Repository: hahwul/WebHackersWeapons Branch: main Commit: c1dd28659b29 Files: 570 Total size: 604.6 KB Directory structure: gitextract_zmpygua0/ ├── .github/ │ ├── FUNDING.yml │ ├── labeler.yml │ └── workflows/ │ ├── cd.yml │ ├── labeler.yml │ └── yaml-lint.yml ├── .gitignore ├── .yamllint.yml ├── AGENTS.md ├── CODE_OF_CONDUCT.md ├── CONTRIBUTING.md ├── LICENSE ├── README.md ├── SECURITY.md ├── categorize/ │ ├── langs/ │ │ ├── BlitzBasic.md │ │ ├── C#.md │ │ ├── C++.md │ │ ├── C.md │ │ ├── CSS.md │ │ ├── Crystal.md │ │ ├── Go.md │ │ ├── HTML.md │ │ ├── Java.md │ │ ├── JavaScript.md │ │ ├── Kotlin.md │ │ ├── PHP.md │ │ ├── Perl.md │ │ ├── Python.md │ │ ├── Ruby.md │ │ ├── Rust.md │ │ ├── Shell.md │ │ ├── Txt.md │ │ └── TypeScript.md │ └── tags/ │ ├── 403.md │ ├── RMI.md │ ├── aaa.md │ ├── apk.md │ ├── asn.md │ ├── asset-discovery.md │ ├── attack-surface.md │ ├── authentication.md │ ├── aws.md │ ├── blind-xss.md │ ├── broken-link.md │ ├── browser-record.md │ ├── cache-vuln.md │ ├── certificates.md │ ├── cidr.md │ ├── clipboard.md │ ├── cloud.md │ ├── code-analysis.md │ ├── container-security.md │ ├── cookie.md │ ├── cors.md │ ├── crawl.md │ ├── credentials.md │ ├── crlf.md │ ├── csp.md │ ├── darkmode.md │ ├── dependency-confusion.md │ ├── dependency-scanning.md │ ├── deserialize.md │ ├── diff.md │ ├── dns.md │ ├── documents.md │ ├── dom.md │ ├── domain.md │ ├── encode.md │ ├── endpoint.md │ ├── exploit.md │ ├── favicon.md │ ├── forensics.md │ ├── fuzz.md │ ├── gRPC-Web.md │ ├── graphql.md │ ├── header.md │ ├── http.md │ ├── infra.md │ ├── ip-manipulation.md │ ├── js-analysis.md │ ├── json.md │ ├── jwt.md │ ├── lfi.md │ ├── live-audit.md │ ├── mitmproxy.md │ ├── network-mapping.md │ ├── network.md │ ├── nosqli.md │ ├── note.md │ ├── notify.md │ ├── nuclei-templates.md │ ├── oast.md │ ├── online.md │ ├── open-redirect.md │ ├── osint.md │ ├── package-manager.md │ ├── param.md │ ├── path-traversal.md │ ├── payload.md │ ├── pentest.md │ ├── permutation.md │ ├── port.md │ ├── portscan.md │ ├── prototype-pollution.md │ ├── prototypepollution.md │ ├── race-condition.md │ ├── recon.md │ ├── repeater.md │ ├── report.md │ ├── rfi.md │ ├── rop.md │ ├── s3.md │ ├── sast.md │ ├── sbom.md │ ├── secret-scanning.md │ ├── security.md │ ├── smuggle.md │ ├── social-engineering.md │ ├── sqli.md │ ├── ssl.md │ ├── ssrf.md │ ├── ssti.md │ ├── steganography.md │ ├── subdomains.md │ ├── takeover.md │ ├── terraform.md │ ├── tls.md │ ├── tools-management.md │ ├── url.md │ ├── vulnerability-scanner.md │ ├── web-scanner.md │ ├── web3.md │ ├── wordlist.md │ ├── xss.md │ ├── xxe.md │ └── zipbomb.md ├── scripts/ │ ├── erb.rb │ ├── for_migration/ │ │ ├── apply_platform.rb │ │ ├── fetch_lang.rb │ │ └── migration.rb │ ├── last_change │ └── validate_weapons.rb └── weapons/ ├── 230-OOB.yaml ├── 3klCon.yaml ├── AWSBucketDump.yaml ├── AWSSigner.yaml ├── Amass.yaml ├── Arjun.yaml ├── Assetnote_Wordlists.yaml ├── Atlas.yaml ├── AuthMatrix.yaml ├── AutoRepeater.yaml ├── Autorize.yaml ├── BLUTO.yaml ├── BaRMIe.yaml ├── BatchQL.yaml ├── Berserko.yaml ├── Blacklist3r.yaml ├── BruteX.yaml ├── Bug-Bounty-Toolz.yaml ├── BugBountyScanner.yaml ├── BurpBounty.yaml ├── BurpCustomizer.yaml ├── BurpJSLinkFinder.yaml ├── BurpSuite-Secret_Finder.yaml ├── BurpSuite.yaml ├── BurpSuiteHTTPSmuggler.yaml ├── BurpSuiteLoggerPlusPlus.yaml ├── CMSmap.yaml ├── CSP_Evaluator.yaml ├── CT_subdomains.yaml ├── CaidoReflector.yaml ├── Chaos_Web.yaml ├── Chromium-based-XSS-Taint-Tracking.yaml ├── Clipboard.yaml ├── ConfusedDotnet.yaml ├── CorsMe.yaml ├── Corsy.yaml ├── CrackQL.yaml ├── CyberChef.yaml ├── DNSDumpster.yaml ├── DOMPurify.yaml ├── DSSS.yaml ├── Dark_Reader.yaml ├── Dark_Reader_for_Safari.yaml ├── Decoder-Improved.yaml ├── DeepViolet.yaml ├── DirDar.yaml ├── DotGit.yaml ├── Dr. Watson.yaml ├── EchoMirage.yaml ├── Edit-This-Cookie.yaml ├── Emissary.yaml ├── EvenBetter.yaml ├── EvenBetterExtensions.yaml ├── FavFreak.yaml ├── Findsploit.yaml ├── Firefox Multi-Account Containers.yaml ├── FockCache.yaml ├── GAP.yaml ├── GQLSpection.yaml ├── GadgetProbe.yaml ├── Gf-Patterns.yaml ├── GitMiner.yaml ├── Glorp.yaml ├── Glue.yaml ├── Gopherus.yaml ├── GraphQLmap.yaml ├── HRS.yaml ├── HTTPSignatures.yaml ├── HUNT.yaml ├── Hack-Tools.yaml ├── HostHunter.yaml ├── Hunt3r.yaml ├── HydraRecon.yaml ├── IntruderPayloads.yaml ├── JSFScan.sh.yaml ├── LFISuite.yaml ├── LOXS.yaml ├── Lepus.yaml ├── LinkFinder.yaml ├── MM3_ProxySwitch.yaml ├── NoSQLMap.yaml ├── NoXss.yaml ├── OneForAll.yaml ├── OpenRedireX.yaml ├── Oralyzer.yaml ├── Osmedeus.yaml ├── PPScan.yaml ├── ParamPamPam.yaml ├── ParamSpider.yaml ├── ParamWizard.yaml ├── Parth.yaml ├── PayloadsAllTheThings.yaml ├── Phoenix.yaml ├── Photon.yaml ├── PoC-in-GitHub.yaml ├── PwnFox.yaml ├── PwnXSS.yaml ├── REcollapse.yaml ├── Redcloud.yaml ├── RustScan.yaml ├── S3Scanner.yaml ├── S3cret Scanner.yaml ├── SQLNinja.yaml ├── SQLiDetector.yaml ├── SSRFire.yaml ├── SSRFmap.yaml ├── SSTImap.yaml ├── STEWS.yaml ├── SecLists.yaml ├── SecretFinder.yaml ├── SecurityTrails.yaml ├── SequenceDiagram.yaml ├── SerializationDumper.yaml ├── Shodan.yaml ├── Silver.yaml ├── Sn1per.yaml ├── Stepper.yaml ├── Striker.yaml ├── SubOver.yaml ├── Sublist3r.yaml ├── Taipan.yaml ├── TukTuk.yaml ├── User-Agent_Switcher.yaml ├── V3n0M-Scanner.yaml ├── VHostScan.yaml ├── Wayback_Machine.yaml ├── Web-Cache-Vulnerability-Scanner.yaml ├── Web3 Decoder.yaml ├── XSRFProbe.yaml ├── XSS-Catcher.yaml ├── XSStrike.yaml ├── XSpear.yaml ├── XXEinjector.yaml ├── XXExploiter.yaml ├── XssPy.yaml ├── ZipBomb.yaml ├── a2sv.yaml ├── altdns.yaml ├── alterx.yaml ├── anew.yaml ├── apkleaks.yaml ├── aquatone.yaml ├── arachni.yaml ├── argumentinjectionhammer.yaml ├── asnmap.yaml ├── assetfinder.yaml ├── attack-surface-detector-burp.yaml ├── attack-surface-detector-zap.yaml ├── autochrome.yaml ├── autopoisoner.yaml ├── axiom.yaml ├── bat.yaml ├── baudrillard-suite.yaml ├── bbot.yaml ├── beef.yaml ├── blackboxprotobuf.yaml ├── blistener.yaml ├── boast.yaml ├── bountyplz.yaml ├── bruteforce-lists.yaml ├── burl.yaml ├── burp-exporter.yaml ├── burp-piper.yaml ├── burp-retire-js.yaml ├── burp-send-to.yaml ├── c-jwt-cracker.yaml ├── caido.yaml ├── caidope.yaml ├── can-i-take-over-xyz.yaml ├── cariddi.yaml ├── cc.py.yaml ├── cent.yaml ├── cf-check.yaml ├── chaos-client.yaml ├── clairvoyance.yaml ├── clear-cache.yaml ├── cloud-audit.yaml ├── cloudlist.yaml ├── collaborator-everywhere.yaml ├── commix.yaml ├── community-scripts.yaml ├── confused.yaml ├── cookie-quick-manager.yaml ├── corsair_scan.yaml ├── crawlergo.yaml ├── crimson.yaml ├── crlfuzz.yaml ├── csp-auditor.yaml ├── csprecon.yaml ├── curl.yaml ├── dalfox.yaml ├── deadfinder.yaml ├── deadlinks.yaml ├── deadsniper.yaml ├── dependency-confusion-scanner.yaml ├── depenfusion.yaml ├── difftastic.yaml ├── dirsearch.yaml ├── ditto.yaml ├── dmut.yaml ├── dnsobserver.yaml ├── dnsprobe.yaml ├── dnsvalidator.yaml ├── dnsx.yaml ├── docem.yaml ├── domdig.yaml ├── domloggerpp.yaml ├── dontgo403.yaml ├── dotdotpwn.yaml ├── dsieve.yaml ├── eoyc.yaml ├── eval_villain.yaml ├── evil-proxy.yaml ├── ezXSS.yaml ├── favirecon.yaml ├── femida.yaml ├── feroxbuster.yaml ├── fff.yaml ├── ffuf.yaml ├── fhc.yaml ├── findom-xss.yaml ├── findomain.yaml ├── firefox-container-proxy.yaml ├── fuzzparam.yaml ├── fzf.yaml ├── gRPC-Pentest-Suite.yaml ├── gau.yaml ├── gauplus.yaml ├── gee.yaml ├── getJS.yaml ├── gf.yaml ├── ghauri.yaml ├── gitGraber.yaml ├── github-endpoints.yaml ├── github-regexp.yaml ├── github-search.yaml ├── github-subdomains.yaml ├── gitleaks.yaml ├── gitls.yaml ├── gitrob.yaml ├── go-dork.yaml ├── gobuster.yaml ├── godeclutter.yaml ├── gospider.yaml ├── gotator.yaml ├── gotestwaf.yaml ├── goverview.yaml ├── gowitness.yaml ├── graphql-voyager.yaml ├── graphw00f.yaml ├── grc.yaml ├── grex.yaml ├── gron.yaml ├── gxss.yaml ├── h2csmuggler.yaml ├── h2spacex.yaml ├── hacks.yaml ├── hakcheckurl.yaml ├── hakrawler.yaml ├── hakrevdns.yaml ├── haktrails.yaml ├── hashcat.yaml ├── hbxss.yaml ├── headerpwn.yaml ├── headi.yaml ├── hetty.yaml ├── hinject.yaml ├── hoppscotch.yaml ├── htcat.yaml ├── http-request-smuggler.yaml ├── http-request-smuggling.yaml ├── http-script-generator.yaml ├── http2smugl.yaml ├── httpie.yaml ├── httprobe.yaml ├── httptoolkit.yaml ├── httpx.yaml ├── hurl.yaml ├── inql.yaml ├── interactsh.yaml ├── intrigue-core.yaml ├── jaeles.yaml ├── jsfuck.yaml ├── jsluice.yaml ├── jsonwebtoken.github.io.yaml ├── jsprime.yaml ├── jwt-cracker.yaml ├── jwt-hack.yaml ├── jwt_tool.yaml ├── katana.yaml ├── kiterunner.yaml ├── knife.yaml ├── knock.yaml ├── lazyrecon.yaml ├── liffy.yaml ├── longtongue.yaml ├── mapcidr.yaml ├── masscan.yaml ├── medusa.yaml ├── meg.yaml ├── megplus.yaml ├── metasploit.yaml ├── missing-cve-nuclei-templates.yaml ├── mitmproxy.yaml ├── mubeng.yaml ├── naabu.yaml ├── neonmarker.yaml ├── nikto.yaml ├── nmap.yaml ├── noir.yaml ├── nosqli.yaml ├── notebook.yaml ├── nuclei-templates.yaml ├── nuclei-wordfence-cve.yaml ├── nuclei.yaml ├── ob_hacky_slack.yaml ├── of-CORS.yaml ├── osv-scanner.yaml ├── owasp-zap-jwt-addon.yaml ├── owasp-zap-maplocal-addon.yaml ├── oxml_xxe.yaml ├── pagodo.yaml ├── param-miner.yaml ├── parameth.yaml ├── pcap-burp.yaml ├── pdtm.yaml ├── pentest-env.yaml ├── pentest-tools.yaml ├── pet.yaml ├── plution.yaml ├── postMessage-tracker.yaml ├── ppfuzz.yaml ├── pphack.yaml ├── ppmap.yaml ├── proxify.yaml ├── puredns.yaml ├── pwncat.yaml ├── qsreplace.yaml ├── quickjack.yaml ├── race-the-web.yaml ├── rapidscan.yaml ├── recon_profile.yaml ├── reconftw.yaml ├── reflect.yaml ├── reflected-parameters.yaml ├── rengine.yaml ├── rep.yaml ├── reverse-shell-generator.yaml ├── ronin.yaml ├── ropr.yaml ├── rusolver.yaml ├── s3reverse.yaml ├── safecopy.yaml ├── scan4all.yaml ├── scilla.yaml ├── security-crawl-maze.yaml ├── security-research-pocs.yaml ├── semgrep.yaml ├── shosubgo.yaml ├── shuffledns.yaml ├── singularity.yaml ├── slackcat.yaml ├── smap.yaml ├── smugglefuzz.yaml ├── smuggler.yaml ├── smugglex.yaml ├── sn0int.yaml ├── spiderfoot.yaml ├── sqliv.yaml ├── sqlmap.yaml ├── ssrf-sheriff.yaml ├── sub404.yaml ├── subbrute.yaml ├── subfinder.yaml ├── subgen.yaml ├── subjack.yaml ├── subjs.yaml ├── subs_all.yaml ├── subzy.yaml ├── sudomy.yaml ├── taborator.yaml ├── template-generator.yaml ├── testssl.sh.yaml ├── thc-hydra.yaml ├── tiscripts.yaml ├── tlsx.yaml ├── toxssin.yaml ├── tplmap.yaml ├── trivy.yaml ├── trufflehog.yaml ├── turbo-intruder.yaml ├── uncover.yaml ├── unfurl.yaml ├── urlgrab.yaml ├── urlhunter.yaml ├── urlprobe.yaml ├── uro.yaml ├── urx.yaml ├── wapiti.yaml ├── waybackurls.yaml ├── waymore.yaml ├── weaponised-XSS-payloads.yaml ├── web_cache_poison.yaml ├── websocket-connection-smuggler.yaml ├── wfuzz.yaml ├── wprecon.yaml ├── wpscan.yaml ├── ws-smuggler.yaml ├── wssip.yaml ├── wuzz.yaml ├── x8.yaml ├── xless.yaml ├── xnLinkFinder.yaml ├── xsinator.com.yaml ├── xss-cheatsheet-data.yaml ├── xsscrapy.yaml ├── xsser.yaml ├── xssor2.yaml ├── xsssniper.yaml ├── xurlfind3r.yaml ├── xxeserv.yaml ├── ysoserial.net.yaml ├── ysoserial.yaml ├── zap-browser-extension.yaml ├── zap-cli.yaml ├── zap-hud.yaml ├── zaproxy.yaml ├── zdns.yaml └── zip-bomb.yaml ================================================ FILE CONTENTS ================================================ ================================================ FILE: .github/FUNDING.yml ================================================ github: hahwul ================================================ FILE: .github/labeler.yml ================================================ ⚔️ Weapons: - changed-files: - any-glob-to-any-file: - weapons/** ⚙️ Development: - changed-files: - any-glob-to-any-file: - scripts/** - .github/labeler.yml 🎨 Image: - changed-files: - any-glob-to-any-file: - images/** 🦺 Github Action: - changed-files: - any-glob-to-any-file: .github/workflows/** ================================================ FILE: .github/workflows/cd.yml ================================================ --- name: Continuous Deployment on: push: branches: [main] workflow_dispatch: jobs: Deploy: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 - name: Set up Ruby uses: ruby/setup-ruby@v1 with: ruby-version: 3.0 - name: Install dependencies run: gem install erb yaml - name: Run app run: | ruby ./scripts/erb.rb - name: Make last_change run: date > ./scripts/last_change - name: Commit files run: | git config --local user.email "hahwul@gmail.com" git config --local user.name "WHW" git add README.md ./scripts/last_change git add ./categorize/* git commit -m "Deploy README.md and Categorize Docs" - name: Push changes uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} branch: ${{ github.ref }} Contributors: needs: Deploy runs-on: ubuntu-latest steps: - uses: wow-actions/contributors-list@v1 with: GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} round: true svgPath: images/CONTRIBUTORS.svg ================================================ FILE: .github/workflows/labeler.yml ================================================ name: "Pull Request Labeler" on: [pull_request_target] jobs: labeler: permissions: contents: read pull-requests: write runs-on: ubuntu-latest steps: - uses: actions/labeler@v5 ================================================ FILE: .github/workflows/yaml-lint.yml ================================================ --- name: YAML Lint on: pull_request: branches: [main] jobs: lintAllTheThings: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - name: yaml-lint uses: ibiqlik/action-yamllint@v3 with: file_or_dir: weapons/*.yaml config_file: .yamllint.yml ================================================ FILE: .gitignore ================================================ .DS_Store ================================================ FILE: .yamllint.yml ================================================ --- rules: anchors: enable braces: enable brackets: enable colons: enable commas: enable comments: level: warning comments-indentation: level: warning document-end: disable document-start: level: warning empty-lines: enable empty-values: disable float-values: disable hyphens: enable indentation: enable key-duplicates: enable key-ordering: disable line-length: disable new-line-at-end-of-file: enable new-lines: enable octal-values: disable quoted-strings: disable trailing-spaces: enable truthy: level: warning ================================================ FILE: AGENTS.md ================================================ # WebHackersWeapons Repository WebHackersWeapons is a curated collection of web security tools and utilities. It contains 409+ security tools categorized by type (Army-knife, Proxy, Recon, Fuzzer, Scanner, Exploit, Utils, etc.), platform, language, and tags. Always reference these instructions first and fallback to search or bash commands only when you encounter unexpected information that does not match the info here. ## Working Effectively - **NEVER CANCEL**: All build operations complete in under 2 seconds. No timeouts needed. - Bootstrap and validate the repository: - Ruby 3.x with erb and yaml gems (pre-installed in GitHub Actions) - `ruby ./scripts/erb.rb` -- builds README.md and categorize/* files. Takes ~0.3 seconds. - `ruby ./scripts/validate_weapons.rb` -- validates weapon definitions. Takes ~0.1 seconds. - `yamllint weapons/*.yaml` -- validates YAML syntax. Takes ~1 second. - The build process is extremely fast - **ALL commands complete in under 2 seconds**. ## Repository Structure Key directories and files: - `weapons/*.yaml` -- Individual weapon definitions (409 files, 3800+ lines total) - `scripts/erb.rb` -- Main build script that generates all documentation - `scripts/validate_weapons.rb` -- Validation script for weapon definitions - `README.md` -- Auto-generated main documentation (DO NOT edit manually) - `categorize/langs/*.md` -- Auto-generated language-specific lists (19 languages) - `categorize/tags/*.md` -- Auto-generated tag-specific lists (73 tags) - `.github/workflows/` -- CI/CD automation - `.yamllint.yml` -- YAML linting configuration ## Build Process **CRITICAL**: The `README.md` and `categorize/*` files are AUTO-GENERATED. Never edit them manually. Build and validate workflow: 1. `ruby ./scripts/erb.rb` -- Generates README.md and all categorize/* files 2. `ruby ./scripts/validate_weapons.rb` -- Shows validation warnings for incomplete entries 3. `yamllint weapons/*.yaml` -- Validates YAML syntax and formatting All operations complete in under 2 seconds total. ## Adding New Weapons Create a new file in `weapons/.yaml` with this exact format: ```yaml --- name: Tool Name description: Tool description url: https://github.com/owner/repo # Tool URL category: tool # tool | tool-addon | browser-addon | bookmarklet type: Scanner # Army-knife | Proxy | Recon | Fuzzer | Scanner | Exploit | Env | Utils | Etc platform: [linux, macos, windows] # linux | macos | windows | firefox | safari | chrome | zap | burpsuite lang: Python # Language: Go | Python | Ruby | JavaScript | etc. tags: [xss, sqli] # Vulnerability/feature tags ``` **CRITICAL YAML Requirements**: - File MUST end with a newline character (yamllint requirement) - Use exact platform values: `linux`, `macos`, `windows`, `firefox`, `safari`, `chrome`, `zap`, `burpsuite` - Use exact type values from the list above - Use exact category values from the list above ## Validation Workflow **ALWAYS run these steps after making changes:** 1. **YAML Validation**: `yamllint weapons/*.yaml` 2. **Build Validation**: `ruby ./scripts/erb.rb` 3. **Content Validation**: `ruby ./scripts/validate_weapons.rb` 4. **Manual Check**: Verify your tool appears in the generated README.md ## CI/CD Process - **Pull Requests**: Automatically run YAML linting via `.github/workflows/yaml-lint.yml` - **Main Branch**: Automatically regenerates README.md and categorize/* files via `.github/workflows/cd.yml` - The CI uses Ruby 3.0 and installs `erb` and `yaml` gems ## Common Validation Issues - **"no new line character at the end of file"**: Add a blank line at the end of YAML files - **"none-lang" warnings**: Add appropriate `lang:` field for GitHub-hosted tools - **"undefined method length"**: Ensure `tags:` field exists and is an array - **"Is a directory" errors**: Normal warnings from validation script reading directory entries ## Error Examples ```bash # Missing newline error: ::error file=weapons/tool.yaml,line=9,col=13::9:13 [new-line-at-end-of-file] no new line character at the end of file # Fix by adding blank line at end of file: echo "" >> weapons/tool.yaml ``` ## Manual Validation Scenarios After adding a new weapon, verify: 1. **YAML Syntax**: `yamllint weapons/yourfile.yaml` returns no errors 2. **Build Success**: `ruby ./scripts/erb.rb` completes without errors 3. **README Generation**: Your tool appears in the main README.md table 4. **Tag Creation**: If using new tags, verify `categorize/tags/newtag.md` is created 5. **Language Categorization**: Verify tool appears in `categorize/langs/Language.md` ## Timing Expectations - YAML linting: ~1 second for all 409 files - Build script: ~0.3 seconds to generate all documentation - Validation script: ~0.1 seconds to check all weapons - **Total validation time: ~1.5 seconds** ## Development Notes - The repository contains 409+ weapon definitions - 73 different tags for categorization - 19 programming languages represented - All documentation is auto-generated from YAML source files - Images are stored in `/images/` directory for badges and logos ## Troubleshooting Workflows ### Complete Weapon Addition Workflow ```bash # 1. Create weapon file cat > weapons/newtool.yaml << EOF --- name: New Tool description: Description of the tool url: https://github.com/owner/repo category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] EOF # 2. Validate YAML syntax yamllint weapons/newtool.yaml # 3. Build documentation ruby ./scripts/erb.rb # 4. Verify tool appears in README grep "New Tool" README.md # 5. Check validation warnings ruby ./scripts/validate_weapons.rb ``` ### CI/CD Validation Process The GitHub Actions workflows automatically: 1. **On PR**: Run `yamllint weapons/*.yaml` 2. **On merge to main**: Run `ruby ./scripts/erb.rb` and commit changes ## Git Workflow Best Practices - **Fork the repository** before making changes - **Create feature branches** for new weapons or modifications - **Test locally** before pushing: ```bash yamllint weapons/*.yaml ruby ./scripts/erb.rb git status # Check what files changed ``` - **Commit only** `weapons/*.yaml` changes in PRs - **Never commit** auto-generated `README.md` or `categorize/*` files in PRs ## Do NOT Modify **These files are auto-generated and will be overwritten:** - `README.md` - All files in `categorize/langs/` - All files in `categorize/tags/` **Only modify these directories:** - `weapons/` -- Add new weapon YAML files - `scripts/` -- Modify generation scripts (advanced users only) - `images/` -- Add new badges or logos ================================================ FILE: CODE_OF_CONDUCT.md ================================================ # Contributor Covenant Code of Conduct ## Our Pledge In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, sex characteristics, gender identity and expression, level of experience, education, socio-economic status, nationality, personal appearance, race, religion, or sexual identity and orientation. ## Our Standards Examples of behavior that contributes to creating a positive environment include: * Using welcoming and inclusive language * Being respectful of differing viewpoints and experiences * Gracefully accepting constructive criticism * Focusing on what is best for the community * Showing empathy towards other community members Examples of unacceptable behavior by participants include: * The use of sexualized language or imagery and unwelcome sexual attention or advances * Trolling, insulting/derogatory comments, and personal or political attacks * Public or private harassment * Publishing others' private information, such as a physical or electronic address, without explicit permission * Other conduct which could reasonably be considered inappropriate in a professional setting ## Our Responsibilities Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior. Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful. ## Scope This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers. ## Enforcement Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at hahwul@gmail.com. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately. Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership. ## Attribution This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html [homepage]: https://www.contributor-covenant.org For answers to common questions about this code of conduct, see https://www.contributor-covenant.org/faq ================================================ FILE: CONTRIBUTING.md ================================================ ## ⚠️ Important The paths below is automatically generated. - `README.md` - `categorize/*` Please contribute only the `./weapons` and `./scripts`, `./images` directories 😉 ## ❤️ Contribute ### First, Fork Repository Fork this repository :D ### Second, Write `./weapons/.yaml` and Commit/PR Write YAML Code. ```yaml --- name: App Name description: App Description url: App URL # https://github.com/hahwul/dalfox category: tool # tool / tool-addon / browser-addon / bookmarklet type: # Army-knife / Proxy / Recon / Fuzzer / Scanner / Exploit / Env / Utils / Etc platform: - linux # linux - macos # macos application - windows # windows application - firefox # firefox addon - safari # safari addon - chrome # chrome addon - zap # anything to do with zap (addons, scripts, etc..) - burpsuite # anything to do with burpsuite (extensions, payloads, etc..) # If supported crossplatform (OS), you write out all three (linux/macos/windows) # If supported zap and burpsuite addon, you write both (zap/burpsuite) lang: # go / python / ruby / rust / etc... tags: [] # xss / sqli / ssrf / oast / http / subdomains / etc... ``` *Sample* ```yaml --- name: HUNT description: Identifies common parameters vulnerable to certain vulnerability classes url: https://github.com/bugcrowd/HUNT category: tool-addon type: Recon platform: [linux, macos, windows, zap, burpsuite] lang: Kotlin tags: [param] ``` ![1415](https://user-images.githubusercontent.com/13212227/98445635-00db1e00-215c-11eb-8a59-d7d21dd98db0.png) ### Third, There's no third. ================================================ FILE: LICENSE ================================================ MIT License Copyright (c) 2025 하훌 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ================================================ FILE: README.md ================================================
WebHackersWeapons Logo

A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting!

