scan and maintain internet-wide assets' data. enhance research\\\n \\ and anal"
},
{
"path": "weapons/Chromium-based-XSS-Taint-Tracking.yaml",
"chars": 347,
"preview": "---\nname: Chromium-based-XSS-Taint-Tracking\ndescription: Cyclops is a web browser with XSS detection feature, it is chro"
},
{
"path": "weapons/Clipboard.yaml",
"chars": 229,
"preview": "---\nname: Clipboard\ndescription: An external brain that remembers anything, anytime, anywhere.\nurl: https://github.com/S"
},
{
"path": "weapons/ConfusedDotnet.yaml",
"chars": 269,
"preview": "---\nname: ConfusedDotnet\ndescription: Tool to check for dependency confusion vulnerabilities in NuGet package management"
},
{
"path": "weapons/CorsMe.yaml",
"chars": 216,
"preview": "---\nname: CorsMe\ndescription: 'Cross Origin Resource Sharing MisConfiguration Scanner '\nurl: https://github.com/Shivangx"
},
{
"path": "weapons/Corsy.yaml",
"chars": 188,
"preview": "---\nname: Corsy\ndescription: 'CORS Misconfiguration Scanner '\nurl: https://github.com/s0md3v/Corsy\ncategory: tool\ntype: "
},
{
"path": "weapons/CrackQL.yaml",
"chars": 231,
"preview": "---\nname: CrackQL\ndescription: CrackQL is a GraphQL password brute-force and fuzzing utility.\nurl: https://github.com/ni"
},
{
"path": "weapons/CyberChef.yaml",
"chars": 259,
"preview": "---\nname: CyberChef\ndescription: 'The Cyber Swiss Army Knife - a web app for encryption, encoding, compression\n and dat"
},
{
"path": "weapons/DNSDumpster.yaml",
"chars": 209,
"preview": "---\nname: DNSDumpster\ndescription: ' Online dns recon & research, find & lookup dns records'\nurl: https://dnsdumpster.co"
},
{
"path": "weapons/DOMPurify.yaml",
"chars": 354,
"preview": "---\nname: DOMPurify\ndescription: 'DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for\n HTML, MathML and"
},
{
"path": "weapons/DSSS.yaml",
"chars": 179,
"preview": "---\nname: DSSS\ndescription: Damn Small SQLi Scanner\nurl: https://github.com/stamparm/DSSS\ncategory: tool\ntype: Scanner\np"
},
{
"path": "weapons/Dark_Reader.yaml",
"chars": 224,
"preview": "---\nname: Dark Reader\ndescription: Dark mode to any site\nurl: https://github.com/darkreader/darkreader\ncategory: browser"
},
{
"path": "weapons/Dark_Reader_for_Safari.yaml",
"chars": 232,
"preview": "---\nname: Dark Reader for Safari\ndescription: Dark mode to any site\nurl: https://apps.apple.com/us/app/dark-reader-for-s"
},
{
"path": "weapons/Decoder-Improved.yaml",
"chars": 220,
"preview": "---\nname: Decoder-Improved\ndescription: Improved decoder for Burp Suite\nurl: https://github.com/nccgroup/Decoder-Improve"
},
{
"path": "weapons/DeepViolet.yaml",
"chars": 206,
"preview": "---\nname: DeepViolet\ndescription: Tool for introspection of SSL\\TLS sessions\nurl: https://github.com/spoofzu/DeepViolet\n"
},
{
"path": "weapons/DirDar.yaml",
"chars": 255,
"preview": "---\nname: DirDar\ndescription: DirDar is a tool that searches for (403-Forbidden) directories to break\n it and get dir l"
},
{
"path": "weapons/DotGit.yaml",
"chars": 248,
"preview": "---\nname: DotGit\ndescription: An extension for checking if .git is exposed in visited websites\nurl: https://github.com/d"
},
{
"path": "weapons/Dr. Watson.yaml",
"chars": 328,
"preview": "---\nname: Dr. Watson\ndescription: Dr. Watson is a simple Burp Suite extension that helps find assets, keys,\n subdomains"
},
{
"path": "weapons/EchoMirage.yaml",
"chars": 253,
"preview": "---\nname: Echo Mirage\ndescription: A generic network proxy that uses DLL injection to capture and alter\n TCP traffic.\nu"
},
{
"path": "weapons/Edit-This-Cookie.yaml",
"chars": 289,
"preview": "---\nname: Edit-This-Cookie\ndescription: EditThisCookie is the famous Google Chrome/Chromium extension for editing\n cook"
},
{
"path": "weapons/Emissary.yaml",
"chars": 244,
"preview": "---\nname: Emissary\ndescription: Send notifications on different channels such as Slack, Telegram, Discord\n etc.\nurl: ht"
},
{
"path": "weapons/EvenBetter.yaml",
"chars": 285,
"preview": "---\nname: EvenBetter\ndescription: EvenBetter is a frontend Caido plugin that makes the Caido experience\n even better\nur"
},
{
"path": "weapons/EvenBetterExtensions.yaml",
"chars": 306,
"preview": "---\nname: EvenBetterExtensions\ndescription: EvenBetterExtensions allows you to quicky install and keep updated Caido ext"
},
{
"path": "weapons/FavFreak.yaml",
"chars": 210,
"preview": "---\nname: FavFreak\ndescription: 'Making Favicon.ico based Recon Great again ! '\nurl: https://github.com/devanshbatham/Fa"
},
{
"path": "weapons/Findsploit.yaml",
"chars": 216,
"preview": "---\nname: Findsploit\ndescription: Find exploits in local and online databases instantly\nurl: https://github.com/1N3/Find"
},
{
"path": "weapons/Firefox Multi-Account Containers.yaml",
"chars": 325,
"preview": "---\nname: Firefox Multi-Account Containers\ndescription: Firefox Multi-Account Containers lets you keep parts of your onl"
},
{
"path": "weapons/FockCache.yaml",
"chars": 200,
"preview": "---\nname: FockCache\ndescription: Minimalized Test Cache Poisoning\nurl: https://github.com/tismayil/fockcache\ncategory: t"
},
{
"path": "weapons/GAP.yaml",
"chars": 395,
"preview": "---\nname: GAP\ndescription: This is an evolution of the original getAllParams extension for Burp.\n Not only does it find"
},
{
"path": "weapons/GQLSpection.yaml",
"chars": 237,
"preview": "---\nname: GQLSpection\ndescription: parses GraphQL introspection schema and generates possible queries\nurl: https://githu"
}
]
// ... and 370 more files (download for full content)
About this extraction
This page contains the full source code of the hahwul/WebHackersWeapons GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 570 files (604.6 KB), approximately 194.1k tokens, and a symbol index with 7 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.