## Family project [![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) [![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) ## Table of Contents - [Weapons](#weapons) - [Tools](#tools) - [Bookmarklets](#bookmarklets) - [Browser Addons](#browser-addons) - [Burpsuite, Caido and ZAP Addons](#burpsuite-caido-and-zap-addons) - [Contribute](CONTRIBUTING.md) - [Thanks to contributor](#thanks-to-contributor) ## Weapons *Attributes* | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`| | Tags | [`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md) [`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md) [`pentest`](/categorize/tags/pentest.md) [`exploit`](/categorize/tags/exploit.md) [`infra`](/categorize/tags/infra.md) [`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md) [`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md) [`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md) [`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md) [`csp`](/categorize/tags/csp.md) [`param`](/categorize/tags/param.md) [`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md) [`attack-surface`](/categorize/tags/attack-surface.md) [`port`](/categorize/tags/port.md) [`favicon`](/categorize/tags/favicon.md) [`js-analysis`](/categorize/tags/js-analysis.md) [`takeover`](/categorize/tags/takeover.md) [`portscan`](/categorize/tags/portscan.md) [`domain`](/categorize/tags/domain.md) [`online`](/categorize/tags/online.md) [`graphql`](/categorize/tags/graphql.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md) [`cache-vuln`](/categorize/tags/cache-vuln.md) [`path-traversal`](/categorize/tags/path-traversal.md) [`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md) [`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md) [`ssrf`](/categorize/tags/ssrf.md) [`jwt`](/categorize/tags/jwt.md) [`crlf`](/categorize/tags/crlf.md) [`header`](/categorize/tags/header.md) [`ssti`](/categorize/tags/ssti.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md) [`xss`](/categorize/tags/xss.md) [`s3`](/categorize/tags/s3.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md) [`broken-link`](/categorize/tags/broken-link.md) [`cors`](/categorize/tags/cors.md) [`sqli`](/categorize/tags/sqli.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md) [`open-redirect`](/categorize/tags/open-redirect.md) [`nosqli`](/categorize/tags/nosqli.md) [`oast`](/categorize/tags/oast.md) [`web-scanner`](/categorize/tags/web-scanner.md) [`aaa`](/categorize/tags/aaa.md) [`dependency-confusion`](/categorize/tags/dependency-confusion.md) [`403`](/categorize/tags/403.md) [`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md) [`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md) [`aws`](/categorize/tags/aws.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md) [`xxe`](/categorize/tags/xxe.md) [`RMI`](/categorize/tags/RMI.md) [`rop`](/categorize/tags/rop.md) [`authentication`](/categorize/tags/authentication.md) [`zipbomb`](/categorize/tags/zipbomb.md) [`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md) [`deserialize`](/categorize/tags/deserialize.md) [`web3`](/categorize/tags/web3.md) [`gRPC-Web`](/categorize/tags/gRPC-Web.md) [`notify`](/categorize/tags/notify.md) [`documents`](/categorize/tags/documents.md) [`cookie`](/categorize/tags/cookie.md) [`note`](/categorize/tags/note.md) [`blind-xss`](/categorize/tags/blind-xss.md) [`encode`](/categorize/tags/encode.md) [`payload`](/categorize/tags/payload.md) [`darkmode`](/categorize/tags/darkmode.md) [`nuclei-templates`](/categorize/tags/nuclei-templates.md) [`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md) [`dom`](/categorize/tags/dom.md) [`race-condition`](/categorize/tags/race-condition.md) [`diff`](/categorize/tags/diff.md) [`clipboard`](/categorize/tags/clipboard.md) [`json`](/categorize/tags/json.md) [`browser-record`](/categorize/tags/browser-record.md) [`report`](/categorize/tags/report.md) | | Langs | [`Java`](/categorize/langs/Java.md) [`Python`](/categorize/langs/Python.md) [`Ruby`](/categorize/langs/Ruby.md) [`Go`](/categorize/langs/Go.md) [`Shell`](/categorize/langs/Shell.md) [`JavaScript`](/categorize/langs/JavaScript.md) [`Rust`](/categorize/langs/Rust.md) [`Kotlin`](/categorize/langs/Kotlin.md) [`Crystal`](/categorize/langs/Crystal.md) [`C`](/categorize/langs/C.md) [`Perl`](/categorize/langs/Perl.md) [`C#`](/categorize/langs/C%23.md) [`TypeScript`](/categorize/langs/TypeScript.md) [`Txt`](/categorize/langs/Txt.md) [`HTML`](/categorize/langs/HTML.md) [`BlitzBasic`](/categorize/langs/BlitzBasic.md) [`CSS`](/categorize/langs/CSS.md) [`C++`](/categorize/langs/C++.md) [`PHP`](/categorize/langs/PHP.md) | ### Tools | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework|![](https://img.shields.io/github/stars/rapid7/metasploit-framework?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|[`live-audit`](/categorize/tags/live-audit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Proxy|[Glorp](https://github.com/denandz/glorp)|A CLI-based HTTP intercept and replay proxy|![](https://img.shields.io/github/stars/denandz/glorp?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[Caido](https://caido.io)|A lightweight web security auditing toolkit||[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[mitmproxy](https://github.com/mitmproxy/mitmproxy)|An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.|![](https://img.shields.io/github/stars/mitmproxy/mitmproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.|![](https://img.shields.io/github/stars/bbtfr/evil-proxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Proxy|[Echo Mirage](https://sourceforge.net/projects/echomirage.oldbutgold.p/)|A generic network proxy that uses DLL injection to capture and alter TCP traffic.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|![windows](/images/windows.png)| |Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |![](https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information|![](https://img.shields.io/github/stars/projectdiscovery/asnmap?label=%20)|[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|![](https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Chaos Web](https://chaos.projectdiscovery.io)| actively scan and maintain internet-wide assets' data. enhance research and analyse changes around DNS for better insights.|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers|![](https://img.shields.io/github/stars/projectdiscovery/cloudlist?label=%20)|[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |![](https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|![](https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[csprecon](https://github.com/edoardottt/csprecon)|Discover new target domains using Content Security Policy|![](https://img.shields.io/github/stars/edoardottt/csprecon?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |![](https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |![](https://img.shields.io/github/stars/tomnomnom/meg?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection|![](https://img.shields.io/github/stars/projectdiscovery/tlsx?label=%20)|[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |![](https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Sudomy](https://github.com/screetsec/Sudomy)|subdomain enumeration tool to collect subdomains and analyzing domains|![](https://img.shields.io/github/stars/screetsec/Sudomy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[ParamWizard](https://github.com/iamunixtz/ParamWizard)|ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website.|![](https://img.shields.io/github/stars/iamunixtz/ParamWizard?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|![](https://img.shields.io/github/stars/opsdisk/pagodo?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|![](https://img.shields.io/github/stars/six2dez/reconftw?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[waymore](https://github.com/xnl-h4ck3r/waymore)|Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!|![](https://img.shields.io/github/stars/xnl-h4ck3r/waymore?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |![](https://img.shields.io/github/stars/htcat/htcat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|![](https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[urx](https://github.com/hahwul/urx)|Extracts URLs from OSINT Archives for Security Insights|![](https://img.shields.io/github/stars/hahwul/urx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[bbot](https://github.com/blacklanternsecurity/bbot)|OSINT automation for hackers|![](https://img.shields.io/github/stars/blacklanternsecurity/bbot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[favirecon](https://github.com/edoardottt/favirecon)|Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.|![](https://img.shields.io/github/stars/edoardottt/favirecon?label=%20)|[`favicon`](/categorize/tags/favicon.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs |![](https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[shosubgo](https://github.com/incogbyte/shosubgo)|Small tool to Grab subdomains using Shodan api.|![](https://img.shields.io/github/stars/incogbyte/shosubgo?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis|![](https://img.shields.io/github/stars/noir-cr/noir?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| |Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices||[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|[`dns`](/categorize/tags/dns.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder)|A python tool used to discover endpoints (and potential parameters) for a given target|![](https://img.shields.io/github/stars/xnl-h4ck3r/xnLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[goverview](https://github.com/j3ssie/goverview)|goverview - Get an overview of the list of URLs|![](https://img.shields.io/github/stars/j3ssie/goverview?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[BLUTO](https://github.com/darryllane/Bluto)|DNS Analysis Tool|![](https://img.shields.io/github/stars/darryllane/Bluto?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[Sub404](https://github.com/r3curs1v3-pr0xy/sub404)|A python tool to check subdomain takeover vulnerability|![](https://img.shields.io/github/stars/r3curs1v3-pr0xy/sub404?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[xurlfind3r](https://github.com/hueristiq/xurlfind3r)|A command-line utility designed to discover URLs for a given domain in a simple, efficient way.|![](https://img.shields.io/github/stars/hueristiq/xurlfind3r?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|![](https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|![](https://img.shields.io/github/stars/hakluke/haktrails?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |![](https://img.shields.io/github/stars/EdOverflow/megplus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |![](https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[BugBountyScanner](https://github.com/chvancooten/BugBountyScanner)|A Bash script and Docker image for Bug Bounty reconnaissance.|![](https://img.shields.io/github/stars/chvancooten/BugBountyScanner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |![](https://img.shields.io/github/stars/michenriksen/gitrob?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|![](https://img.shields.io/github/stars/EasyRecon/Hunt3r?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|[`domain`](/categorize/tags/domain.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SubBrute](https://github.com/aboul3la/Sublist3r)|https://github.com/TheRook/subbrute|![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[HostHunter](https://github.com/SpiderLabs/HostHunter)|Recon tool for discovering hostnames using OSINT techniques.|![](https://img.shields.io/github/stars/SpiderLabs/HostHunter?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)|[`osint`](/categorize/tags/osint.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Lepus](https://github.com/gfek/Lepus)|Subdomain finder|![](https://img.shields.io/github/stars/gfek/Lepus?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[graphw00f](https://github.com/dolevf/graphw00f)|GraphQL Server Engine Fingerprinting utility|![](https://img.shields.io/github/stars/dolevf/graphw00f?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[jsluice](https://github.com/BishopFox/jsluice)|Extract URLs, paths, secrets, and other interesting bits from JavaScript|![](https://img.shields.io/github/stars/BishopFox/jsluice?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)|[`url`](/categorize/tags/url.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[katana](https://github.com/projectdiscovery/katana)|A next-generation crawling and spidering framework.|![](https://img.shields.io/github/stars/projectdiscovery/katana?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |![](https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Recon|[Smap](https://github.com/s0md3v/smap/)|a drop-in replacement for Nmap powered by shodan.io|![](https://img.shields.io/github/stars/s0md3v/smap/?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|![](https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL|![](https://img.shields.io/github/stars/projectdiscovery/alterx?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |![](https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Fuzzer|[ParamPamPam](https://github.com/Bo0oM/ParamPamPam)|This tool for brute discover GET and POST parameters.|![](https://img.shields.io/github/stars/Bo0oM/ParamPamPam?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |![](https://img.shields.io/github/stars/xmendez/wfuzz?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)|[`path-traversal`](/categorize/tags/path-traversal.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Fuzzer|[Clairvoyance](https://github.com/nikitastupin/clairvoyance)|Obtain GraphQL API schema even if the introspection is disabled|![](https://img.shields.io/github/stars/nikitastupin/clairvoyance?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[SmuggleFuzz](https://github.com/Moopinger/smugglefuzz/)|A rapid HTTP downgrade smuggling scanner written in Go.|![](https://img.shields.io/github/stars/Moopinger/smugglefuzz/?label=%20)|[`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[BatchQL](https://github.com/assetnote/batchql)|GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations|![](https://img.shields.io/github/stars/assetnote/batchql?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[SSRFire](https://github.com/ksharinarayanan/SSRFire)|An automated SSRF finder. Just give the domain name and your server and chill|![](https://img.shields.io/github/stars/ksharinarayanan/SSRFire?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|![](https://img.shields.io/github/stars/assetnote/kiterunner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |![](https://img.shields.io/github/stars/ffuf/ffuf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)|[`crlf`](/categorize/tags/crlf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |![](https://img.shields.io/github/stars/hashcat/hashcat/?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|![](https://img.shields.io/github/stars/1N3/BruteX?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |![](https://img.shields.io/github/stars/riza/medusa?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[headerpwn](https://github.com/devanshbatham/headerpwn)|A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers|![](https://img.shields.io/github/stars/devanshbatham/headerpwn?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[CrackQL](https://github.com/nicholasaleks/CrackQL)|CrackQL is a GraphQL password brute-force and fuzzing utility.|![](https://img.shields.io/github/stars/nicholasaleks/CrackQL?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|![](https://img.shields.io/github/stars/epi052/feroxbuster?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Fuzzer|[SSTImap](https://github.com/vladko312/SSTImap)|Automatic SSTI detection tool with interactive interface|![](https://img.shields.io/github/stars/vladko312/SSTImap?label=%20)|[`ssti`](/categorize/tags/ssti.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.|![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Oralyzer](https://github.com/r0075h3ll/Oralyzer)|Open Redirection Analyzer|![](https://img.shields.io/github/stars/r0075h3ll/Oralyzer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[osv-scanner](https://github.com/google/osv-scanner)|Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects|![](https://img.shields.io/github/stars/google/osv-scanner?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[PwnXSS](https://github.com/pwn0sec/PwnXSS)|Vulnerability (XSS) scanner exploit|![](https://img.shields.io/github/stars/pwn0sec/PwnXSS?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |![](https://img.shields.io/github/stars/Grunny/zap-cli?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |![](https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|![](https://img.shields.io/github/stars/aquasecurity/trivy?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Deadsniper](https://github.com/port19x/deadsniper)|A fast, specialized dead-link checker|![](https://img.shields.io/github/stars/port19x/deadsniper?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Scanner|[scan4all](https://github.com/hktalent/scan4all)|Official repository vuls Scan|![](https://img.shields.io/github/stars/hktalent/scan4all?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |![](https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[CMSmap](https://github.com/dionach/CMSmap)|CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.|![](https://img.shields.io/github/stars/dionach/CMSmap?label=%20)|[`web-scanner`](/categorize/tags/web-scanner.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[NoXss](https://github.com/lwzSoviet/)|Faster xss scanner,support reflected-xss and dom-xss|![](https://img.shields.io/github/stars/lwzSoviet/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[pphack](https://github.com/edoardottt/pphack)|The Most Advanced Client-Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/edoardottt/pphack?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[FockCache](https://github.com/tismayil/fockcache)|Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[depenfusion](https://github.com/benjamin-mauss/depenfusion)|A powerful pentesting tool for detecting and exploiting dependency confusion vulnerabilities in Node.js projects|![](https://img.shields.io/github/stars/benjamin-mauss/depenfusion?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsssniper](https://github.com/gbrindisi/xsssniper)|An automatic XSS discovery tool|![](https://img.shields.io/github/stars/gbrindisi/xsssniper?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[SQLiDetector](https://github.com/eslam3kl/SQLiDetector)|Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.|![](https://img.shields.io/github/stars/eslam3kl/SQLiDetector?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|![](https://img.shields.io/github/stars/blackcrw/wprecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[ConfusedDotnet](https://github.com/visma-prodsec/ConfusedDotnet)|Tool to check for dependency confusion vulnerabilities in NuGet package management systems|![](https://img.shields.io/github/stars/visma-prodsec/ConfusedDotnet?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|![](https://img.shields.io/github/stars/neex/http2smugl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[S3cret Scanner](https://github.com/Eilonh/s3crets_scanner)|Hunting For Secrets Uploaded To Public S3 Buckets|![](https://img.shields.io/github/stars/Eilonh/s3crets_scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |![](https://img.shields.io/github/stars/s0md3v/Striker?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.|![](https://img.shields.io/github/stars/Th0h0/autopoisoner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[trufflehog](https://github.com/trufflesecurity/trufflehog)|Find and verify credentials in git repositories, filesystems, and S3 buckets|![](https://img.shields.io/github/stars/trufflesecurity/trufflehog?label=%20)|[`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.|![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|![](https://img.shields.io/github/stars/epinna/tplmap?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |![](https://img.shields.io/github/stars/sullo/nikto?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)|![](https://img.shields.io/github/stars/hahwul/deadfinder?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[smugglex](https://github.com/hahwul/smugglex)|Rust-powered HTTP Request Smuggling Scanner|![](https://img.shields.io/github/stars/hahwul/smugglex?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[semgrep](https://github.com/semgrep/semgrep)|Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.|![](https://img.shields.io/github/stars/semgrep/semgrep?label=%20)|[`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |![](https://img.shields.io/github/stars/gwen001/github-search?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |![](https://img.shields.io/github/stars/codingo/VHostScan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[dependency-confusion-scanner](https://github.com/Yaniv-git/dependency-confusion-scanner)|This small repo is meant to scan Github's repositories for potential Dependency confusion vulnerabilities.|![](https://img.shields.io/github/stars/Yaniv-git/dependency-confusion-scanner?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XssPy](https://github.com/faizann24/)|Web Application XSS Scanner|![](https://img.shields.io/github/stars/faizann24/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Taipan](https://github.com/enkomio/Taipan)|Web application vulnerability scanner|![](https://img.shields.io/github/stars/enkomio/Taipan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[wapiti](https://github.com/wapiti-scanner/wapiti)|Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications.|![](https://img.shields.io/github/stars/wapiti-scanner/wapiti?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`web-scanner`](/categorize/tags/web-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[deadlinks](https://github.com/butuzov/deadlinks)|Health checks for your documentation links.|![](https://img.shields.io/github/stars/butuzov/deadlinks?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[ghauri](https://github.com/r0oth3x49/ghauri)|An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws|![](https://img.shields.io/github/stars/r0oth3x49/ghauri?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.|![](https://img.shields.io/github/stars/t3l3machus/toxssin?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[BaRMIe](https://github.com/NickstaDB/BaRMIe)|Java RMI enumeration and attack tool.|![](https://img.shields.io/github/stars/NickstaDB/BaRMIe?label=%20)|[`RMI`](/categorize/tags/RMI.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Exploit|[of-CORS](https://github.com/trufflesecurity/of-CORS)|Identifying and exploiting CORS misconfigurations on the internal networks|![](https://img.shields.io/github/stars/trufflesecurity/of-CORS?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities|![](https://img.shields.io/github/stars/luisfontes19/xxexploiter?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project|![](https://img.shields.io/github/stars/beefproject/beef?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[ropr](https://github.com/Ben-Lichtman/ropr)|A blazing fast™ multithreaded ROP Gadget finder. ropper|![](https://img.shields.io/github/stars/Ben-Lichtman/ropr?label=%20)|[`rop`](/categorize/tags/rop.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Exploit|[Liffy](https://github.com/mzfr/liffy)|Local file inclusion exploitation tool|![](https://img.shields.io/github/stars/mzfr/liffy?label=%20)|[`lfi`](/categorize/tags/lfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[jwt_tool](https://github.com/ticarpi/jwt_tool)|A toolkit for testing, tweaking and cracking JSON Web Tokens|![](https://img.shields.io/github/stars/ticarpi/jwt_tool?label=%20)|[`jwt`](/categorize/tags/jwt.md) [`authentication`](/categorize/tags/authentication.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)|Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities.||[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Utils|[zip-bomb](https://github.com/damianrusinek/zip-bomb)|Create a ZIPBomb for a given uncompressed size (flat and nested modes).|![](https://img.shields.io/github/stars/damianrusinek/zip-bomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges|![](https://img.shields.io/github/stars/projectdiscovery/mapcidr?label=%20)|[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[GadgetProbe](https://github.com/BishopFox/GadgetProbe)|Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.|![](https://img.shields.io/github/stars/BishopFox/GadgetProbe?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[dsieve](https://github.com/trickest/dsieve)|Filter and enrich a list of subdomains by level|![](https://img.shields.io/github/stars/trickest/dsieve?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|![](https://img.shields.io/github/stars/samyk/quickjack?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |![](https://img.shields.io/github/stars/gchq/CyberChef?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |![](https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)|Some files for bruteforcing certain things.|![](https://img.shields.io/github/stars/random-robbie/bruteforce-lists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[mubeng](https://github.com/kitabisa/mubeng)|An incredibly fast proxy checker & IP rotator with ease.|![](https://img.shields.io/github/stars/kitabisa/mubeng?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![HTML](/images/html.png)](/categorize/langs/HTML.md)| |Utils|[fff](https://github.com/tomnomnom/fff)|The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.|![](https://img.shields.io/github/stars/tomnomnom/fff?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|![](https://img.shields.io/github/stars/pemistahl/grex?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![BlitzBasic](/images/blitzbasic.png)](/categorize/langs/BlitzBasic.md)| |Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|![](https://img.shields.io/github/stars/defparam/tiscripts?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|![](https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![CSS](/images/css.png)](/categorize/langs/CSS.md)| |Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS|![](https://img.shields.io/github/stars/hahwul/hbxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.|![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|![](https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![HTML](/images/html.png)](/categorize/langs/HTML.md)| |Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[eoyc](https://github.com/hahwul/eoyc)|Encoding Only Your Choices|![](https://img.shields.io/github/stars/hahwul/eoyc?label=%20)|[`encode`](/categorize/tags/encode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| |Utils|[gxss](https://github.com/rverton/gxss)|Blind XSS service alerting over slack or email|![](https://img.shields.io/github/stars/rverton/gxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns)|GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep |![](https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator)|Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)|![](https://img.shields.io/github/stars/0dayCTF/reverse-shell-generator?label=%20)|[`payload`](/categorize/tags/payload.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)|[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google||[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[REcollapse](https://github.com/0xacb/recollapse)|REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications|![](https://img.shields.io/github/stars/0xacb/recollapse?label=%20)|[`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[SerializationDumper](https://github.com/NickstaDB/SerializationDumper)|A tool to dump Java serialization streams in a more human readable form.|![](https://img.shields.io/github/stars/NickstaDB/SerializationDumper?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |![](https://img.shields.io/github/stars/cytopia/pwncat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[httptoolkit](https://github.com/httptoolkit/httptoolkit)|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac|![](https://img.shields.io/github/stars/httptoolkit/httptoolkit?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[nuclei-templates](https://github.com/projectdiscovery/nuclei-templates)|Community curated list of templates for the nuclei engine to find security vulnerabilities.|![](https://img.shields.io/github/stars/projectdiscovery/nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[pdtm](https://github.com/projectdiscovery/pdtm)|ProjectDiscovery's Open Source Tool Manager|![](https://img.shields.io/github/stars/projectdiscovery/pdtm?label=%20)|[`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[SequenceDiagram](https://sequencediagram.org)|Online tool for creating UML sequence diagrams||[`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[blistener](https://github.com/fyxme/blistener)|Blind-XSS listener with payloads|![](https://img.shields.io/github/stars/fyxme/blistener?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[h2spacex](https://github.com/nxenon/h2spacex)|HTTP/2 Single Packet Attack low level library based on Scapy|![](https://img.shields.io/github/stars/nxenon/h2spacex?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[difftastic](https://github.com/Wilfred/difftastic)|a structural diff that understands syntax|![](https://img.shields.io/github/stars/Wilfred/difftastic?label=%20)|[`diff`](/categorize/tags/diff.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|![](https://img.shields.io/github/stars/sharkdp/bat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[httpie](https://github.com/httpie/httpie)|modern, user-friendly command-line HTTP client for the API era|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xless](https://github.com/mazen160/xless)|The Serverless Blind XSS App|![](https://img.shields.io/github/stars/mazen160/xless?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Clipboard](https://github.com/Slackadays/Clipboard)|An external brain that remembers anything, anytime, anywhere.|![](https://img.shields.io/github/stars/Slackadays/Clipboard?label=%20)|[`clipboard`](/categorize/tags/clipboard.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C++](/images/c++.png)](/categorize/langs/C++.md)| |Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable!|![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)|[`json`](/categorize/tags/json.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|![](https://img.shields.io/github/stars/google/security-research-pocs?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C++](/images/c++.png)](/categorize/langs/C++.md)| |Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[ZipBomb](https://github.com/abdulfatir/ZipBomb)|A simple implementation of ZipBomb in Python|![](https://img.shields.io/github/stars/abdulfatir/ZipBomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[can-i-take-over-xyz](https://github.com/EdOverflow/can-i-take-over-xyz)|"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.|![](https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |![](https://img.shields.io/github/stars/fransr/template-generator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[grc](https://github.com/garabik/grc)|generic colouriser|![](https://img.shields.io/github/stars/garabik/grc?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|![](https://img.shields.io/github/stars/hahwul/gitls?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|![](https://img.shields.io/github/stars/hahwul/gee?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[race-the-web](https://github.com/TheHackerDev/race-the-web)|Tests for race conditions in web applications by sending out a user-specified number of requests to a target URL (or URLs) simultaneously, and then compares the responses from the server for uniqueness.|![](https://img.shields.io/github/stars/TheHackerDev/race-the-web?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[hoppscotch](https://github.com/hoppscotch/hoppscotch)|Open source API development ecosystem|![](https://img.shields.io/github/stars/hoppscotch/hoppscotch?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |![](https://img.shields.io/github/stars/tomnomnom/gf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. |![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[nuclei-wordfence-cve](https://github.com/topscoder/nuclei-wordfence-cve)|Every single day new templates are added to this repo based on updates on Wordfence.com|![](https://img.shields.io/github/stars/topscoder/nuclei-wordfence-cve?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[godeclutter](https://github.com/c3l3si4n/godeclutter)|Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.|![](https://img.shields.io/github/stars/c3l3si4n/godeclutter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[missing-cve-nuclei-templates](https://github.com/edoardottt/missing-cve-nuclei-templates)|Weekly updated list of missing CVEs in nuclei templates official repository|![](https://img.shields.io/github/stars/edoardottt/missing-cve-nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |![](https://img.shields.io/github/stars/tomnomnom/hacks?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher)|Find blind XSS but why not gather data while you're at it.|![](https://img.shields.io/github/stars/daxAKAhackerman/XSS-Catcher?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|![](https://img.shields.io/github/stars/curl/curl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker|![](https://img.shields.io/github/stars/khast3x/Redcloud?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|![](https://img.shields.io/github/stars/knqyf263/pet?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![PHP](/images/php.png)](/categorize/langs/PHP.md)| |Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[GQLSpection](https://github.com/doyensec/GQLSpection)|parses GraphQL introspection schema and generates possible queries|![](https://img.shields.io/github/stars/doyensec/GQLSpection?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[cent](https://github.com/xm1k3/cent)|Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.|![](https://img.shields.io/github/stars/xm1k3/cent?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|[`report`](/categorize/tags/report.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[PoC-in-GitHub](https://github.com/nomi-sec/PoC-in-GitHub)|📡 PoC auto collect from GitHub. Be careful malware.|![](https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.|![](https://img.shields.io/github/stars/Sliim/pentest-env?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|![](https://img.shields.io/github/stars/OWASP/glue?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Env|[Crimson](https://github.com/Karmaz95/crimson)|Web Application Security Testing automation.|![](https://img.shields.io/github/stars/Karmaz95/crimson?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ### Bookmarklets | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | ### Browser Addons | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Proxy|[rep](https://github.com/repplus/rep)|Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis|![](https://img.shields.io/github/stars/repplus/rep?label=%20)|[`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md)|![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[Wayback Machine](https://apps.apple.com/us/app/wayback-machine/id1472432422)|History of website|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![safari](/images/safari.png)| |Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[PwnFox](https://github.com/yeswehack/PwnFox)|Firefox/Burp extension that provide usefull tools for your security audit.|![](https://img.shields.io/github/stars/yeswehack/PwnFox?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![burp](/images/burp.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![zap](/images/zap.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Firefox Multi-Account Containers](https://github.com/mozilla/multi-account-containers)|Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs|![](https://img.shields.io/github/stars/mozilla/multi-account-containers?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[firefox-container-proxy](https://github.com/bekh6ex/firefox-container-proxy)|Assign a proxy to a Firefox container|![](https://img.shields.io/github/stars/bekh6ex/firefox-container-proxy?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[DOMLogger++](https://github.com/kevin-mizu/domloggerpp)|A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.|![](https://img.shields.io/github/stars/kevin-mizu/domloggerpp?label=%20)|[`dom`](/categorize/tags/dom.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)![safari](/images/safari.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[ZAP Browser Extension](https://github.com/zaproxy/browser-extension/)|A browser extension which allows ZAP to interact directly with the browser.|![](https://img.shields.io/github/stars/zaproxy/browser-extension/?label=%20)|[`browser-record`](/categorize/tags/browser-record.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)![zap](/images/zap.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[User-Agent Switcher](https://addons.mozilla.org/ko/firefox/addon/user-agent-switcher-revived/)|quick and easy way to switch between user-agents.|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)| |Utils|[Dark Reader for Safari](https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180)|Dark mode to any site|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![safari](/images/safari.png)| |Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site|![](https://img.shields.io/github/stars/darkreader/darkreader?label=%20)|[`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ### Burpsuite, Caido and ZAP Addons | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes|![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Recon|[BurpSuite-Secret_Finder](https://github.com/m4ll0k/BurpSuite-Secret_Finder)||![](https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)| |Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[Dr. Watson](https://github.com/prodigysml/Dr.-Watson)|Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information|![](https://img.shields.io/github/stars/prodigysml/Dr.-Watson?label=%20)|[`param`](/categorize/tags/param.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Fuzzer|[GAP](https://github.com/xnl-h4ck3r/GAP-Burp-Extension)|This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on.|![](https://img.shields.io/github/stars/xnl-h4ck3r/GAP-Burp-Extension?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|Param Miner|![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Web3 Decoder](https://github.com/nccgroup/web3-decoder)|Burp Extension for Web3|![](https://img.shields.io/github/stars/nccgroup/web3-decoder?label=%20)|[`web3`](/categorize/tags/web3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[gRPC-Web Pentest Suite](https://github.com/nxenon/grpc-pentest-suite)|gRPC-Pentest-Suite is set of tools for pentesting / hacking gRPC Web (gRPC-Web) applications.|![](https://img.shields.io/github/stars/nxenon/grpc-pentest-suite?label=%20)|[`gRPC-Web`](/categorize/tags/gRPC-Web.md)|![burp](/images/burp.png)![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[pcap-burp](https://github.com/nccgroup/pcap-burp)|Pcap importer for Burp|![](https://img.shields.io/github/stars/nccgroup/pcap-burp?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[argumentinjectionhammer](https://github.com/nccgroup/argumentinjectionhammer)|A Burp Extension designed to identify argument injection vulnerabilities.|![](https://img.shields.io/github/stars/nccgroup/argumentinjectionhammer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||![](https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[notebook](https://github.com/caido-community/notebook)|Notebook Caido Plugin|![](https://img.shields.io/github/stars/caido-community/notebook?label=%20)|[`note`](/categorize/tags/note.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[AWSSigner](https://github.com/NetSPI/AWSSigner)|Burp Extension for AWS Signing|![](https://img.shields.io/github/stars/NetSPI/AWSSigner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Map Local](https://github.com/Keindel/owasp-zap-maplocal-addon)|ZAP add-on which allows mapping of responses to content of a chosen local file.|![](https://img.shields.io/github/stars/Keindel/owasp-zap-maplocal-addon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better|![](https://img.shields.io/github/stars/bebiksior/EvenBetter?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.|![](https://img.shields.io/github/stars/bebiksior/EvenBetterExtensions?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Berserko](https://github.com/nccgroup/Berserko)|Burp Suite extension to perform Kerberos authentication|![](https://img.shields.io/github/stars/nccgroup/Berserko?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[caidope](https://github.com/skitttles-berry/caidope)|caidope - caido plugin|![](https://img.shields.io/github/stars/skitttles-berry/caidope?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![BlitzBasic](/images/blitzbasic.png)](/categorize/langs/BlitzBasic.md)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Decoder-Improved](https://github.com/nccgroup/Decoder-Improved)|Improved decoder for Burp Suite|![](https://img.shields.io/github/stars/nccgroup/Decoder-Improved?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)|Automated HTTP Request Repeating With Burp Suite|![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[blackboxprotobuf](https://github.com/nccgroup/blackboxprotobuf)|Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.|![](https://img.shields.io/github/stars/nccgroup/blackboxprotobuf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[HTTPSignatures](https://github.com/nccgroup/HTTPSignatures)|A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.|![](https://img.shields.io/github/stars/nccgroup/HTTPSignatures?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[CaidoReflector](https://github.com/bebiksior/CaidoReflector)|Automatically look for paramater reflections in the HTTP response|![](https://img.shields.io/github/stars/bebiksior/CaidoReflector?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ## Thanks to (Contributor) WHW's open-source project and made it with ❤️ if you want contribute this project, please see [CONTRIBUTING.md](https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md) and Pull-Request with cool your contents. [![](/images/CONTRIBUTORS.svg)](https://github.com/hahwul/WebHackersWeapons/graphs/contributors) ================================================ FILE: SECURITY.md ================================================ # Security Policy ## Supported Versions Use this section to tell people about which versions of your project are currently being supported with security updates. | Version | Supported | | ------- | ------------------ | | 5.1.x | :white_check_mark: | | 5.0.x | :x: | | 4.0.x | :white_check_mark: | | < 4.0 | :x: | ## Reporting a Vulnerability Use this section to tell people how to report a vulnerability. Tell them where to go, how often they can expect to get an update on a reported vulnerability, what to expect if the vulnerability is accepted or declined, etc. ================================================ FILE: categorize/langs/BlitzBasic.md ================================================ ## Tools Made of BlitzBasic | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[IntruderPayloads](https://github.com/1N3/IntruderPayloads)||![](https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![BlitzBasic](/images/blitzbasic.png)](/categorize/langs/BlitzBasic.md)| |Utils|[BurpBounty](https://github.com/wagiro/BurpBounty)||![](https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![BlitzBasic](/images/blitzbasic.png)](/categorize/langs/BlitzBasic.md)| ================================================ FILE: categorize/langs/C#.md ================================================ ## Tools Made of C# | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[ConfusedDotnet](https://github.com/visma-prodsec/ConfusedDotnet)|Tool to check for dependency confusion vulnerabilities in NuGet package management systems|![](https://img.shields.io/github/stars/visma-prodsec/ConfusedDotnet?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Utils|[Blacklist3r](https://github.com/NotSoSecure/Blacklist3r)|project-blacklist3r |![](https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| ================================================ FILE: categorize/langs/C++.md ================================================ ## Tools Made of C++ | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Clipboard](https://github.com/Slackadays/Clipboard)|An external brain that remembers anything, anytime, anywhere.|![](https://img.shields.io/github/stars/Slackadays/Clipboard?label=%20)|[`clipboard`](/categorize/tags/clipboard.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C++](/images/c++.png)](/categorize/langs/C++.md)| |Utils|[security-research-pocs](https://github.com/google/security-research-pocs)|Proof-of-concept codes created as part of security research done by Google Security Team.|![](https://img.shields.io/github/stars/google/security-research-pocs?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C++](/images/c++.png)](/categorize/langs/C++.md)| ================================================ FILE: categorize/langs/C.md ================================================ ## Tools Made of C | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[hashcat](https://github.com/hashcat/hashcat/)|World's fastest and most advanced password recovery utility |![](https://img.shields.io/github/stars/hashcat/hashcat/?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[thc-hydra](https://github.com/vanhauser-thc/thc-hydra)|hydra |![](https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Utils|[curl](https://github.com/curl/curl)|A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features|![](https://img.shields.io/github/stars/curl/curl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| ================================================ FILE: categorize/langs/CSS.md ================================================ ## Tools Made of CSS | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![CSS](/images/css.png)](/categorize/langs/CSS.md)| ================================================ FILE: categorize/langs/Crystal.md ================================================ ## Tools Made of Crystal | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis|![](https://img.shields.io/github/stars/noir-cr/noir?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| |Utils|[eoyc](https://github.com/hahwul/eoyc)|Encoding Only Your Choices|![](https://img.shields.io/github/stars/hahwul/eoyc?label=%20)|[`encode`](/categorize/tags/encode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| ================================================ FILE: categorize/langs/Go.md ================================================ ## Tools Made of Go | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|[`live-audit`](/categorize/tags/live-audit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[Glorp](https://github.com/denandz/glorp)|A CLI-based HTTP intercept and replay proxy|![](https://img.shields.io/github/stars/denandz/glorp?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information|![](https://img.shields.io/github/stars/projectdiscovery/asnmap?label=%20)|[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[uncover](https://github.com/projectdiscovery/uncover)|Quickly discover exposed hosts on the internet using multiple search engine.|![](https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers|![](https://img.shields.io/github/stars/projectdiscovery/cloudlist?label=%20)|[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[hakrevdns](https://github.com/hakluke/hakrevdns)|Small, fast tool for performing reverse DNS lookups en masse. |![](https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[csprecon](https://github.com/edoardottt/csprecon)|Discover new target domains using Content Security Policy|![](https://img.shields.io/github/stars/edoardottt/csprecon?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[meg](https://github.com/tomnomnom/meg)|Fetch many paths for many hosts - without killing the hosts |![](https://img.shields.io/github/stars/tomnomnom/meg?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection|![](https://img.shields.io/github/stars/projectdiscovery/tlsx?label=%20)|[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning |![](https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[htcat](https://github.com/htcat/htcat)|Parallel and Pipelined HTTP GET Utility |![](https://img.shields.io/github/stars/htcat/htcat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[github-endpoints](https://github.com/gwen001/github-endpoints)|Find endpoints on GitHub.|![](https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[favirecon](https://github.com/edoardottt/favirecon)|Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.|![](https://img.shields.io/github/stars/edoardottt/favirecon?label=%20)|[`favicon`](/categorize/tags/favicon.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[shosubgo](https://github.com/incogbyte/shosubgo)|Small tool to Grab subdomains using Shodan api.|![](https://img.shields.io/github/stars/incogbyte/shosubgo?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gowitness](https://github.com/sensepost/gowitness)|🔍 gowitness - a golang, web screenshot utility using Chrome Headless |![](https://img.shields.io/github/stars/sensepost/gowitness?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[go-dork](https://github.com/dwisiswant0/go-dork)|The fastest dork scanner written in Go. |![](https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[goverview](https://github.com/j3ssie/goverview)|goverview - Get an overview of the list of URLs|![](https://img.shields.io/github/stars/j3ssie/goverview?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Sub404](https://github.com/r3curs1v3-pr0xy/sub404)|A python tool to check subdomain takeover vulnerability|![](https://img.shields.io/github/stars/r3curs1v3-pr0xy/sub404?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[xurlfind3r](https://github.com/hueristiq/xurlfind3r)|A command-line utility designed to discover URLs for a given domain in a simple, efficient way.|![](https://img.shields.io/github/stars/hueristiq/xurlfind3r?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[haktrails](https://github.com/hakluke/haktrails)|Golang client for querying SecurityTrails API data|![](https://img.shields.io/github/stars/hakluke/haktrails?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gitrob](https://github.com/michenriksen/gitrob)|Reconnaissance tool for GitHub organizations |![](https://img.shields.io/github/stars/michenriksen/gitrob?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|[`domain`](/categorize/tags/domain.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[jsluice](https://github.com/BishopFox/jsluice)|Extract URLs, paths, secrets, and other interesting bits from JavaScript|![](https://img.shields.io/github/stars/BishopFox/jsluice?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)|[`url`](/categorize/tags/url.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[katana](https://github.com/projectdiscovery/katana)|A next-generation crawling and spidering framework.|![](https://img.shields.io/github/stars/projectdiscovery/katana?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[chaos-client](https://github.com/projectdiscovery/chaos-client)|Go client to communicate with Chaos DNS API. |![](https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Smap](https://github.com/s0md3v/smap/)|a drop-in replacement for Nmap powered by shodan.io|![](https://img.shields.io/github/stars/s0md3v/smap/?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL|![](https://img.shields.io/github/stars/projectdiscovery/alterx?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[SmuggleFuzz](https://github.com/Moopinger/smugglefuzz/)|A rapid HTTP downgrade smuggling scanner written in Go.|![](https://img.shields.io/github/stars/Moopinger/smugglefuzz/?label=%20)|[`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[kiterunner](https://github.com/assetnote/kiterunner)|Contextual Content Discovery Tool|![](https://img.shields.io/github/stars/assetnote/kiterunner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[ffuf](https://github.com/ffuf/ffuf)|Fast web fuzzer written in Go |![](https://img.shields.io/github/stars/ffuf/ffuf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[medusa](https://github.com/riza/medusa)|Fastest recursive HTTP fuzzer, like a Ferrari. |![](https://img.shields.io/github/stars/riza/medusa?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[headerpwn](https://github.com/devanshbatham/headerpwn)|A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers|![](https://img.shields.io/github/stars/devanshbatham/headerpwn?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[osv-scanner](https://github.com/google/osv-scanner)|Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects|![](https://img.shields.io/github/stars/google/osv-scanner?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|![](https://img.shields.io/github/stars/aquasecurity/trivy?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Deadsniper](https://github.com/port19x/deadsniper)|A fast, specialized dead-link checker|![](https://img.shields.io/github/stars/port19x/deadsniper?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[gitleaks](https://github.com/zricethezav/gitleaks)|Scan git repos (or files) for secrets using regex and entropy 🔑|![](https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[scan4all](https://github.com/hktalent/scan4all)|Official repository vuls Scan|![](https://img.shields.io/github/stars/hktalent/scan4all?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working HTTP and HTTPS servers |![](https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[pphack](https://github.com/edoardottt/pphack)|The Most Advanced Client-Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/edoardottt/pphack?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[FockCache](https://github.com/tismayil/fockcache)|Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ditto](https://github.com/evilsocket/ditto)|A tool for IDN homograph attacks and detection.|![](https://img.shields.io/github/stars/evilsocket/ditto?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[wprecon](https://github.com/blackcrw/wprecon)|Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.|![](https://img.shields.io/github/stars/blackcrw/wprecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[http2smugl](https://github.com/neex/http2smugl)|This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.|![](https://img.shields.io/github/stars/neex/http2smugl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[trufflehog](https://github.com/trufflesecurity/trufflehog)|Find and verify credentials in git repositories, filesystems, and S3 buckets|![](https://img.shields.io/github/stars/trufflesecurity/trufflehog?label=%20)|[`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.|![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[nuclei](https://github.com/projectdiscovery/nuclei)|Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. |![](https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Exploit|[xxeserv](https://github.com/staaldraad/xxeserv)|A mini webserver with FTP support for XXE payloads|![](https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gotator](https://github.com/Josue87/gotator)|Gotator is a tool to generate DNS wordlists through permutations.|![](https://img.shields.io/github/stars/Josue87/gotator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges|![](https://img.shields.io/github/stars/projectdiscovery/mapcidr?label=%20)|[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[dsieve](https://github.com/trickest/dsieve)|Filter and enrich a list of subdomains by level|![](https://img.shields.io/github/stars/trickest/dsieve?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[cf-check](https://github.com/dwisiswant0/cf-check)|Cloudflare Checker written in Go |![](https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[anew](https://github.com/tomnomnom/anew)|A tool for adding new lines to files, skipping duplicates|![](https://img.shields.io/github/stars/tomnomnom/anew?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[mubeng](https://github.com/kitabisa/mubeng)|An incredibly fast proxy checker & IP rotator with ease.|![](https://img.shields.io/github/stars/kitabisa/mubeng?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[github-regexp](https://github.com/gwen001/github-regexp)|Basically a regexp over a GitHub search.|![](https://img.shields.io/github/stars/gwen001/github-regexp?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[fff](https://github.com/tomnomnom/fff)|The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.|![](https://img.shields.io/github/stars/tomnomnom/fff?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[hakcheckurl](https://github.com/hakluke/hakcheckurl)|Takes a list of URLs and returns their HTTP response codes|![](https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[fzf](https://github.com/junegunn/fzf)|A command-line fuzzy finder|![](https://img.shields.io/github/stars/junegunn/fzf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gxss](https://github.com/rverton/gxss)|Blind XSS service alerting over slack or email|![](https://img.shields.io/github/stars/rverton/gxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[nuclei-templates](https://github.com/projectdiscovery/nuclei-templates)|Community curated list of templates for the nuclei engine to find security vulnerabilities.|![](https://img.shields.io/github/stars/projectdiscovery/nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[pdtm](https://github.com/projectdiscovery/pdtm)|ProjectDiscovery's Open Source Tool Manager|![](https://img.shields.io/github/stars/projectdiscovery/pdtm?label=%20)|[`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[blistener](https://github.com/fyxme/blistener)|Blind-XSS listener with payloads|![](https://img.shields.io/github/stars/fyxme/blistener?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[qsreplace](https://github.com/tomnomnom/qsreplace)|Accept URLs on stdin, replace all query string values with a user-supplied value |![](https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable!|![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)|[`json`](/categorize/tags/json.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gitls](https://github.com/hahwul/gitls)|Listing git repository from URL/User/Org|![](https://img.shields.io/github/stars/hahwul/gitls?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gee](https://github.com/hahwul/gee)|🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go|![](https://img.shields.io/github/stars/hahwul/gee?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[race-the-web](https://github.com/TheHackerDev/race-the-web)|Tests for race conditions in web applications by sending out a user-specified number of requests to a target URL (or URLs) simultaneously, and then compares the responses from the server for uniqueness.|![](https://img.shields.io/github/stars/TheHackerDev/race-the-web?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gotestwaf](https://github.com/wallarm/gotestwaf)|An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses|![](https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[gf](https://github.com/tomnomnom/gf)|A wrapper around grep, to help you grep for things |![](https://img.shields.io/github/stars/tomnomnom/gf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[godeclutter](https://github.com/c3l3si4n/godeclutter)|Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.|![](https://img.shields.io/github/stars/c3l3si4n/godeclutter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[hacks](https://github.com/tomnomnom/hacks)|A collection of hacks and one-off scripts |![](https://img.shields.io/github/stars/tomnomnom/hacks?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[pet](https://github.com/knqyf263/pet)|Simple command-line snippet manager, written in Go.|![](https://img.shields.io/github/stars/knqyf263/pet?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[cent](https://github.com/xm1k3/cent)|Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.|![](https://img.shields.io/github/stars/xm1k3/cent?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/langs/HTML.md ================================================ ## Tools Made of HTML | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[autochrome](https://github.com/nccgroup/autochrome)|This tool downloads, installs, and configures a shiny new copy of Chromium.|![](https://img.shields.io/github/stars/nccgroup/autochrome?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![HTML](/images/html.png)](/categorize/langs/HTML.md)| |Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![HTML](/images/html.png)](/categorize/langs/HTML.md)| ================================================ FILE: categorize/langs/Java.md ================================================ ## Tools Made of Java | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|Param Miner|![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Exploit|[BaRMIe](https://github.com/NickstaDB/BaRMIe)|Java RMI enumeration and attack tool.|![](https://img.shields.io/github/stars/NickstaDB/BaRMIe?label=%20)|[`RMI`](/categorize/tags/RMI.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[GadgetProbe](https://github.com/BishopFox/GadgetProbe)|Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.|![](https://img.shields.io/github/stars/BishopFox/GadgetProbe?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Web3 Decoder](https://github.com/nccgroup/web3-decoder)|Burp Extension for Web3|![](https://img.shields.io/github/stars/nccgroup/web3-decoder?label=%20)|[`web3`](/categorize/tags/web3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[pcap-burp](https://github.com/nccgroup/pcap-burp)|Pcap importer for Burp|![](https://img.shields.io/github/stars/nccgroup/pcap-burp?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[safecopy](https://github.com/yashrs/safecopy)||![](https://img.shields.io/github/stars/yashrs/safecopy?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |utils|[Neonmarker](https://github.com/kingthorin/neonmarker)||![](https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[AWSSigner](https://github.com/NetSPI/AWSSigner)|Burp Extension for AWS Signing|![](https://img.shields.io/github/stars/NetSPI/AWSSigner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Map Local](https://github.com/Keindel/owasp-zap-maplocal-addon)|ZAP add-on which allows mapping of responses to content of a chosen local file.|![](https://img.shields.io/github/stars/Keindel/owasp-zap-maplocal-addon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[BurpSuiteLoggerPlusPlus](https://github.com/nccgroup/BurpSuiteLoggerPlusPlus)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Stepper](https://github.com/CoreyD97/Stepper)||![](https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[http-script-generator](https://github.com/h3xstream/http-script-generator)||![](https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[SerializationDumper](https://github.com/NickstaDB/SerializationDumper)|A tool to dump Java serialization streams in a more human readable form.|![](https://img.shields.io/github/stars/NickstaDB/SerializationDumper?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[BurpCustomizer](https://github.com/CoreyD97/BurpCustomizer)|Because just a dark theme wasn't enough!|![](https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Berserko](https://github.com/nccgroup/Berserko)|Burp Suite extension to perform Kerberos authentication|![](https://img.shields.io/github/stars/nccgroup/Berserko?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[Decoder-Improved](https://github.com/nccgroup/Decoder-Improved)|Improved decoder for Burp Suite|![](https://img.shields.io/github/stars/nccgroup/Decoder-Improved?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[zap-hud](https://github.com/zaproxy/zap-hud)||![](https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[knife](https://github.com/bit4woo/knife)|A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅|![](https://img.shields.io/github/stars/bit4woo/knife?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)|Automated HTTP Request Repeating With Burp Suite|![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[HTTPSignatures](https://github.com/nccgroup/HTTPSignatures)|A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.|![](https://img.shields.io/github/stars/nccgroup/HTTPSignatures?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[burp-send-to](https://github.com/bytebutcher/burp-send-to)||![](https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/langs/JavaScript.md ================================================ ## Tools Made of JavaScript | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Proxy|[rep](https://github.com/repplus/rep)|Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis|![](https://img.shields.io/github/stars/repplus/rep?label=%20)|[`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md)|![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[rengine](https://github.com/yogeshojha/rengine)|reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. |![](https://img.shields.io/github/stars/yogeshojha/rengine?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[DotGit](https://github.com/davtur19/DotGit)|An extension for checking if .git is exposed in visited websites|![](https://img.shields.io/github/stars/davtur19/DotGit?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[xsinator.com](https://github.com/RUB-NDS/xsinator.com)|XS-Leak Browser Test Suite|![](https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[github-search](https://github.com/gwen001/github-search)|Tools to perform basic search on GitHub. |![](https://img.shields.io/github/stars/gwen001/github-search?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Exploit|[singularity](https://github.com/nccgroup/singularity)|A DNS rebinding attack framework.|![](https://img.shields.io/github/stars/nccgroup/singularity?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[PwnFox](https://github.com/yeswehack/PwnFox)|Firefox/Burp extension that provide usefull tools for your security audit.|![](https://img.shields.io/github/stars/yeswehack/PwnFox?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![burp](/images/burp.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[quickjack](https://github.com/samyk/quickjack)|Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.|![](https://img.shields.io/github/stars/samyk/quickjack?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[CyberChef](https://github.com/gchq/CyberChef)|The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis |![](https://img.shields.io/github/stars/gchq/CyberChef?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![zap](/images/zap.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[community-scripts](https://github.com/zaproxy/community-scripts)||![](https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator)|Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)|![](https://img.shields.io/github/stars/0dayCTF/reverse-shell-generator?label=%20)|[`payload`](/categorize/tags/payload.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)|[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Firefox Multi-Account Containers](https://github.com/mozilla/multi-account-containers)|Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs|![](https://img.shields.io/github/stars/mozilla/multi-account-containers?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[firefox-container-proxy](https://github.com/bekh6ex/firefox-container-proxy)|Assign a proxy to a Firefox container|![](https://img.shields.io/github/stars/bekh6ex/firefox-container-proxy?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[clear-cache](https://github.com/TenSoja/clear-cache)|Add-on to clear browser cache with a single click or via the F9 key.|![](https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[DOMLogger++](https://github.com/kevin-mizu/domloggerpp)|A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.|![](https://img.shields.io/github/stars/kevin-mizu/domloggerpp?label=%20)|[`dom`](/categorize/tags/dom.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[wssip](https://github.com/nccgroup/wssip)|Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.|![](https://img.shields.io/github/stars/nccgroup/wssip?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xless](https://github.com/mazen160/xless)|The Serverless Blind XSS App|![](https://img.shields.io/github/stars/mazen160/xless?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[template-generator](https://github.com/fransr/template-generator)|A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. |![](https://img.shields.io/github/stars/fransr/template-generator?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[MM3 ProxySwitch](https://proxy-offline-browser.com/ProxySwitch/)|Proxy Switch in Firefox and Chrome|||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/langs/Kotlin.md ================================================ ## Tools Made of Kotlin | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes|![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[burp-piper](https://github.com/silentsignal/burp-piper)||![](https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[reflect](https://github.com/cak/reflect)||![](https://img.shields.io/github/stars/cak/reflect?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Utils|[turbo-intruder](https://github.com/PortSwigger/turbo-intruder)||![](https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| ================================================ FILE: categorize/langs/PHP.md ================================================ ## Tools Made of PHP | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![PHP](/images/php.png)](/categorize/langs/PHP.md)| ================================================ FILE: categorize/langs/Perl.md ================================================ ## Tools Made of Perl | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)|[`path-traversal`](/categorize/tags/path-traversal.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Scanner|[HRS](https://github.com/SafeBreach-Labs/HRS)|HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.|![](https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Scanner|[nikto](https://github.com/sullo/nikto)|Nikto web server scanner |![](https://img.shields.io/github/stars/sullo/nikto?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)|Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities.||[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| ================================================ FILE: categorize/langs/Python.md ================================================ ## Tools Made of Python | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Proxy|[mitmproxy](https://github.com/mitmproxy/mitmproxy)|An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.|![](https://img.shields.io/github/stars/mitmproxy/mitmproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[parameth](https://github.com/maK-/parameth)|This tool can be used to brute discover GET and POST parameters|![](https://img.shields.io/github/stars/maK-/parameth?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[3klCon](https://github.com/eslam3kl/3klCon)|Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.|![](https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[dirsearch](https://github.com/maurosoria/dirsearch)|Web path scanner |![](https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[ParamWizard](https://github.com/iamunixtz/ParamWizard)|ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website.|![](https://img.shields.io/github/stars/iamunixtz/ParamWizard?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[pagodo](https://github.com/opsdisk/pagodo)|pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching|![](https://img.shields.io/github/stars/opsdisk/pagodo?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[SecretFinder](https://github.com/m4ll0k/SecretFinder)|SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files |![](https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[waymore](https://github.com/xnl-h4ck3r/waymore)|Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!|![](https://img.shields.io/github/stars/xnl-h4ck3r/waymore?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[bbot](https://github.com/blacklanternsecurity/bbot)|OSINT automation for hackers|![](https://img.shields.io/github/stars/blacklanternsecurity/bbot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Dr. Watson](https://github.com/prodigysml/Dr.-Watson)|Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information|![](https://img.shields.io/github/stars/prodigysml/Dr.-Watson?label=%20)|[`param`](/categorize/tags/param.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|[`dns`](/categorize/tags/dns.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder)|A python tool used to discover endpoints (and potential parameters) for a given target|![](https://img.shields.io/github/stars/xnl-h4ck3r/xnLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[BLUTO](https://github.com/darryllane/Bluto)|DNS Analysis Tool|![](https://img.shields.io/github/stars/darryllane/Bluto?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[HydraRecon](https://github.com/aufzayed/HydraRecon)|All In One, Fast, Easy Recon Tool|![](https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[OneForAll](https://github.com/shmilylty/OneForAll)|OneForAll是一款功能强大的子域收集工具 |![](https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[longtongue](https://github.com/edoardottt/longtongue)|Customized Password/Passphrase List inputting Target Info|![](https://img.shields.io/github/stars/edoardottt/longtongue?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[GitMiner](https://github.com/UnkL4b/GitMiner)|Tool for advanced mining for content on Github |![](https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[STEWS](https://github.com/PalindromeLabs/STEWS)|A Security Tool for Enumerating WebSockets|![](https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[SubBrute](https://github.com/aboul3la/Sublist3r)|https://github.com/TheRook/subbrute|![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[HostHunter](https://github.com/SpiderLabs/HostHunter)|Recon tool for discovering hostnames using OSINT techniques.|![](https://img.shields.io/github/stars/SpiderLabs/HostHunter?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)|[`osint`](/categorize/tags/osint.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Lepus](https://github.com/gfek/Lepus)|Subdomain finder|![](https://img.shields.io/github/stars/gfek/Lepus?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[graphw00f](https://github.com/dolevf/graphw00f)|GraphQL Server Engine Fingerprinting utility|![](https://img.shields.io/github/stars/dolevf/graphw00f?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[FavFreak](https://github.com/devanshbatham/FavFreak)|Making Favicon.ico based Recon Great again ! |![](https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[ParamPamPam](https://github.com/Bo0oM/ParamPamPam)|This tool for brute discover GET and POST parameters.|![](https://img.shields.io/github/stars/Bo0oM/ParamPamPam?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[wfuzz](https://github.com/xmendez/wfuzz)|Web application fuzzer |![](https://img.shields.io/github/stars/xmendez/wfuzz?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[Clairvoyance](https://github.com/nikitastupin/clairvoyance)|Obtain GraphQL API schema even if the introspection is disabled|![](https://img.shields.io/github/stars/nikitastupin/clairvoyance?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[GAP](https://github.com/xnl-h4ck3r/GAP-Burp-Extension)|This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on.|![](https://img.shields.io/github/stars/xnl-h4ck3r/GAP-Burp-Extension?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[BatchQL](https://github.com/assetnote/batchql)|GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations|![](https://img.shields.io/github/stars/assetnote/batchql?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[CrackQL](https://github.com/nicholasaleks/CrackQL)|CrackQL is a GraphQL password brute-force and fuzzing utility.|![](https://img.shields.io/github/stars/nicholasaleks/CrackQL?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[SSTImap](https://github.com/vladko312/SSTImap)|Automatic SSTI detection tool with interactive interface|![](https://img.shields.io/github/stars/vladko312/SSTImap?label=%20)|[`ssti`](/categorize/tags/ssti.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.|![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Oralyzer](https://github.com/r0075h3ll/Oralyzer)|Open Redirection Analyzer|![](https://img.shields.io/github/stars/r0075h3ll/Oralyzer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[PwnXSS](https://github.com/pwn0sec/PwnXSS)|Vulnerability (XSS) scanner exploit|![](https://img.shields.io/github/stars/pwn0sec/PwnXSS?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[zap-cli](https://github.com/Grunny/zap-cli)|A simple tool for interacting with OWASP ZAP from the commandline. |![](https://img.shields.io/github/stars/Grunny/zap-cli?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[LFISuite](https://github.com/D35m0nd142/LFISuite)|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner |![](https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[CMSmap](https://github.com/dionach/CMSmap)|CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.|![](https://img.shields.io/github/stars/dionach/CMSmap?label=%20)|[`web-scanner`](/categorize/tags/web-scanner.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[NoXss](https://github.com/lwzSoviet/)|Faster xss scanner,support reflected-xss and dom-xss|![](https://img.shields.io/github/stars/lwzSoviet/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[depenfusion](https://github.com/benjamin-mauss/depenfusion)|A powerful pentesting tool for detecting and exploiting dependency confusion vulnerabilities in Node.js projects|![](https://img.shields.io/github/stars/benjamin-mauss/depenfusion?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsssniper](https://github.com/gbrindisi/xsssniper)|An automatic XSS discovery tool|![](https://img.shields.io/github/stars/gbrindisi/xsssniper?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[SQLiDetector](https://github.com/eslam3kl/SQLiDetector)|Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.|![](https://img.shields.io/github/stars/eslam3kl/SQLiDetector?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[http-request-smuggling](https://github.com/anshumanpattnaik/http-request-smuggling)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[rapidscan](https://github.com/skavngr/rapidscan)|The Multi-Tool Web Vulnerability Scanner. |![](https://img.shields.io/github/stars/skavngr/rapidscan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[OpenRedireX](https://github.com/devanshbatham/OpenRedireX)|A Fuzzer for OpenRedirect issues|![](https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[S3cret Scanner](https://github.com/Eilonh/s3crets_scanner)|Hunting For Secrets Uploaded To Public S3 Buckets|![](https://img.shields.io/github/stars/Eilonh/s3crets_scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Striker](https://github.com/s0md3v/Striker)|Striker is an offensive information and vulnerability scanner. |![](https://img.shields.io/github/stars/s0md3v/Striker?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.|![](https://img.shields.io/github/stars/Th0h0/autopoisoner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[tplmap](https://github.com/epinna/tplmap)|Server-Side Template Injection and Code Injection Detection and Exploitation Tool|![](https://img.shields.io/github/stars/epinna/tplmap?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[gitGraber](https://github.com/hisxo/gitGraber)|gitGraber |![](https://img.shields.io/github/stars/hisxo/gitGraber?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[semgrep](https://github.com/semgrep/semgrep)|Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.|![](https://img.shields.io/github/stars/semgrep/semgrep?label=%20)|[`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[VHostScan](https://github.com/codingo/VHostScan)|A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. |![](https://img.shields.io/github/stars/codingo/VHostScan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[dependency-confusion-scanner](https://github.com/Yaniv-git/dependency-confusion-scanner)|This small repo is meant to scan Github's repositories for potential Dependency confusion vulnerabilities.|![](https://img.shields.io/github/stars/Yaniv-git/dependency-confusion-scanner?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XssPy](https://github.com/faizann24/)|Web Application XSS Scanner|![](https://img.shields.io/github/stars/faizann24/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[wapiti](https://github.com/wapiti-scanner/wapiti)|Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications.|![](https://img.shields.io/github/stars/wapiti-scanner/wapiti?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`web-scanner`](/categorize/tags/web-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[deadlinks](https://github.com/butuzov/deadlinks)|Health checks for your documentation links.|![](https://img.shields.io/github/stars/butuzov/deadlinks?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[ghauri](https://github.com/r0oth3x49/ghauri)|An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws|![](https://img.shields.io/github/stars/r0oth3x49/ghauri?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.|![](https://img.shields.io/github/stars/t3l3machus/toxssin?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[of-CORS](https://github.com/trufflesecurity/of-CORS)|Identifying and exploiting CORS misconfigurations on the internal networks|![](https://img.shields.io/github/stars/trufflesecurity/of-CORS?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[XSRFProbe](https://github.com/0xInfection/XSRFProbe)|The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.|![](https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[Liffy](https://github.com/mzfr/liffy)|Local file inclusion exploitation tool|![](https://img.shields.io/github/stars/mzfr/liffy?label=%20)|[`lfi`](/categorize/tags/lfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[jwt_tool](https://github.com/ticarpi/jwt_tool)|A toolkit for testing, tweaking and cracking JSON Web Tokens|![](https://img.shields.io/github/stars/ticarpi/jwt_tool?label=%20)|[`jwt`](/categorize/tags/jwt.md) [`authentication`](/categorize/tags/authentication.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[zip-bomb](https://github.com/damianrusinek/zip-bomb)|Create a ZIPBomb for a given uncompressed size (flat and nested modes).|![](https://img.shields.io/github/stars/damianrusinek/zip-bomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[burp-exporter](https://github.com/artssec/burp-exporter)||![](https://img.shields.io/github/stars/artssec/burp-exporter?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[gRPC-Web Pentest Suite](https://github.com/nxenon/grpc-pentest-suite)|gRPC-Pentest-Suite is set of tools for pentesting / hacking gRPC Web (gRPC-Web) applications.|![](https://img.shields.io/github/stars/nxenon/grpc-pentest-suite?label=%20)|[`gRPC-Web`](/categorize/tags/gRPC-Web.md)|![burp](/images/burp.png)![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[argumentinjectionhammer](https://github.com/nccgroup/argumentinjectionhammer)|A Burp Extension designed to identify argument injection vulnerabilities.|![](https://img.shields.io/github/stars/nccgroup/argumentinjectionhammer?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[tiscripts](https://github.com/defparam/tiscripts)|Turbo Intruder Scripts|![](https://img.shields.io/github/stars/defparam/tiscripts?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[pentest-tools](https://github.com/gwen001/pentest-tools)|Custom pentesting tools |![](https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[inql](https://github.com/doyensec/inql)||![](https://img.shields.io/github/stars/doyensec/inql?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)|A list of useful payloads and bypass for Web Application Security and Pentest/CTF |![](https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[REcollapse](https://github.com/0xacb/recollapse)|REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications|![](https://img.shields.io/github/stars/0xacb/recollapse?label=%20)|[`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[h2spacex](https://github.com/nxenon/h2spacex)|HTTP/2 Single Packet Attack low level library based on Scapy|![](https://img.shields.io/github/stars/nxenon/h2spacex?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[httpie](https://github.com/httpie/httpie)|modern, user-friendly command-line HTTP client for the API era|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[femida](https://github.com/wish-i-was/femida)||![](https://img.shields.io/github/stars/wish-i-was/femida?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[ZipBomb](https://github.com/abdulfatir/ZipBomb)|A simple implementation of ZipBomb in Python|![](https://img.shields.io/github/stars/abdulfatir/ZipBomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[grc](https://github.com/garabik/grc)|generic colouriser|![](https://img.shields.io/github/stars/garabik/grc?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[nuclei-wordfence-cve](https://github.com/topscoder/nuclei-wordfence-cve)|Every single day new templates are added to this repo based on updates on Wordfence.com|![](https://img.shields.io/github/stars/topscoder/nuclei-wordfence-cve?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[blackboxprotobuf](https://github.com/nccgroup/blackboxprotobuf)|Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.|![](https://img.shields.io/github/stars/nccgroup/blackboxprotobuf?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Bug-Bounty-Toolz](https://github.com/m4ll0k/Bug-Bounty-Toolz)|BBT - Bug Bounty Tools |![](https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher)|Find blind XSS but why not gather data while you're at it.|![](https://img.shields.io/github/stars/daxAKAhackerman/XSS-Catcher?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker|![](https://img.shields.io/github/stars/khast3x/Redcloud?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[GQLSpection](https://github.com/doyensec/GQLSpection)|parses GraphQL introspection schema and generates possible queries|![](https://img.shields.io/github/stars/doyensec/GQLSpection?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Env|[Crimson](https://github.com/Karmaz95/crimson)|Web Application Security Testing automation.|![](https://img.shields.io/github/stars/Karmaz95/crimson?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/langs/Ruby.md ================================================ ## Tools Made of Ruby | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework|![](https://img.shields.io/github/stars/rapid7/metasploit-framework?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.|![](https://img.shields.io/github/stars/bbtfr/evil-proxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|![](https://img.shields.io/github/stars/EasyRecon/Hunt3r?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |![](https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[arachni](https://github.com/Arachni/arachni)|Web Application Security Scanner Framework |![](https://img.shields.io/github/stars/Arachni/arachni?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |![](https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)|![](https://img.shields.io/github/stars/hahwul/deadfinder?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project|![](https://img.shields.io/github/stars/beefproject/beef?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS|![](https://img.shields.io/github/stars/hahwul/hbxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |![](https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.|![](https://img.shields.io/github/stars/Sliim/pentest-env?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Env|[Glue](https://github.com/OWASP/glue)|Application Security Automation|![](https://img.shields.io/github/stars/OWASP/glue?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| ================================================ FILE: categorize/langs/Rust.md ================================================ ## Tools Made of Rust | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Proxy|[Caido](https://caido.io)|A lightweight web security auditing toolkit||[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[urx](https://github.com/hahwul/urx)|Extracts URLs from OSINT Archives for Security Insights|![](https://img.shields.io/github/stars/hahwul/urx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[x8](https://github.com/Sh1Yo/x8)|Hidden parameters discovery suite|![](https://img.shields.io/github/stars/Sh1Yo/x8?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[fhc](https://github.com/Edu4rdSHL/fhc)|Fast HTTP Checker.|![](https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Fuzzer|[feroxbuster](https://github.com/epi052/feroxbuster)|A fast, simple, recursive content discovery tool written in Rust.|![](https://img.shields.io/github/stars/epi052/feroxbuster?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[smugglex](https://github.com/hahwul/smugglex)|Rust-powered HTTP Request Smuggling Scanner|![](https://img.shields.io/github/stars/hahwul/smugglex?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Exploit|[ropr](https://github.com/Ben-Lichtman/ropr)|A blazing fast™ multithreaded ROP Gadget finder. ropper|![](https://img.shields.io/github/stars/Ben-Lichtman/ropr?label=%20)|[`rop`](/categorize/tags/rop.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[grex](https://github.com/pemistahl/grex)|A command-line tool and library for generating regular expressions from user-provided test cases|![](https://img.shields.io/github/stars/pemistahl/grex?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[hurl](https://github.com/Orange-OpenSource/hurl)|Hurl, run and test HTTP requests.|![](https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[difftastic](https://github.com/Wilfred/difftastic)|a structural diff that understands syntax|![](https://img.shields.io/github/stars/Wilfred/difftastic?label=%20)|[`diff`](/categorize/tags/diff.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[bat](https://github.com/sharkdp/bat)|A cat(1) clone with wings.|![](https://img.shields.io/github/stars/sharkdp/bat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| ================================================ FILE: categorize/langs/Shell.md ================================================ ## Tools Made of Shell | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[lazyrecon](https://github.com/nahamsec/lazyrecon)|This script is intended to automate your reconnaissance process in an organized fashion |![](https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[Sudomy](https://github.com/screetsec/Sudomy)|subdomain enumeration tool to collect subdomains and analyzing domains|![](https://img.shields.io/github/stars/screetsec/Sudomy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[reconftw](https://github.com/six2dez/reconftw)|reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities|![](https://img.shields.io/github/stars/six2dez/reconftw?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[recon_profile](https://github.com/nahamsec/recon_profile)|Recon profile (bash profile) for bugbounty |![](https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[megplus](https://github.com/EdOverflow/megplus)|Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] |![](https://img.shields.io/github/stars/EdOverflow/megplus?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[BugBountyScanner](https://github.com/chvancooten/BugBountyScanner)|A Bash script and Docker image for Bug Bounty reconnaissance.|![](https://img.shields.io/github/stars/chvancooten/BugBountyScanner?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[SSRFire](https://github.com/ksharinarayanan/SSRFire)|An automated SSRF finder. Just give the domain name and your server and chill|![](https://img.shields.io/github/stars/ksharinarayanan/SSRFire?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)|[`crlf`](/categorize/tags/crlf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Fuzzer|[BruteX](https://github.com/1N3/BruteX)|Automatically brute force all services running on a target.|![](https://img.shields.io/github/stars/1N3/BruteX?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Exploit|[Sn1per](https://github.com/1N3/Sn1per)|Automated pentest framework for offensive security experts |![](https://img.shields.io/github/stars/1N3/Sn1per?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[pwncat](https://github.com/cytopia/pwncat)|pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) |![](https://img.shields.io/github/stars/cytopia/pwncat?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|[`report`](/categorize/tags/report.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| ================================================ FILE: categorize/langs/Txt.md ================================================ ## Tools Made of Txt | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)|Some files for bruteforcing certain things.|![](https://img.shields.io/github/stars/random-robbie/bruteforce-lists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.|![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[missing-cve-nuclei-templates](https://github.com/edoardottt/missing-cve-nuclei-templates)|Weekly updated list of missing CVEs in nuclei templates official repository|![](https://img.shields.io/github/stars/edoardottt/missing-cve-nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| ================================================ FILE: categorize/langs/TypeScript.md ================================================ ## Tools Made of TypeScript | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities|![](https://img.shields.io/github/stars/luisfontes19/xxexploiter?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[notebook](https://github.com/caido-community/notebook)|Notebook Caido Plugin|![](https://img.shields.io/github/stars/caido-community/notebook?label=%20)|[`note`](/categorize/tags/note.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better|![](https://img.shields.io/github/stars/bebiksior/EvenBetter?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.|![](https://img.shields.io/github/stars/bebiksior/EvenBetterExtensions?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[caidope](https://github.com/skitttles-berry/caidope)|caidope - caido plugin|![](https://img.shields.io/github/stars/skitttles-berry/caidope?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[Hack-Tools](https://github.com/LasCC/Hack-Tools)|The all-in-one Red Team extension for Web Pentester 🛠|![](https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20)||![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)![safari](/images/safari.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[ZAP Browser Extension](https://github.com/zaproxy/browser-extension/)|A browser extension which allows ZAP to interact directly with the browser.|![](https://img.shields.io/github/stars/zaproxy/browser-extension/?label=%20)|[`browser-record`](/categorize/tags/browser-record.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)![zap](/images/zap.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[hoppscotch](https://github.com/hoppscotch/hoppscotch)|Open source API development ecosystem|![](https://img.shields.io/github/stars/hoppscotch/hoppscotch?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[CaidoReflector](https://github.com/bebiksior/CaidoReflector)|Automatically look for paramater reflections in the HTTP response|![](https://img.shields.io/github/stars/bebiksior/CaidoReflector?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site|![](https://img.shields.io/github/stars/darkreader/darkreader?label=%20)|[`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/403.md ================================================ ## Tools for 403 | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[dontgo403](https://github.com/devploit/dontgo403)|Tool to bypass 40X response codes.|![](https://img.shields.io/github/stars/devploit/dontgo403?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[DirDar](https://github.com/M4DM0e/DirDar)|DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it|![](https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20)|[`403`](/categorize/tags/403.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/RMI.md ================================================ ## Tools for RMI | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Exploit|[BaRMIe](https://github.com/NickstaDB/BaRMIe)|Java RMI enumeration and attack tool.|![](https://img.shields.io/github/stars/NickstaDB/BaRMIe?label=%20)|[`RMI`](/categorize/tags/RMI.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/aaa.md ================================================ ## Tools for aaa | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[AuthMatrix](https://github.com/SecurityInnovation/AuthMatrix)||![](https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Autorize](https://github.com/Quitten/Autorize)||![](https://img.shields.io/github/stars/Quitten/Autorize?label=%20)|[`aaa`](/categorize/tags/aaa.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/apk.md ================================================ ## Tools for apk | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/asn.md ================================================ ## Tools for asn | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information|![](https://img.shields.io/github/stars/projectdiscovery/asnmap?label=%20)|[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/asset-discovery.md ================================================ ## Tools for asset-discovery | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers|![](https://img.shields.io/github/stars/projectdiscovery/cloudlist?label=%20)|[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/attack-surface.md ================================================ ## Tools for attack-surface | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis|![](https://img.shields.io/github/stars/noir-cr/noir?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| ================================================ FILE: categorize/tags/authentication.md ================================================ ## Tools for authentication | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Exploit|[jwt_tool](https://github.com/ticarpi/jwt_tool)|A toolkit for testing, tweaking and cracking JSON Web Tokens|![](https://img.shields.io/github/stars/ticarpi/jwt_tool?label=%20)|[`jwt`](/categorize/tags/jwt.md) [`authentication`](/categorize/tags/authentication.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/aws.md ================================================ ## Tools for aws | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/blind-xss.md ================================================ ## Tools for blind-xss | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS|![](https://img.shields.io/github/stars/hahwul/hbxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[gxss](https://github.com/rverton/gxss)|Blind XSS service alerting over slack or email|![](https://img.shields.io/github/stars/rverton/gxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[blistener](https://github.com/fyxme/blistener)|Blind-XSS listener with payloads|![](https://img.shields.io/github/stars/fyxme/blistener?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[xless](https://github.com/mazen160/xless)|The Serverless Blind XSS App|![](https://img.shields.io/github/stars/mazen160/xless?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher)|Find blind XSS but why not gather data while you're at it.|![](https://img.shields.io/github/stars/daxAKAhackerman/XSS-Catcher?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![PHP](/images/php.png)](/categorize/langs/PHP.md)| ================================================ FILE: categorize/tags/broken-link.md ================================================ ## Tools for broken-link | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[Deadsniper](https://github.com/port19x/deadsniper)|A fast, specialized dead-link checker|![](https://img.shields.io/github/stars/port19x/deadsniper?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[DeadFinder](https://github.com/hahwul/deadfinder)|Find dead-links (broken links)|![](https://img.shields.io/github/stars/hahwul/deadfinder?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[deadlinks](https://github.com/butuzov/deadlinks)|Health checks for your documentation links.|![](https://img.shields.io/github/stars/butuzov/deadlinks?label=%20)|[`broken-link`](/categorize/tags/broken-link.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/browser-record.md ================================================ ## Tools for browser-record | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[ZAP Browser Extension](https://github.com/zaproxy/browser-extension/)|A browser extension which allows ZAP to interact directly with the browser.|![](https://img.shields.io/github/stars/zaproxy/browser-extension/?label=%20)|[`browser-record`](/categorize/tags/browser-record.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)![zap](/images/zap.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/cache-vuln.md ================================================ ## Tools for cache-vuln | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[ParamPamPam](https://github.com/Bo0oM/ParamPamPam)|This tool for brute discover GET and POST parameters.|![](https://img.shields.io/github/stars/Bo0oM/ParamPamPam?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|Param Miner|![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[web_cache_poison](https://github.com/fngoo/web_cache_poison)|web cache poison - Top 1 web hacking technique of 2019|![](https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[FockCache](https://github.com/tismayil/fockcache)|Minimalized Test Cache Poisoning|![](https://img.shields.io/github/stars/tismayil/fockcache?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[Web-Cache-Vulnerability-Scanner](https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner)|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).|![](https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[autopoisoner](https://github.com/Th0h0/autopoisoner)|Web cache poisoning vulnerability scanner.|![](https://img.shields.io/github/stars/Th0h0/autopoisoner?label=%20)|[`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/certificates.md ================================================ ## Tools for certificates | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection|![](https://img.shields.io/github/stars/projectdiscovery/tlsx?label=%20)|[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/cidr.md ================================================ ## Tools for cidr | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges|![](https://img.shields.io/github/stars/projectdiscovery/mapcidr?label=%20)|[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/clipboard.md ================================================ ## Tools for clipboard | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Clipboard](https://github.com/Slackadays/Clipboard)|An external brain that remembers anything, anytime, anywhere.|![](https://img.shields.io/github/stars/Slackadays/Clipboard?label=%20)|[`clipboard`](/categorize/tags/clipboard.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C++](/images/c++.png)](/categorize/langs/C++.md)| ================================================ FILE: categorize/tags/cloud.md ================================================ ## Tools for cloud | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[cloudlist](https://github.com/projectdiscovery/cloudlist)|Cloudlist is a tool for listing Assets from multiple Cloud Providers|![](https://img.shields.io/github/stars/projectdiscovery/cloudlist?label=%20)|[`cloud`](/categorize/tags/cloud.md) [`asset-discovery`](/categorize/tags/asset-discovery.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/code-analysis.md ================================================ ## Tools for code-analysis | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[semgrep](https://github.com/semgrep/semgrep)|Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.|![](https://img.shields.io/github/stars/semgrep/semgrep?label=%20)|[`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/container-security.md ================================================ ## Tools for container-security | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|![](https://img.shields.io/github/stars/aquasecurity/trivy?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/cookie.md ================================================ ## Tools for cookie | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Edit-This-Cookie](https://github.com/ETCExtensions/Edit-This-Cookie)|EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies|![](https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[cookie-quick-manager](https://github.com/ysard/cookie-quick-manager)|An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.|![](https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20)|[`cookie`](/categorize/tags/cookie.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/cors.md ================================================ ## Tools for cors | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[Corsy](https://github.com/s0md3v/Corsy)|CORS Misconfiguration Scanner |![](https://img.shields.io/github/stars/s0md3v/Corsy?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[corsair_scan](https://github.com/Santandersecurityresearch/corsair_scan)|Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).|![](https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[CorsMe](https://github.com/Shivangx01b/CorsMe)|Cross Origin Resource Sharing MisConfiguration Scanner |![](https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Exploit|[of-CORS](https://github.com/trufflesecurity/of-CORS)|Identifying and exploiting CORS misconfigurations on the internal networks|![](https://img.shields.io/github/stars/trufflesecurity/of-CORS?label=%20)|[`cors`](/categorize/tags/cors.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/crawl.md ================================================ ## Tools for crawl | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Recon|[crawlergo](https://github.com/Qianlitp/crawlergo)|A powerful browser crawler for web vulnerability scanners|![](https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[cariddi](https://github.com/edoardottt/cariddi)|Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more|![](https://img.shields.io/github/stars/edoardottt/cariddi?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gospider](https://github.com/jaeles-project/gospider)|Gospider - Fast web spider written in Go |![](https://img.shields.io/github/stars/jaeles-project/gospider?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[hakrawler](https://github.com/hakluke/hakrawler)|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application |![](https://img.shields.io/github/stars/hakluke/hakrawler?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)|[`osint`](/categorize/tags/osint.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[katana](https://github.com/projectdiscovery/katana)|A next-generation crawling and spidering framework.|![](https://img.shields.io/github/stars/projectdiscovery/katana?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[security-crawl-maze](https://github.com/google/security-crawl-maze)|Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.|![](https://img.shields.io/github/stars/google/security-crawl-maze?label=%20)|[`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![HTML](/images/html.png)](/categorize/langs/HTML.md)| ================================================ FILE: categorize/tags/credentials.md ================================================ ## Tools for credentials | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[trufflehog](https://github.com/trufflesecurity/trufflehog)|Find and verify credentials in git repositories, filesystems, and S3 buckets|![](https://img.shields.io/github/stars/trufflesecurity/trufflehog?label=%20)|[`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/crlf.md ================================================ ## Tools for crlf | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[crlfuzz](https://github.com/dwisiswant0/crlfuzz)|A fast tool to scan CRLF vulnerability written in Go |![](https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20)|[`crlf`](/categorize/tags/crlf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/csp.md ================================================ ## Tools for csp | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[csprecon](https://github.com/edoardottt/csprecon)|Discover new target domains using Content Security Policy|![](https://img.shields.io/github/stars/edoardottt/csprecon?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[csp-auditor](https://github.com/GoSecure/csp-auditor)||![](https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20)|[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[CSP Evaluator](https://csp-evaluator.withgoogle.com)|Online CSP Evaluator from google||[`csp`](/categorize/tags/csp.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| ================================================ FILE: categorize/tags/darkmode.md ================================================ ## Tools for darkmode | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better|![](https://img.shields.io/github/stars/bebiksior/EvenBetter?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.|![](https://img.shields.io/github/stars/bebiksior/EvenBetterExtensions?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[Dark Reader](https://github.com/darkreader/darkreader)|Dark mode to any site|![](https://img.shields.io/github/stars/darkreader/darkreader?label=%20)|[`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/dependency-confusion.md ================================================ ## Tools for dependency-confusion | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[depenfusion](https://github.com/benjamin-mauss/depenfusion)|A powerful pentesting tool for detecting and exploiting dependency confusion vulnerabilities in Node.js projects|![](https://img.shields.io/github/stars/benjamin-mauss/depenfusion?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[ConfusedDotnet](https://github.com/visma-prodsec/ConfusedDotnet)|Tool to check for dependency confusion vulnerabilities in NuGet package management systems|![](https://img.shields.io/github/stars/visma-prodsec/ConfusedDotnet?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Scanner|[confused](https://github.com/visma-prodsec/confused)|Tool to check for dependency confusion vulnerabilities in multiple package management systems|![](https://img.shields.io/github/stars/visma-prodsec/confused?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[dependency-confusion-scanner](https://github.com/Yaniv-git/dependency-confusion-scanner)|This small repo is meant to scan Github's repositories for potential Dependency confusion vulnerabilities.|![](https://img.shields.io/github/stars/Yaniv-git/dependency-confusion-scanner?label=%20)|[`dependency-confusion`](/categorize/tags/dependency-confusion.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/dependency-scanning.md ================================================ ## Tools for dependency-scanning | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[osv-scanner](https://github.com/google/osv-scanner)|Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects|![](https://img.shields.io/github/stars/google/osv-scanner?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/deserialize.md ================================================ ## Tools for deserialize | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[GadgetProbe](https://github.com/BishopFox/GadgetProbe)|Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.|![](https://img.shields.io/github/stars/BishopFox/GadgetProbe?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[ysoserial.net](https://github.com/pwntester/ysoserial.net)|Deserialization payload generator for a variety of .NET formatters |![](https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C#](/images/c%23.png)](/categorize/langs/C%23.md)| |Utils|[SerializationDumper](https://github.com/NickstaDB/SerializationDumper)|A tool to dump Java serialization streams in a more human readable form.|![](https://img.shields.io/github/stars/NickstaDB/SerializationDumper?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[ysoserial](https://github.com/frohoff/ysoserial)|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. |![](https://img.shields.io/github/stars/frohoff/ysoserial?label=%20)|[`deserialize`](/categorize/tags/deserialize.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/diff.md ================================================ ## Tools for diff | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[difftastic](https://github.com/Wilfred/difftastic)|a structural diff that understands syntax|![](https://img.shields.io/github/stars/Wilfred/difftastic?label=%20)|[`diff`](/categorize/tags/diff.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| ================================================ FILE: categorize/tags/dns.md ================================================ ## Tools for dns | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[rusolver](https://github.com/Edu4rdSHL/rusolver)|Fast and accurate DNS resolver.|![](https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[zdns](https://github.com/zmap/zdns)|Fast CLI DNS Lookup Tool|![](https://img.shields.io/github/stars/zmap/zdns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|[`dns`](/categorize/tags/dns.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[dnsx](https://github.com/projectdiscovery/dnsx)|dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.|![](https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[BLUTO](https://github.com/darryllane/Bluto)|DNS Analysis Tool|![](https://img.shields.io/github/stars/darryllane/Bluto?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[dnsprobe](https://github.com/projectdiscovery/dnsprobe)|DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. |![](https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[dnsvalidator](https://github.com/vortexau/dnsvalidator)|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.|![](https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[shuffledns](https://github.com/projectdiscovery/shuffledns)|shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. |![](https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20)|[`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/documents.md ================================================ ## Tools for documents | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)|Some files for bruteforcing certain things.|![](https://img.shields.io/github/stars/random-robbie/bruteforce-lists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![CSS](/images/css.png)](/categorize/langs/CSS.md)| |Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.|![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)|[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/dom.md ================================================ ## Tools for dom | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[DOMLogger++](https://github.com/kevin-mizu/domloggerpp)|A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.|![](https://img.shields.io/github/stars/kevin-mizu/domloggerpp?label=%20)|[`dom`](/categorize/tags/dom.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/domain.md ================================================ ## Tools for domain | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[aquatone](https://github.com/michenriksen/aquatone)|A Tool for Domain Flyovers |![](https://img.shields.io/github/stars/michenriksen/aquatone?label=%20)|[`domain`](/categorize/tags/domain.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/encode.md ================================================ ## Tools for encode | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[eoyc](https://github.com/hahwul/eoyc)|Encoding Only Your Choices|![](https://img.shields.io/github/stars/hahwul/eoyc?label=%20)|[`encode`](/categorize/tags/encode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| |Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better|![](https://img.shields.io/github/stars/bebiksior/EvenBetter?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.|![](https://img.shields.io/github/stars/bebiksior/EvenBetterExtensions?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/endpoint.md ================================================ ## Tools for endpoint | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis|![](https://img.shields.io/github/stars/noir-cr/noir?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| ================================================ FILE: categorize/tags/exploit.md ================================================ ## Tools for exploit | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[commix](https://github.com/commixproject/commix)|Automated All-in-One OS Command Injection Exploitation Tool.|![](https://img.shields.io/github/stars/commixproject/commix?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[Findsploit](https://github.com/1N3/Findsploit)|Find exploits in local and online databases instantly|![](https://img.shields.io/github/stars/1N3/Findsploit?label=%20)|[`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| ================================================ FILE: categorize/tags/favicon.md ================================================ ## Tools for favicon | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[favirecon](https://github.com/edoardottt/favirecon)|Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.|![](https://img.shields.io/github/stars/edoardottt/favirecon?label=%20)|[`favicon`](/categorize/tags/favicon.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/forensics.md ================================================ ## Tools for forensics | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/fuzz.md ================================================ ## Tools for fuzz | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[SmuggleFuzz](https://github.com/Moopinger/smugglefuzz/)|A rapid HTTP downgrade smuggling scanner written in Go.|![](https://img.shields.io/github/stars/Moopinger/smugglefuzz/?label=%20)|[`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[REcollapse](https://github.com/0xacb/recollapse)|REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications|![](https://img.shields.io/github/stars/0xacb/recollapse?label=%20)|[`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/gRPC-Web.md ================================================ ## Tools for gRPC-Web | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[gRPC-Web Pentest Suite](https://github.com/nxenon/grpc-pentest-suite)|gRPC-Pentest-Suite is set of tools for pentesting / hacking gRPC Web (gRPC-Web) applications.|![](https://img.shields.io/github/stars/nxenon/grpc-pentest-suite?label=%20)|[`gRPC-Web`](/categorize/tags/gRPC-Web.md)|![burp](/images/burp.png)![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/graphql.md ================================================ ## Tools for graphql | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[graphw00f](https://github.com/dolevf/graphw00f)|GraphQL Server Engine Fingerprinting utility|![](https://img.shields.io/github/stars/dolevf/graphw00f?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[Clairvoyance](https://github.com/nikitastupin/clairvoyance)|Obtain GraphQL API schema even if the introspection is disabled|![](https://img.shields.io/github/stars/nikitastupin/clairvoyance?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[BatchQL](https://github.com/assetnote/batchql)|GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations|![](https://img.shields.io/github/stars/assetnote/batchql?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[CrackQL](https://github.com/nicholasaleks/CrackQL)|CrackQL is a GraphQL password brute-force and fuzzing utility.|![](https://img.shields.io/github/stars/nicholasaleks/CrackQL?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[GraphQLmap](https://github.com/swisskyrepo/GraphQLmap)|GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.|![](https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[graphql-voyager](https://github.com/APIs-guru/graphql-voyager)|🛰️ Represent any GraphQL API as an interactive graph |![](https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[GQLSpection](https://github.com/doyensec/GQLSpection)|parses GraphQL introspection schema and generates possible queries|![](https://img.shields.io/github/stars/doyensec/GQLSpection?label=%20)|[`graphql`](/categorize/tags/graphql.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/header.md ================================================ ## Tools for header | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[headerpwn](https://github.com/devanshbatham/headerpwn)|A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers|![](https://img.shields.io/github/stars/devanshbatham/headerpwn?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[hinject](https://github.com/dwisiswant0/hinject)|Host Header Injection Checker |![](https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[headi](https://github.com/mlcsec/headi)|Customisable and automated HTTP header injection|![](https://img.shields.io/github/stars/mlcsec/headi?label=%20)|[`header`](/categorize/tags/header.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/http.md ================================================ ## Tools for http | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Proxy|[rep](https://github.com/repplus/rep)|Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis|![](https://img.shields.io/github/stars/repplus/rep?label=%20)|[`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md)|![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[wuzz](https://github.com/asciimoo/wuzz)|Interactive cli tool for HTTP inspection |![](https://img.shields.io/github/stars/asciimoo/wuzz?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[httpie](https://github.com/httpie/httpie)|modern, user-friendly command-line HTTP client for the API era|![](https://img.shields.io/github/stars/httpie/httpie?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[hoppscotch](https://github.com/hoppscotch/hoppscotch)|Open source API development ecosystem|![](https://img.shields.io/github/stars/hoppscotch/hoppscotch?label=%20)|[`http`](/categorize/tags/http.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/infra.md ================================================ ## Tools for infra | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[axiom](https://github.com/pry0cc/axiom)|A dynamic infrastructure toolkit for red teamers and bug bounty hunters! |![](https://img.shields.io/github/stars/pry0cc/axiom?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Utils|[Redcloud](https://github.com/khast3x/Redcloud)|Automated Red Team Infrastructure deployement using Docker|![](https://img.shields.io/github/stars/khast3x/Redcloud?label=%20)|[`infra`](/categorize/tags/infra.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/ip-manipulation.md ================================================ ## Tools for ip-manipulation | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges|![](https://img.shields.io/github/stars/projectdiscovery/mapcidr?label=%20)|[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/js-analysis.md ================================================ ## Tools for js-analysis | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[xnLinkFinder](https://github.com/xnl-h4ck3r/xnLinkFinder)|A python tool used to discover endpoints (and potential parameters) for a given target|![](https://img.shields.io/github/stars/xnl-h4ck3r/xnLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[JSFScan.sh](https://github.com/KathanP19/JSFScan.sh)|Automation for javascript recon in bug bounty. |![](https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[BurpJSLinkFinder](https://github.com/InitRoot/BurpJSLinkFinder)||![](https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[burp-retire-js](https://github.com/h3xstream/burp-retire-js)||![](https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Recon|[getJS](https://github.com/003random/getJS)|A tool to fastly get all javascript sources/files|![](https://img.shields.io/github/stars/003random/getJS?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[jsluice](https://github.com/BishopFox/jsluice)|Extract URLs, paths, secrets, and other interesting bits from JavaScript|![](https://img.shields.io/github/stars/BishopFox/jsluice?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[LinkFinder](https://github.com/GerbenJavado/LinkFinder)|A python script that finds endpoints in JavaScript files |![](https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[jsprime](https://github.com/dpnishant/jsprime)|a javascript static security analysis tool|![](https://img.shields.io/github/stars/dpnishant/jsprime?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[postMessage-tracker](https://github.com/fransr/postMessage-tracker)|A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon|![](https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20)|[`js-analysis`](/categorize/tags/js-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/json.md ================================================ ## Tools for json | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[gron](https://github.com/tomnomnom/gron)|Make JSON greppable!|![](https://img.shields.io/github/stars/tomnomnom/gron?label=%20)|[`json`](/categorize/tags/json.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/jwt.md ================================================ ## Tools for jwt | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[c-jwt-cracker](https://github.com/brendan-rius/c-jwt-cracker)|JWT brute force cracker written in C |![](https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Fuzzer|[jwt-hack](https://github.com/hahwul/jwt-hack)|🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)|![](https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[jwt-cracker](https://github.com/lmammino/jwt-cracker)|Simple HS256 JWT token brute force cracker |![](https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Exploit|[jwt_tool](https://github.com/ticarpi/jwt_tool)|A toolkit for testing, tweaking and cracking JSON Web Tokens|![](https://img.shields.io/github/stars/ticarpi/jwt_tool?label=%20)|[`jwt`](/categorize/tags/jwt.md) [`authentication`](/categorize/tags/authentication.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[jsonwebtoken.github.io](https://github.com/jsonwebtoken/jsonwebtoken.github.io)|JWT En/Decode and Verify|![](https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |utils|[owasp-zap-jwt-addon](https://github.com/SasanLabs/owasp-zap-jwt-addon)||![](https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20)|[`jwt`](/categorize/tags/jwt.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/lfi.md ================================================ ## Tools for lfi | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[Liffy](https://github.com/mzfr/liffy)|Local file inclusion exploitation tool|![](https://img.shields.io/github/stars/mzfr/liffy?label=%20)|[`lfi`](/categorize/tags/lfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/live-audit.md ================================================ ## Tools for live-audit | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-Knife|[jaeles](https://github.com/jaeles-project/jaeles)|The Swiss Army knife for automated Web Application Testing |![](https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20)|[`live-audit`](/categorize/tags/live-audit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/mitmproxy.md ================================================ ## Tools for mitmproxy | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[ZAP](https://github.com/zaproxy/zaproxy)|The ZAP core project|![](https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Army-Knife|[BurpSuite](https://portswigger.net/burp)|The BurpSuite Project||[`mitmproxy`](/categorize/tags/mitmproxy.md) [`live-audit`](/categorize/tags/live-audit.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Proxy|[Glorp](https://github.com/denandz/glorp)|A CLI-based HTTP intercept and replay proxy|![](https://img.shields.io/github/stars/denandz/glorp?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[Caido](https://caido.io)|A lightweight web security auditing toolkit||[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Proxy|[proxify](https://github.com/projectdiscovery/proxify)|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay|![](https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[hetty](https://github.com/dstotijn/hetty)|Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.|![](https://img.shields.io/github/stars/dstotijn/hetty?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Proxy|[mitmproxy](https://github.com/mitmproxy/mitmproxy)|An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.|![](https://img.shields.io/github/stars/mitmproxy/mitmproxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.|![](https://img.shields.io/github/stars/bbtfr/evil-proxy?label=%20)|[`mitmproxy`](/categorize/tags/mitmproxy.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Proxy|[Echo Mirage](https://sourceforge.net/projects/echomirage.oldbutgold.p/)|A generic network proxy that uses DLL injection to capture and alter TCP traffic.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|![windows](/images/windows.png)| ================================================ FILE: categorize/tags/network-mapping.md ================================================ ## Tools for network-mapping | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[asnmap](https://github.com/projectdiscovery/asnmap)|Go CLI and Library for quickly mapping organization network ranges using ASN information|![](https://img.shields.io/github/stars/projectdiscovery/asnmap?label=%20)|[`asn`](/categorize/tags/asn.md) [`network-mapping`](/categorize/tags/network-mapping.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/network.md ================================================ ## Tools for network | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[mapcidr](https://github.com/projectdiscovery/mapcidr)|Utility program to perform multiple operations for a given subnet/CIDR ranges|![](https://img.shields.io/github/stars/projectdiscovery/mapcidr?label=%20)|[`cidr`](/categorize/tags/cidr.md) [`network`](/categorize/tags/network.md) [`ip-manipulation`](/categorize/tags/ip-manipulation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/nosqli.md ================================================ ## Tools for nosqli | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[NoSQLMap](https://github.com/codingo/NoSQLMap)|Automated NoSQL database enumeration and web application exploitation tool. |![](https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[nosqli](https://github.com/Charlie-belmer/nosqli)|NoSql Injection CLI tool|![](https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20)|[`nosqli`](/categorize/tags/nosqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/note.md ================================================ ## Tools for note | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[notebook](https://github.com/caido-community/notebook)|Notebook Caido Plugin|![](https://img.shields.io/github/stars/caido-community/notebook?label=%20)|[`note`](/categorize/tags/note.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/notify.md ================================================ ## Tools for notify | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Emissary](https://github.com/BountyStrike/Emissary)|Send notifications on different channels such as Slack, Telegram, Discord etc.|![](https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[slackcat](https://github.com/bcicen/slackcat)|CLI utility to post files and command output to slack|![](https://img.shields.io/github/stars/bcicen/slackcat?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[ob_hacky_slack](https://github.com/openbridge/ob_hacky_slack)|Hacky Slack - a bash script that sends beautiful messages to Slack|![](https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20)|[`notify`](/categorize/tags/notify.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| ================================================ FILE: categorize/tags/nuclei-templates.md ================================================ ## Tools for nuclei-templates | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[nuclei-templates](https://github.com/projectdiscovery/nuclei-templates)|Community curated list of templates for the nuclei engine to find security vulnerabilities.|![](https://img.shields.io/github/stars/projectdiscovery/nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[nuclei-wordfence-cve](https://github.com/topscoder/nuclei-wordfence-cve)|Every single day new templates are added to this repo based on updates on Wordfence.com|![](https://img.shields.io/github/stars/topscoder/nuclei-wordfence-cve?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[missing-cve-nuclei-templates](https://github.com/edoardottt/missing-cve-nuclei-templates)|Weekly updated list of missing CVEs in nuclei templates official repository|![](https://img.shields.io/github/stars/edoardottt/missing-cve-nuclei-templates?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[cent](https://github.com/xm1k3/cent)|Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.|![](https://img.shields.io/github/stars/xm1k3/cent?label=%20)|[`nuclei-templates`](/categorize/tags/nuclei-templates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/oast.md ================================================ ## Tools for oast | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[collaborator-everywhere](https://github.com/PortSwigger/collaborator-everywhere)||![](https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Utils|[dnsobserver](https://github.com/allyomalley/dnsobserver)|A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for out-of-band DNS interactions and sends lookup notifications via Slack. |![](https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20)|[`oast`](/categorize/tags/oast.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[TukTuk](https://github.com/ArturSS7/TukTuk)|Tool for catching and logging different types of requests. |![](https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[interactsh](https://github.com/projectdiscovery/interactsh)|An OOB interaction gathering server and client library|![](https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[boast](https://github.com/marcoagner/boast)|The BOAST Outpost for AppSec Testing (v0.1.0)|![](https://img.shields.io/github/stars/marcoagner/boast?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[taborator](https://github.com/hackvertor/taborator)||![](https://img.shields.io/github/stars/hackvertor/taborator?label=%20)|[`oast`](/categorize/tags/oast.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/online.md ================================================ ## Tools for online | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[DNSDumpster](https://dnsdumpster.com)| Online dns recon & research, find & lookup dns records||[`dns`](/categorize/tags/dns.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[Phoenix](https://www.hahwul.com/phoenix/)|hahwul's online tools||[`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[SequenceDiagram](https://sequencediagram.org)|Online tool for creating UML sequence diagrams||[`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| ================================================ FILE: categorize/tags/open-redirect.md ================================================ ## Tools for open-redirect | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/osint.md ================================================ ## Tools for osint | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[spiderfoot](https://github.com/smicallef/spiderfoot)|SpiderFoot automates OSINT collection so that you can focus on analysis.|![](https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[sn0int](https://github.com/kpcyrd/sn0int)|Semi-automatic OSINT framework and package manager|![](https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[bbot](https://github.com/blacklanternsecurity/bbot)|OSINT automation for hackers|![](https://img.shields.io/github/stars/blacklanternsecurity/bbot?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Shodan](https://www.shodan.io/)| World's first search engine for Internet-connected devices||[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[HostHunter](https://github.com/SpiderLabs/HostHunter)|Recon tool for discovering hostnames using OSINT techniques.|![](https://img.shields.io/github/stars/SpiderLabs/HostHunter?label=%20)|[`osint`](/categorize/tags/osint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Photon](https://github.com/s0md3v/Photon)|Incredibly fast crawler designed for OSINT. |![](https://img.shields.io/github/stars/s0md3v/Photon?label=%20)|[`osint`](/categorize/tags/osint.md) [`crawl`](/categorize/tags/crawl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/package-manager.md ================================================ ## Tools for package-manager | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[pdtm](https://github.com/projectdiscovery/pdtm)|ProjectDiscovery's Open Source Tool Manager|![](https://img.shields.io/github/stars/projectdiscovery/pdtm?label=%20)|[`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/param.md ================================================ ## Tools for param | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[HUNT](https://github.com/bugcrowd/HUNT)|Identifies common parameters vulnerable to certain vulnerability classes|![](https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)![burp](/images/burp.png)[![Kotlin](/images/kotlin.png)](/categorize/langs/Kotlin.md)| |Recon|[ParamWizard](https://github.com/iamunixtz/ParamWizard)|ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website.|![](https://img.shields.io/github/stars/iamunixtz/ParamWizard?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Parth](https://github.com/s0md3v/Parth)|Heuristic Vulnerable Parameter Scanner |![](https://img.shields.io/github/stars/s0md3v/Parth?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Dr. Watson](https://github.com/prodigysml/Dr.-Watson)|Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information|![](https://img.shields.io/github/stars/prodigysml/Dr.-Watson?label=%20)|[`param`](/categorize/tags/param.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Arjun](https://github.com/s0md3v/Arjun)|HTTP parameter discovery suite. |![](https://img.shields.io/github/stars/s0md3v/Arjun?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[ParamSpider](https://github.com/devanshbatham/ParamSpider)|Mining parameters from dark corners of Web Archives |![](https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[reflected-parameters](https://github.com/PortSwigger/reflected-parameters)||![](https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Fuzzer|[ParamPamPam](https://github.com/Bo0oM/ParamPamPam)|This tool for brute discover GET and POST parameters.|![](https://img.shields.io/github/stars/Bo0oM/ParamPamPam?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[GAP](https://github.com/xnl-h4ck3r/GAP-Burp-Extension)|This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on.|![](https://img.shields.io/github/stars/xnl-h4ck3r/GAP-Burp-Extension?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[fuzzparam](https://github.com/0xsapra/fuzzparam)|A fast go based param miner to fuzz possible parameters a URL can have.|![](https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20)|[`param`](/categorize/tags/param.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Fuzzer|[param-miner](https://github.com/PortSwigger/param-miner)|Param Miner|![](https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20)|[`param`](/categorize/tags/param.md) [`cache-vuln`](/categorize/tags/cache-vuln.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/path-traversal.md ================================================ ## Tools for path-traversal | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[dotdotpwn](https://github.com/wireghoul/dotdotpwn)|DotDotPwn - The Directory Traversal Fuzzer |![](https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20)|[`path-traversal`](/categorize/tags/path-traversal.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| ================================================ FILE: categorize/tags/payload.md ================================================ ## Tools for payload | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[reverse-shell-generator](https://github.com/0dayCTF/reverse-shell-generator)|Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)|![](https://img.shields.io/github/stars/0dayCTF/reverse-shell-generator?label=%20)|[`payload`](/categorize/tags/payload.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/pentest.md ================================================ ## Tools for pentest | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework|![](https://img.shields.io/github/stars/rapid7/metasploit-framework?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.|![](https://img.shields.io/github/stars/Sliim/pentest-env?label=%20)|[`pentest`](/categorize/tags/pentest.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| ================================================ FILE: categorize/tags/permutation.md ================================================ ## Tools for permutation | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL|![](https://img.shields.io/github/stars/projectdiscovery/alterx?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/port.md ================================================ ## Tools for port | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Silver](https://github.com/s0md3v/Silver)|Mass scan IPs for vulnerable services |![](https://img.shields.io/github/stars/s0md3v/Silver?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Smap](https://github.com/s0md3v/smap/)|a drop-in replacement for Nmap powered by shodan.io|![](https://img.shields.io/github/stars/s0md3v/smap/?label=%20)|[`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/portscan.md ================================================ ## Tools for portscan | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[naabu](https://github.com/projectdiscovery/naabu)|A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests |![](https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[masscan](https://github.com/robertdavidgraham/masscan)|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. |![](https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| |Recon|[RustScan](https://github.com/brandonskerritt/RustScan)|Faster Nmap Scanning with Rust |![](https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[nmap](https://github.com/nmap/nmap)|Nmap - the Network Mapper. Github mirror of official SVN repository. |![](https://img.shields.io/github/stars/nmap/nmap?label=%20)|[`portscan`](/categorize/tags/portscan.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![C](/images/c.png)](/categorize/langs/C.md)| ================================================ FILE: categorize/tags/prototype-pollution.md ================================================ ## Tools for prototype-pollution | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[pphack](https://github.com/edoardottt/pphack)|The Most Advanced Client-Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/edoardottt/pphack?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/prototypepollution.md ================================================ ## Tools for prototypepollution | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[ppfuzz](https://github.com/dwisiswant0/ppfuzz)|A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀|![](https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[pphack](https://github.com/edoardottt/pphack)|The Most Advanced Client-Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/edoardottt/pphack?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[PPScan](https://github.com/msrkp/PPScan)|Client Side Prototype Pollution Scanner|![](https://img.shields.io/github/stars/msrkp/PPScan?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[ppmap](https://github.com/kleiton0x00/ppmap)|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|![](https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[plution](https://github.com/raverrr/plution)|Prototype pollution scanner using headless chrome|![](https://img.shields.io/github/stars/raverrr/plution?label=%20)|[`prototypepollution`](/categorize/tags/prototypepollution.md) [`prototype-pollution`](/categorize/tags/prototype-pollution.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/race-condition.md ================================================ ## Tools for race-condition | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[h2spacex](https://github.com/nxenon/h2spacex)|HTTP/2 Single Packet Attack low level library based on Scapy|![](https://img.shields.io/github/stars/nxenon/h2spacex?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[race-the-web](https://github.com/TheHackerDev/race-the-web)|Tests for race conditions in web applications by sending out a user-specified number of requests to a target URL (or URLs) simultaneously, and then compares the responses from the server for uniqueness.|![](https://img.shields.io/github/stars/TheHackerDev/race-the-web?label=%20)|[`race-condition`](/categorize/tags/race-condition.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/recon.md ================================================ ## Tools for recon | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| ================================================ FILE: categorize/tags/repeater.md ================================================ ## Tools for repeater | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Proxy|[rep](https://github.com/repplus/rep)|Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis|![](https://img.shields.io/github/stars/repplus/rep?label=%20)|[`http`](/categorize/tags/http.md) [`repeater`](/categorize/tags/repeater.md)|![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| ================================================ FILE: categorize/tags/report.md ================================================ ## Tools for report | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[bountyplz](https://github.com/fransr/bountyplz)|Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) |![](https://img.shields.io/github/stars/fransr/bountyplz?label=%20)|[`report`](/categorize/tags/report.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| ================================================ FILE: categorize/tags/rfi.md ================================================ ## Tools for rfi | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/rop.md ================================================ ## Tools for rop | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Exploit|[ropr](https://github.com/Ben-Lichtman/ropr)|A blazing fast™ multithreaded ROP Gadget finder. ropper|![](https://img.shields.io/github/stars/Ben-Lichtman/ropr?label=%20)|[`rop`](/categorize/tags/rop.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| ================================================ FILE: categorize/tags/s3.md ================================================ ## Tools for s3 | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[AWSBucketDump](https://github.com/jordanpotti/AWSBucketDump)|Security Tool to Look For Interesting Files in S3 Buckets|![](https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[S3Scanner](https://github.com/sa7mon/S3Scanner)|Scan for open AWS S3 buckets and dump the contents |![](https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[S3cret Scanner](https://github.com/Eilonh/s3crets_scanner)|Hunting For Secrets Uploaded To Public S3 Buckets|![](https://img.shields.io/github/stars/Eilonh/s3crets_scanner?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[s3reverse](https://github.com/hahwul/s3reverse)|The format of various s3 buckets is convert in one format. for bugbounty and security testing. |![](https://img.shields.io/github/stars/hahwul/s3reverse?label=%20)|[`s3`](/categorize/tags/s3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/sast.md ================================================ ## Tools for sast | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[semgrep](https://github.com/semgrep/semgrep)|Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.|![](https://img.shields.io/github/stars/semgrep/semgrep?label=%20)|[`sast`](/categorize/tags/sast.md) [`code-analysis`](/categorize/tags/code-analysis.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/sbom.md ================================================ ## Tools for sbom | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|![](https://img.shields.io/github/stars/aquasecurity/trivy?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/secret-scanning.md ================================================ ## Tools for secret-scanning | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[trufflehog](https://github.com/trufflesecurity/trufflehog)|Find and verify credentials in git repositories, filesystems, and S3 buckets|![](https://img.shields.io/github/stars/trufflesecurity/trufflehog?label=%20)|[`secret-scanning`](/categorize/tags/secret-scanning.md) [`credentials`](/categorize/tags/credentials.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/security.md ================================================ ## Tools for security | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/smuggle.md ================================================ ## Tools for smuggle | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[SmuggleFuzz](https://github.com/Moopinger/smugglefuzz/)|A rapid HTTP downgrade smuggling scanner written in Go.|![](https://img.shields.io/github/stars/Moopinger/smugglefuzz/?label=%20)|[`smuggle`](/categorize/tags/smuggle.md) [`fuzz`](/categorize/tags/fuzz.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[ws-smuggler](https://github.com/hahwul/ws-smuggler)|WebSocket Connection Smuggler|![](https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[h2csmuggler](https://github.com/assetnote/h2csmuggler)|HTTP Request Smuggling Detection Tool|![](https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[websocket-connection-smuggler](https://github.com/hahwul/websocket-connection-smuggler)|websocket-connection-smuggler|![](https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[http-request-smuggler](https://github.com/PortSwigger/http-request-smuggler)||![](https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[smugglex](https://github.com/hahwul/smugglex)|Rust-powered HTTP Request Smuggling Scanner|![](https://img.shields.io/github/stars/hahwul/smugglex?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Scanner|[BurpSuiteHTTPSmuggler](https://github.com/nccgroup/BurpSuiteHTTPSmuggler)||![](https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[smuggler](https://github.com/defparam/smuggler)|Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 |![](https://img.shields.io/github/stars/defparam/smuggler?label=%20)|[`smuggle`](/categorize/tags/smuggle.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/social-engineering.md ================================================ ## Tools for social-engineering | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/sqli.md ================================================ ## Tools for sqli | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[sqlmap](https://github.com/sqlmapproject/sqlmap)|Automatic SQL injection and database takeover tool|![](https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DSSS](https://github.com/stamparm/DSSS)|Damn Small SQLi Scanner|![](https://img.shields.io/github/stars/stamparm/DSSS?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[sqliv](https://github.com/the-robot/sqliv)|massive SQL injection vulnerability scanner|![](https://img.shields.io/github/stars/the-robot/sqliv?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[SQLiDetector](https://github.com/eslam3kl/SQLiDetector)|Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.|![](https://img.shields.io/github/stars/eslam3kl/SQLiDetector?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[ghauri](https://github.com/r0oth3x49/ghauri)|An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws|![](https://img.shields.io/github/stars/r0oth3x49/ghauri?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[SQLNinja](https://gitlab.com/kalilinux/packages/sqlninja)|Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities.||[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Perl](/images/perl.png)](/categorize/langs/Perl.md)| |Utils|[Atlas](https://github.com/m4ll0k/Atlas)|Quick SQLMap Tamper Suggester |![](https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20)|[`sqli`](/categorize/tags/sqli.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/ssl.md ================================================ ## Tools for ssl | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection|![](https://img.shields.io/github/stars/projectdiscovery/tlsx?label=%20)|[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[DeepViolet](https://github.com/spoofzu/DeepViolet)|Tool for introspection of SSL\TLS sessions|![](https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Scanner|[testssl.sh](https://github.com/drwetter/testssl.sh)|Testing TLS/SSL encryption anywhere on any port |![](https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[a2sv](https://github.com/hahwul/a2sv)|Auto Scanning to SSL Vulnerability |![](https://img.shields.io/github/stars/hahwul/a2sv?label=%20)|[`ssl`](/categorize/tags/ssl.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/ssrf.md ================================================ ## Tools for ssrf | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[SSRFmap](https://github.com/swisskyrepo/SSRFmap)|Automatic SSRF fuzzer and exploitation tool |![](https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Fuzzer|[SSRFire](https://github.com/ksharinarayanan/SSRFire)|An automated SSRF finder. Just give the domain name and your server and chill|![](https://img.shields.io/github/stars/ksharinarayanan/SSRFire?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[ssrf-sheriff](https://github.com/teknogeek/ssrf-sheriff)|A simple SSRF-testing sheriff written in Go |![](https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Exploit|[Gopherus](https://github.com/tarunkant/Gopherus)|This tool generates gopher link for exploiting SSRF and gaining RCE in various servers |![](https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20)|[`ssrf`](/categorize/tags/ssrf.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[EvenBetter](https://github.com/bebiksior/EvenBetter)|EvenBetter is a frontend Caido plugin that makes the Caido experience even better|![](https://img.shields.io/github/stars/bebiksior/EvenBetter?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[EvenBetterExtensions](https://github.com/bebiksior/EvenBetterExtensions)|EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.|![](https://img.shields.io/github/stars/bebiksior/EvenBetterExtensions?label=%20)|[`encode`](/categorize/tags/encode.md) [`ssrf`](/categorize/tags/ssrf.md) [`darkmode`](/categorize/tags/darkmode.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| ================================================ FILE: categorize/tags/ssti.md ================================================ ## Tools for ssti | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Fuzzer|[SSTImap](https://github.com/vladko312/SSTImap)|Automatic SSTI detection tool with interactive interface|![](https://img.shields.io/github/stars/vladko312/SSTImap?label=%20)|[`ssti`](/categorize/tags/ssti.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/steganography.md ================================================ ## Tools for steganography | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Army-knife|[Baudrillard Suite](https://github.com/bad-antics/baudrillard-suite)|Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling.|![](https://img.shields.io/github/stars/bad-antics/baudrillard-suite?label=%20)|[`osint`](/categorize/tags/osint.md) [`recon`](/categorize/tags/recon.md) [`forensics`](/categorize/tags/forensics.md) [`social-engineering`](/categorize/tags/social-engineering.md) [`steganography`](/categorize/tags/steganography.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/subdomains.md ================================================ ## Tools for subdomains | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[puredns](https://github.com/d3mondev/puredns)|Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.|![](https://img.shields.io/github/stars/d3mondev/puredns?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subs_all](https://github.com/emadshanab/subs_all)|Subdomain Enumeration Wordlist. 8956437 unique words. Updated. |![](https://img.shields.io/github/stars/emadshanab/subs_all?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[Sudomy](https://github.com/screetsec/Sudomy)|subdomain enumeration tool to collect subdomains and analyzing domains|![](https://img.shields.io/github/stars/screetsec/Sudomy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Recon|[scilla](https://github.com/edoardottt/scilla)|🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration|![](https://img.shields.io/github/stars/edoardottt/scilla?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`dns`](/categorize/tags/dns.md) [`port`](/categorize/tags/port.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Dr. Watson](https://github.com/prodigysml/Dr.-Watson)|Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information|![](https://img.shields.io/github/stars/prodigysml/Dr.-Watson?label=%20)|[`param`](/categorize/tags/param.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[CT_subdomains](https://github.com/internetwache/CT_subdomains)|An hourly updated list of subdomains gathered from certificate transparency logs |![](https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[shosubgo](https://github.com/incogbyte/shosubgo)|Small tool to Grab subdomains using Shodan api.|![](https://img.shields.io/github/stars/incogbyte/shosubgo?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[altdns](https://github.com/infosec-au/altdns)|Generates permutations, alterations and mutations of subdomains and then resolves them |![](https://img.shields.io/github/stars/infosec-au/altdns?label=%20)|[`dns`](/categorize/tags/dns.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[gobuster](https://github.com/OJ/gobuster)|Directory/File, DNS and VHost busting tool written in Go |![](https://img.shields.io/github/stars/OJ/gobuster?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Sub404](https://github.com/r3curs1v3-pr0xy/sub404)|A python tool to check subdomain takeover vulnerability|![](https://img.shields.io/github/stars/r3curs1v3-pr0xy/sub404?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[knock](https://github.com/guelfoweb/knock)|Knock Subdomain Scan |![](https://img.shields.io/github/stars/guelfoweb/knock?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[Sublist3r](https://github.com/aboul3la/Sublist3r)|Fast subdomains enumeration tool for penetration testers |![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[dmut](https://github.com/bp0lr/dmut)|A tool to perform permutations, mutations and alteration of subdomains in golang.|![](https://img.shields.io/github/stars/bp0lr/dmut?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[assetfinder](https://github.com/tomnomnom/assetfinder)|Find domains and subdomains related to a given domain |![](https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[github-subdomains](https://github.com/gwen001/github-subdomains)|Find subdomains on GitHub|![](https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Amass](https://github.com/OWASP/Amass)|In-depth Attack Surface Mapping and Asset Discovery |![](https://img.shields.io/github/stars/OWASP/Amass?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SubBrute](https://github.com/aboul3la/Sublist3r)|https://github.com/TheRook/subbrute|![](https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[subgen](https://github.com/pry0cc/subgen)|A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!|![](https://img.shields.io/github/stars/pry0cc/subgen?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subfinder](https://github.com/projectdiscovery/subfinder)|Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. |![](https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[Lepus](https://github.com/gfek/Lepus)|Subdomain finder|![](https://img.shields.io/github/stars/gfek/Lepus?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SecurityTrails](https://securitytrails.com)| Online dns / subdomain / recon tool||[`subdomains`](/categorize/tags/subdomains.md) [`online`](/categorize/tags/online.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)|[`url`](/categorize/tags/url.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL|![](https://img.shields.io/github/stars/projectdiscovery/alterx?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[findomain](https://github.com/Edu4rdSHL/findomain)|The fastest and cross-platform subdomain enumerator, do not waste your time. |![](https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Utils|[dsieve](https://github.com/trickest/dsieve)|Filter and enrich a list of subdomains by level|![](https://img.shields.io/github/stars/trickest/dsieve?label=%20)|[`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/takeover.md ================================================ ## Tools for takeover | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[Sub404](https://github.com/r3curs1v3-pr0xy/sub404)|A python tool to check subdomain takeover vulnerability|![](https://img.shields.io/github/stars/r3curs1v3-pr0xy/sub404?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[SubOver](https://github.com/Ice3man543/SubOver)|A Powerful Subdomain Takeover Tool|![](https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subzy](https://github.com/LukaSikic/subzy)|Subdomain takeover vulnerability checker|![](https://img.shields.io/github/stars/LukaSikic/subzy?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjack](https://github.com/haccer/subjack)|Subdomain Takeover tool written in Go |![](https://img.shields.io/github/stars/haccer/subjack?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`takeover`](/categorize/tags/takeover.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/terraform.md ================================================ ## Tools for terraform | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[cloud-audit](https://github.com/gebalamariusz/cloud-audit)|Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection|![](https://img.shields.io/github/stars/gebalamariusz/cloud-audit?label=%20)|[`aws`](/categorize/tags/aws.md) [`cloud`](/categorize/tags/cloud.md) [`security`](/categorize/tags/security.md) [`terraform`](/categorize/tags/terraform.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/tls.md ================================================ ## Tools for tls | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[tlsx](https://github.com/projectdiscovery/tlsx)|Fast and configurable TLS grabber focused on TLS based data collection|![](https://img.shields.io/github/stars/projectdiscovery/tlsx?label=%20)|[`ssl`](/categorize/tags/ssl.md) [`tls`](/categorize/tags/tls.md) [`certificates`](/categorize/tags/certificates.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/tools-management.md ================================================ ## Tools for tools-management | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[pdtm](https://github.com/projectdiscovery/pdtm)|ProjectDiscovery's Open Source Tool Manager|![](https://img.shields.io/github/stars/projectdiscovery/pdtm?label=%20)|[`package-manager`](/categorize/tags/package-manager.md) [`tools-management`](/categorize/tags/tools-management.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/url.md ================================================ ## Tools for url | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[apkleaks](https://github.com/dwisiswant0/apkleaks)|Scanning APK file for URIs, endpoints & secrets. |![](https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20)|[`apk`](/categorize/tags/apk.md) [`url`](/categorize/tags/url.md) [`endpoint`](/categorize/tags/endpoint.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[waybackurls](https://github.com/tomnomnom/waybackurls)|Fetch all the URLs that the Wayback Machine knows about for a domain |![](https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[attack-surface-detector-burp](https://github.com/secdec/attack-surface-detector-burp)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[gauplus](https://github.com/bp0lr/gauplus)|A modified version of gau for personal usage. Support workers, proxies and some extra things.|![](https://img.shields.io/github/stars/bp0lr/gauplus?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[waymore](https://github.com/xnl-h4ck3r/waymore)|Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!|![](https://img.shields.io/github/stars/xnl-h4ck3r/waymore?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[attack-surface-detector-zap](https://github.com/secdec/attack-surface-detector-zap)|The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters|![](https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![zap](/images/zap.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| |Recon|[urx](https://github.com/hahwul/urx)|Extracts URLs from OSINT Archives for Security Insights|![](https://img.shields.io/github/stars/hahwul/urx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Rust](/images/rust.png)](/categorize/langs/Rust.md)| |Recon|[httpx](https://github.com/projectdiscovery/httpx)|httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. |![](https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[noir](https://github.com/noir-cr/noir)|Attack surface detector that identifies endpoints by static analysis|![](https://img.shields.io/github/stars/noir-cr/noir?label=%20)|[`endpoint`](/categorize/tags/endpoint.md) [`url`](/categorize/tags/url.md) [`attack-surface`](/categorize/tags/attack-surface.md)|![linux](/images/linux.png)![macos](/images/apple.png)[![Crystal](/images/crystal.png)](/categorize/langs/Crystal.md)| |Recon|[goverview](https://github.com/j3ssie/goverview)|goverview - Get an overview of the list of URLs|![](https://img.shields.io/github/stars/j3ssie/goverview?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[xurlfind3r](https://github.com/hueristiq/xurlfind3r)|A command-line utility designed to discover URLs for a given domain in a simple, efficient way.|![](https://img.shields.io/github/stars/hueristiq/xurlfind3r?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[uro](https://github.com/s0md3v/uro)|declutters url lists for crawling/pentesting|![](https://img.shields.io/github/stars/s0md3v/uro?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Recon|[urlhunter](https://github.com/utkusen/urlhunter)|a recon tool that allows searching on URLs that are exposed via shortener services|![](https://img.shields.io/github/stars/utkusen/urlhunter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[subjs](https://github.com/lc/subjs)|Fetches javascript file from a list of URLS or subdomains.|![](https://img.shields.io/github/stars/lc/subjs?label=%20)|[`url`](/categorize/tags/url.md) [`subdomains`](/categorize/tags/subdomains.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[gau](https://github.com/lc/gau)|Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.|![](https://img.shields.io/github/stars/lc/gau?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Recon|[cc.py](https://github.com/si9int/cc.py)|Extracting URLs of a specific target based on the results of "commoncrawl.org" |![](https://img.shields.io/github/stars/si9int/cc.py?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[urlprobe](https://github.com/1ndianl33t/urlprobe)|Urls status code & content length checker |![](https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[fff](https://github.com/tomnomnom/fff)|The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.|![](https://img.shields.io/github/stars/tomnomnom/fff?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[urlgrab](https://github.com/IAmStoxe/urlgrab)|A golang utility to spider through a website searching for additional links. |![](https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[burl](https://github.com/tomnomnom/burl)|A Broken-URL Checker |![](https://img.shields.io/github/stars/tomnomnom/burl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[godeclutter](https://github.com/c3l3si4n/godeclutter)|Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.|![](https://img.shields.io/github/stars/c3l3si4n/godeclutter?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[unfurl](https://github.com/tomnomnom/unfurl)|Pull out bits of URLs provided on stdin |![](https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20)|[`url`](/categorize/tags/url.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| ================================================ FILE: categorize/tags/vulnerability-scanner.md ================================================ ## Tools for vulnerability-scanner | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[osv-scanner](https://github.com/google/osv-scanner)|Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects|![](https://img.shields.io/github/stars/google/osv-scanner?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`dependency-scanning`](/categorize/tags/dependency-scanning.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[trivy](https://github.com/aquasecurity/trivy)|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|![](https://img.shields.io/github/stars/aquasecurity/trivy?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`container-security`](/categorize/tags/container-security.md) [`sbom`](/categorize/tags/sbom.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[CMSmap](https://github.com/dionach/CMSmap)|CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.|![](https://img.shields.io/github/stars/dionach/CMSmap?label=%20)|[`web-scanner`](/categorize/tags/web-scanner.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[wapiti](https://github.com/wapiti-scanner/wapiti)|Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications.|![](https://img.shields.io/github/stars/wapiti-scanner/wapiti?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`web-scanner`](/categorize/tags/web-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/web-scanner.md ================================================ ## Tools for web-scanner | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[CMSmap](https://github.com/dionach/CMSmap)|CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.|![](https://img.shields.io/github/stars/dionach/CMSmap?label=%20)|[`web-scanner`](/categorize/tags/web-scanner.md) [`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[wapiti](https://github.com/wapiti-scanner/wapiti)|Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications.|![](https://img.shields.io/github/stars/wapiti-scanner/wapiti?label=%20)|[`vulnerability-scanner`](/categorize/tags/vulnerability-scanner.md) [`web-scanner`](/categorize/tags/web-scanner.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/web3.md ================================================ ## Tools for web3 | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[Web3 Decoder](https://github.com/nccgroup/web3-decoder)|Burp Extension for Web3|![](https://img.shields.io/github/stars/nccgroup/web3-decoder?label=%20)|[`web3`](/categorize/tags/web3.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![burp](/images/burp.png)[![Java](/images/java.png)](/categorize/langs/Java.md)| ================================================ FILE: categorize/tags/wordlist.md ================================================ ## Tools for wordlist | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Recon|[alterx](https://github.com/projectdiscovery/alterx)|Fast and customizable subdomain wordlist generator using DSL|![](https://img.shields.io/github/stars/projectdiscovery/alterx?label=%20)|[`subdomains`](/categorize/tags/subdomains.md) [`wordlist`](/categorize/tags/wordlist.md) [`permutation`](/categorize/tags/permutation.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[bruteforce-lists](https://github.com/random-robbie/bruteforce-lists)|Some files for bruteforcing certain things.|![](https://img.shields.io/github/stars/random-robbie/bruteforce-lists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| |Utils|[Assetnote Wordlists](https://github.com/assetnote/wordlists)|Automated & Manual Wordlists provided by Assetnote|![](https://img.shields.io/github/stars/assetnote/wordlists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![CSS](/images/css.png)](/categorize/langs/CSS.md)| |Utils|[SecLists](https://github.com/danielmiessler/SecLists)|SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.|![](https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20)|[`wordlist`](/categorize/tags/wordlist.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Txt](/images/txt.png)](/categorize/langs/Txt.md)| ================================================ FILE: categorize/tags/xss.md ================================================ ## Tools for xss | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Scanner|[PwnXSS](https://github.com/pwn0sec/PwnXSS)|Vulnerability (XSS) scanner exploit|![](https://img.shields.io/github/stars/pwn0sec/PwnXSS?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[V3n0M-Scanner](https://github.com/v3n0m-Scanner/V3n0M-Scanner)|Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns|![](https://img.shields.io/github/stars/v3n0m-Scanner/V3n0M-Scanner?label=%20)|[`sqli`](/categorize/tags/sqli.md) [`xss`](/categorize/tags/xss.md) [`lfi`](/categorize/tags/lfi.md) [`rfi`](/categorize/tags/rfi.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[Chromium-based-XSS-Taint-Tracking](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking)|Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.|![](https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Scanner|[LOXS](https://github.com/coffinxp/loxs)|best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect|![](https://img.shields.io/github/stars/coffinxp/loxs?label=%20)|[`xss`](/categorize/tags/xss.md) [`sqli`](/categorize/tags/sqli.md) [`crlf`](/categorize/tags/crlf.md) [`lfi`](/categorize/tags/lfi.md) [`open-redirect`](/categorize/tags/open-redirect.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XSpear](https://github.com/hahwul/XSpear)|Powerfull XSS Scanning and Parameter analysis tool&gem |![](https://img.shields.io/github/stars/hahwul/XSpear?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Scanner|[NoXss](https://github.com/lwzSoviet/)|Faster xss scanner,support reflected-xss and dom-xss|![](https://img.shields.io/github/stars/lwzSoviet/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[XSStrike](https://github.com/s0md3v/XSStrike)|Most advanced XSS scanner. |![](https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsssniper](https://github.com/gbrindisi/xsssniper)|An automatic XSS discovery tool|![](https://img.shields.io/github/stars/gbrindisi/xsssniper?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[DOMPurify](https://github.com/cure53/DOMPurify)|DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:|![](https://img.shields.io/github/stars/cure53/DOMPurify?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[dalfox](https://github.com/hahwul/dalfox)|🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.|![](https://img.shields.io/github/stars/hahwul/dalfox?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Scanner|[xsser](https://github.com/epsylon/xsser)|Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. |![](https://img.shields.io/github/stars/epsylon/xsser?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[domdig](https://github.com/fcavallarin/domdig)|DOM XSS scanner for Single Page Applications |![](https://img.shields.io/github/stars/fcavallarin/domdig?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Scanner|[findom-xss](https://github.com/dwisiswant0/findom-xss)|A fast DOM based XSS vulnerability scanner with simplicity. |![](https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Shell](/images/shell.png)](/categorize/langs/Shell.md)| |Scanner|[XssPy](https://github.com/faizann24/)|Web Application XSS Scanner|![](https://img.shields.io/github/stars/faizann24/?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Scanner|[xsscrapy](https://github.com/DanMcInerney/xsscrapy)|XSS/SQLi spider. Give it a URL and it'll test every link it finds for XSS and some SQLi. |![](https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[toxssin](https://github.com/t3l3machus/toxssin)|An XSS exploitation command-line interface and payload generator.|![](https://img.shields.io/github/stars/t3l3machus/toxssin?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Exploit|[beef](https://github.com/beefproject/beef)|The Browser Exploitation Framework Project|![](https://img.shields.io/github/stars/beefproject/beef?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[eval_villain](https://github.com/swoops/eval_villain)|A Firefox Web Extension to improve the discovery of DOM XSS.|![](https://img.shields.io/github/stars/swoops/eval_villain?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![zap](/images/zap.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[jsfuck](https://github.com/aemkei/jsfuck)|Write any JavaScript with 6 Characters|![](https://img.shields.io/github/stars/aemkei/jsfuck?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS|![](https://img.shields.io/github/stars/hahwul/hbxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Utils|[gxss](https://github.com/rverton/gxss)|Blind XSS service alerting over slack or email|![](https://img.shields.io/github/stars/rverton/gxss?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[weaponised-XSS-payloads](https://github.com/hakluke/weaponised-XSS-payloads)|XSS payloads designed to turn alert(1) into P1|![](https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20)|[`xss`](/categorize/tags/xss.md) [`documents`](/categorize/tags/documents.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[blistener](https://github.com/fyxme/blistener)|Blind-XSS listener with payloads|![](https://img.shields.io/github/stars/fyxme/blistener?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Go](/images/go.png)](/categorize/langs/Go.md)| |Utils|[DOMLogger++](https://github.com/kevin-mizu/domloggerpp)|A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.|![](https://img.shields.io/github/stars/kevin-mizu/domloggerpp?label=%20)|[`dom`](/categorize/tags/dom.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![firefox](/images/firefox.png)![chrome](/images/chrome.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xssor2](https://github.com/evilcos/xssor2)|XSS'OR - Hack with JavaScript.|![](https://img.shields.io/github/stars/evilcos/xssor2?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xless](https://github.com/mazen160/xless)|The Serverless Blind XSS App|![](https://img.shields.io/github/stars/mazen160/xless?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![JavaScript](/images/javascript.png)](/categorize/langs/JavaScript.md)| |Utils|[xss-cheatsheet-data](https://github.com/PortSwigger/xss-cheatsheet-data)|This repository contains all the XSS cheatsheet data to allow contributions from the community. |![](https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)| |Utils|[CaidoReflector](https://github.com/bebiksior/CaidoReflector)|Automatically look for paramater reflections in the HTTP response|![](https://img.shields.io/github/stars/bebiksior/CaidoReflector?label=%20)|[`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)![caido](/images/caido.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[XSS-Catcher](https://github.com/daxAKAhackerman/XSS-Catcher)|Find blind XSS but why not gather data while you're at it.|![](https://img.shields.io/github/stars/daxAKAhackerman/XSS-Catcher?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[ezXSS](https://github.com/ssl/ezXSS)|ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. |![](https://img.shields.io/github/stars/ssl/ezXSS?label=%20)|[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![PHP](/images/php.png)](/categorize/langs/PHP.md)| ================================================ FILE: categorize/tags/xxe.md ================================================ ## Tools for xxe | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|![](https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Ruby](/images/ruby.png)](/categorize/langs/Ruby.md)| |Exploit|[XXExploiter](https://github.com/luisfontes19/xxexploiter)|Tool to help exploit XXE vulnerabilities|![](https://img.shields.io/github/stars/luisfontes19/xxexploiter?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![TypeScript](/images/typescript.png)](/categorize/langs/TypeScript.md)| |Utils|[docem](https://github.com/whitel1st/docem)|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)|![](https://img.shields.io/github/stars/whitel1st/docem?label=%20)|[`xxe`](/categorize/tags/xxe.md) [`xss`](/categorize/tags/xss.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[230-OOB](https://github.com/lc/230-OOB)|An Out-of-Band XXE server for retrieving file contents over FTP.|![](https://img.shields.io/github/stars/lc/230-OOB?label=%20)|[`xxe`](/categorize/tags/xxe.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: categorize/tags/zipbomb.md ================================================ ## Tools for zipbomb | Type | Name | Description | Star | Tags | Badges | | --- | --- | --- | --- | --- | --- | |Utils|[zip-bomb](https://github.com/damianrusinek/zip-bomb)|Create a ZIPBomb for a given uncompressed size (flat and nested modes).|![](https://img.shields.io/github/stars/damianrusinek/zip-bomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| |Utils|[ZipBomb](https://github.com/abdulfatir/ZipBomb)|A simple implementation of ZipBomb in Python|![](https://img.shields.io/github/stars/abdulfatir/ZipBomb?label=%20)|[`zipbomb`](/categorize/tags/zipbomb.md)|![linux](/images/linux.png)![macos](/images/apple.png)![windows](/images/windows.png)[![Python](/images/python.png)](/categorize/langs/Python.md)| ================================================ FILE: scripts/erb.rb ================================================ require 'erb' require 'yaml' def generate_badge array badge = "" array.each { |t| case t when 'linux' badge = badge + "![linux](/images/linux.png)" when 'windows' badge = badge + "![windows](/images/windows.png)" when 'macos' badge = badge + "![macos](/images/apple.png)" when 'firefox' badge = badge + "![firefox](/images/firefox.png)" when 'safari' badge = badge + "![safari](/images/safari.png)" when 'chrome' badge = badge + "![chrome](/images/chrome.png)" when 'burpsuite' badge = badge + "![burp](/images/burp.png)" when 'caido' badge = badge + "![caido](/images/caido.png)" when 'zap' badge = badge + "![zap](/images/zap.png)" end } return badge end def generate_tags array tags = "" array.each { |t| tags = tags + "`#{t}` " } return tags end categorize_template_tags = %q{ ## Tools for <%= @ct_tag %> <%= @ct_head %> <%= @ct_data %> }.gsub(/^ /, '') categorize_template_langs = %q{ ## Tools Made of <%= @ct_lang %> <%= @ct_head %> <%= @ct_data %> }.gsub(/^ /, '') template = %q{
WebHackersWeapons Logo

A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting!

## Family project [![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) [![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) ## Table of Contents - [Weapons](#weapons) - [Tools](#tools) - [Bookmarklets](#bookmarklets) - [Browser Addons](#browser-addons) - [Burpsuite, Caido and ZAP Addons](#burpsuite-caido-and-zap-addons) - [Contribute](CONTRIBUTING.md) - [Thanks to contributor](#thanks-to-contributor) ## Weapons *Attributes* | | Attributes | |-------|---------------------------------------------------| | Types | `Army-Knife` `Proxy` `Recon` `Fuzzer` `Scanner` `Exploit` `Env` `Utils` `Etc`| | Tags | <%= tags.uniq.join ' ' %> | | Langs | <%= langs.uniq.join ' ' %> | ### Tools <%= tools %> ### Bookmarklets <%= bookmarklets %> ### Browser Addons <%= browser_addons %> ### Burpsuite, Caido and ZAP Addons <%= tool_addons %> ## Thanks to (Contributor) WHW's open-source project and made it with ❤️ if you want contribute this project, please see [CONTRIBUTING.md](https://github.com/hahwul/WebHackersWeapons/blob/main/CONTRIBUTING.md) and Pull-Request with cool your contents. [![](/images/CONTRIBUTORS.svg)](https://github.com/hahwul/WebHackersWeapons/graphs/contributors) }.gsub(/^ /, '') tags = [] langs = [] categorize_tags = {} categorize_langs = {} head = "| Type | Name | Description | Star | Tags | Badges |\n" head = head + "| --- | --- | --- | --- | --- | --- |" tools = head + "\n" bookmarklets = head + "\n" browser_addons = head + "\n" tool_addons = head + "\n" weapons = [] weapons_obj = { "army-knife" => [], "proxy" => [], "recon"=> [], "fuzzer"=> [], "scanner"=> [], "exploit"=> [], "utils"=> [], "etc"=> [] } Dir.entries("./weapons/").each do | name | if name != '.' && name != '..' begin data = YAML.load(File.open("./weapons/#{name}")) if data['type'] != "" && data['type'] != nil if weapons_obj[data['type'].downcase] != nil weapons_obj[data['type'].downcase].push data else weapons_obj[data['type'].downcase] = [] weapons_obj[data['type'].downcase].push data end else weapons_obj['etc'].push data end rescue => e puts e end end end weapons_obj.each do |key,value| weapons.concat value end weapons.each do | data | begin name = data['name'] temp_tags = [] begin data['tags'].each do |t| temp_tags.push "[`#{t}`](/categorize/tags/#{t}.md)" end tags.concat temp_tags rescue end lang_badge = "" begin if data['lang'].length > 0 && data['lang'] != "null" langs.push "[`#{data['lang']}`](/categorize/langs/#{data['lang'].gsub('#','%23')}.md)" lang_badge = "[![#{data['lang']}](/images/#{data['lang'].downcase.gsub('#','%23')}.png)](/categorize/langs/#{data['lang'].gsub('#','%23')}.md)" end rescue end popularity = "" if data['url'].length > 0 name = "[#{name}](#{data['url']})" end if data['url'].include? "github.com" split_result = data['url'].split "//github.com/" popularity = "![](https://img.shields.io/github/stars/#{split_result[1]}?label=%20)" end badge = generate_badge(data['platform']) line = "|#{data['type']}|#{name}|#{data['description']}|#{popularity}|#{temp_tags.join ' '}|#{badge}#{lang_badge}|" case data['category'].downcase when 'tool' tools = tools + line + "\n" when 'tool-addon' tool_addons = tool_addons + line + "\n" when 'browser-addon' browser_addons = browser_addons + line + "\n" when 'bookmarklet' bookmarklets = bookmarklets + line + "\n" else puts name end tmp_lang = data['lang'] tmp_tags = data['tags'] if tmp_tags != nil tmp_tags.each do |t| if categorize_tags[t] == nil categorize_tags[t] = line + "\n" else categorize_tags[t] = categorize_tags[t] + line + "\n" end end end if tmp_lang != nil if categorize_langs[tmp_lang] == nil categorize_langs[tmp_lang] = line + "\n" else categorize_langs[tmp_lang] = categorize_langs[tmp_lang] + line + "\n" end end rescue => e puts e end end markdown = ERB.new(template, trim_mode: "%<>") #puts markdown.result File.write './README.md', markdown.result categorize_tags.each do |key,value| if key != nil && key != "" @ct_tag = key @ct_head = head + "\n" @ct_data = value tag_markdown = ERB.new(categorize_template_tags, trim_mode: "%<>") File.write "./categorize/tags/#{@ct_tag}.md", tag_markdown.result end end categorize_langs.each do |key,value| if key != nil && key != "" @ct_lang = key @ct_head = head + "\n" @ct_data = value lang_markdown = ERB.new(categorize_template_langs, trim_mode: "%<>") File.write "./categorize/langs/#{@ct_lang}.md", lang_markdown.result end end ================================================ FILE: scripts/for_migration/apply_platform.rb ================================================ require 'yaml' Dir.entries("./weapons").each do | name | if name.strip != "." || name != ".." begin data = YAML.load(File.open("./weapons/#{name}")) data['platform'] = ['linux','macos','windows'] yaml_data = YAML.dump(data) File.write("./weapons/#{name}", yaml_data) rescue => e puts e end end end ================================================ FILE: scripts/for_migration/fetch_lang.rb ================================================ # https://api.github.com/repos/hahwul/dalfox/languages # # require 'yaml' langs = [] Dir.entries("./weapons").each do | name | if name.strip != "." || name != ".." begin data = YAML.load(File.open("./weapons/#{name}")) if data['url'].include? "//github.com" t = data['url'].split("/") lang = `curl -s https://api.github.com/repos/#{t[3]}/#{t[4]}/languages | jq 'to_entries | max_by(.value) | .key'` lang_str = lang.gsub("\"","").gsub("\n","") if lang_str != "documentation_url" puts "hit #{name}" data['lang'] = lang_str yaml_data = YAML.dump(data) File.write("./weapons/#{name}", yaml_data) langs.push lang_str else puts "denied #{name}" end sleep(90) end rescue => e puts e end end end puts langs.uniq ================================================ FILE: scripts/for_migration/migration.rb ================================================ require 'json' require 'yaml' require "uri" def get_os install lst = [] if install['Linux'].length > 1 lst.push 'linux' end if install['MacOS'].length > 1 lst.push 'macos' end if install['Windows'].length > 1 lst.push 'windows' end return lst end def get_browser str lst = [] if str.include? 'Chrome' lst.push 'chrome' end if str.include? 'Firefox' lst.push 'firefox' end if str.include? 'Safari' lst.push 'safari' end if str.include? 'Burp' lst.push 'burpsuite' end if str.include? 'ZAP' lst.push 'zap' end if str.include? 'All' lst.push 'burpsuite' lst.push 'zap' end return lst end def get_url str urls = URI.extract(str).uniq urls.each do |url| if !url.include? "img.shields.io" return url.gsub(")","") end end return "" end def get_lang url if url.include? "https://github.com" end end def migrate jsonfile, category file = File.read(jsonfile) data_hash = JSON.parse(file) data_hash.each do | name, obj | filename = name.gsub(' ','_')+".yaml" # Make object new_obj = {} new_obj['name'] = name new_obj['description'] = obj['Description'] new_obj['url'] = get_url obj['Data'] new_obj['category'] = category new_obj['types'] = [] if obj['Install'] != nil new_obj['platform'] = get_os(obj['Install']) end if category.include? 'addon' if obj['Type'].length > 0 new_obj['platform'] = get_browser(obj['Type']) end end new_obj['lang'] = [] # parse DATA new_obj['tags'] = [] # Convert to YAML yaml_data = YAML.dump(new_obj) # Save yaml file puts filename File.write("./weapons/#{filename}", yaml_data) end end migrate './data.json', 'tool' migrate './Bookmarklets/data.json', 'bookmarklet' migrate './Browser Extensions/data.json', 'browser-addon' migrate './Burp and ZAP Extensions/data.json', 'tool-addon' ================================================ FILE: scripts/last_change ================================================ Fri Mar 20 11:27:24 UTC 2026 ================================================ FILE: scripts/validate_weapons.rb ================================================ require 'yaml' Dir.entries("./weapons").each do | name | if name.strip != "." || name != ".." begin data = YAML.load(File.open("./weapons/#{name}")) if data['type'] == "" || data['type'] == nil puts "./weapons/#{name} :: none-type" end if data['lang'] == "" || data['lang'] == nil || data['lang'].length == 0 if data['url'].include? "github.com" puts "./weapons/#{name} :: none-lang" end end if data['tags'].length == 0 || data['tags'] == nil #puts "#{name} :: none-tags" end rescue => e puts e end end end ================================================ FILE: weapons/230-OOB.yaml ================================================ --- name: 230-OOB description: An Out-of-Band XXE server for retrieving file contents over FTP. url: https://github.com/lc/230-OOB category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [xxe] ================================================ FILE: weapons/3klCon.yaml ================================================ --- name: 3klCon description: Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files. url: https://github.com/eslam3kl/3klCon category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/AWSBucketDump.yaml ================================================ --- name: AWSBucketDump description: Security Tool to Look For Interesting Files in S3 Buckets url: https://github.com/jordanpotti/AWSBucketDump category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [s3] ================================================ FILE: weapons/AWSSigner.yaml ================================================ --- name: AWSSigner description: Burp Extension for AWS Signing url: https://github.com/NetSPI/AWSSigner category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/Amass.yaml ================================================ --- name: Amass description: 'In-depth Attack Surface Mapping and Asset Discovery ' url: https://github.com/OWASP/Amass category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/Arjun.yaml ================================================ --- name: Arjun description: 'HTTP parameter discovery suite. ' url: https://github.com/s0md3v/Arjun category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [param] ================================================ FILE: weapons/Assetnote_Wordlists.yaml ================================================ --- name: Assetnote Wordlists description: Automated & Manual Wordlists provided by Assetnote url: https://github.com/assetnote/wordlists category: tool type: Utils platform: [linux, macos, windows] lang: CSS tags: [wordlist, documents] ================================================ FILE: weapons/Atlas.yaml ================================================ --- name: Atlas description: 'Quick SQLMap Tamper Suggester ' url: https://github.com/m4ll0k/Atlas category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/AuthMatrix.yaml ================================================ --- name: AuthMatrix description: url: https://github.com/SecurityInnovation/AuthMatrix category: tool-addon type: Scanner platform: [linux, macos, windows, burpsuite] lang: Python tags: [aaa] ================================================ FILE: weapons/AutoRepeater.yaml ================================================ --- name: AuthMatrix description: Automated HTTP Request Repeating With Burp Suite url: https://github.com/SecurityInnovation/AuthMatrix category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/Autorize.yaml ================================================ --- name: Autorize description: url: https://github.com/Quitten/Autorize category: tool-addon type: Scanner platform: [linux, macos, windows, burpsuite] lang: Python tags: [aaa] ================================================ FILE: weapons/BLUTO.yaml ================================================ --- name: BLUTO description: DNS Analysis Tool url: https://github.com/darryllane/Bluto category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [dns] ================================================ FILE: weapons/BaRMIe.yaml ================================================ --- name: BaRMIe description: Java RMI enumeration and attack tool. url: https://github.com/NickstaDB/BaRMIe category: tool type: Exploit platform: [linux, macos, windows] lang: Java tags: [RMI] ================================================ FILE: weapons/BatchQL.yaml ================================================ --- name: BatchQL description: GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations url: https://github.com/assetnote/batchql category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/Berserko.yaml ================================================ --- name: Berserko description: Burp Suite extension to perform Kerberos authentication url: https://github.com/nccgroup/Berserko category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/Blacklist3r.yaml ================================================ --- name: Blacklist3r description: 'project-blacklist3r ' url: https://github.com/NotSoSecure/Blacklist3r category: tool type: Utils platform: [linux, macos, windows] lang: C# tags: [] ================================================ FILE: weapons/BruteX.yaml ================================================ --- name: BruteX description: Automatically brute force all services running on a target. url: https://github.com/1N3/BruteX category: tool type: Fuzzer platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/Bug-Bounty-Toolz.yaml ================================================ --- name: Bug-Bounty-Toolz description: 'BBT - Bug Bounty Tools ' url: https://github.com/m4ll0k/Bug-Bounty-Toolz category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/BugBountyScanner.yaml ================================================ --- name: BugBountyScanner description: A Bash script and Docker image for Bug Bounty reconnaissance. url: https://github.com/chvancooten/BugBountyScanner category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/BurpBounty.yaml ================================================ --- name: BurpBounty description: url: https://github.com/wagiro/BurpBounty category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: BlitzBasic tags: [] ================================================ FILE: weapons/BurpCustomizer.yaml ================================================ --- name: BurpCustomizer description: Because just a dark theme wasn't enough! url: https://github.com/CoreyD97/BurpCustomizer category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/BurpJSLinkFinder.yaml ================================================ --- name: BurpJSLinkFinder description: url: https://github.com/InitRoot/BurpJSLinkFinder category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: Python tags: [js-analysis] ================================================ FILE: weapons/BurpSuite-Secret_Finder.yaml ================================================ --- name: BurpSuite-Secret_Finder description: url: https://github.com/m4ll0k/BurpSuite-Secret_Finder category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: tags: [] ================================================ FILE: weapons/BurpSuite.yaml ================================================ --- name: BurpSuite description: The BurpSuite Project url: https://portswigger.net/burp category: tool type: Army-Knife platform: [linux, macos, windows, burpsuite] lang: Java tags: [mitmproxy, live-audit, crawl] ================================================ FILE: weapons/BurpSuiteHTTPSmuggler.yaml ================================================ --- name: BurpSuiteHTTPSmuggler description: url: https://github.com/nccgroup/BurpSuiteHTTPSmuggler category: tool-addon type: Scanner platform: [linux, macos, windows, burpsuite] lang: Java tags: [smuggle] ================================================ FILE: weapons/BurpSuiteLoggerPlusPlus.yaml ================================================ --- name: BurpSuiteLoggerPlusPlus description: url: https://github.com/nccgroup/BurpSuiteLoggerPlusPlus category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/CMSmap.yaml ================================================ --- name: CMSmap description: CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. url: https://github.com/dionach/CMSmap category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [web-scanner, vulnerability-scanner] ================================================ FILE: weapons/CSP_Evaluator.yaml ================================================ --- name: CSP Evaluator description: Online CSP Evaluator from google url: https://csp-evaluator.withgoogle.com category: tool type: Utils platform: [linux, macos, windows] lang: tags: [csp] ================================================ FILE: weapons/CT_subdomains.yaml ================================================ --- name: CT_subdomains description: 'An hourly updated list of subdomains gathered from certificate transparency logs ' url: https://github.com/internetwache/CT_subdomains category: tool type: Recon platform: [linux, macos, windows] lang: tags: [subdomains] ================================================ FILE: weapons/CaidoReflector.yaml ================================================ --- name: CaidoReflector description: Automatically look for paramater reflections in the HTTP response url: https://github.com/bebiksior/CaidoReflector category: tool-addon type: Utils platform: [linux, macos, windows, caido] lang: TypeScript tags: [xss] ================================================ FILE: weapons/Chaos_Web.yaml ================================================ --- name: Chaos Web description: " actively scan and maintain internet-wide assets' data. enhance research\ \ and analyse changes around DNS for better insights." url: https://chaos.projectdiscovery.io category: tool type: Recon platform: [linux, macos, windows] lang: tags: [] ================================================ FILE: weapons/Chromium-based-XSS-Taint-Tracking.yaml ================================================ --- name: Chromium-based-XSS-Taint-Tracking description: Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink. url: https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking category: tool type: Scanner platform: [linux, macos, windows] lang: tags: [xss] ================================================ FILE: weapons/Clipboard.yaml ================================================ --- name: Clipboard description: An external brain that remembers anything, anytime, anywhere. url: https://github.com/Slackadays/Clipboard category: tool type: Utils platform: [linux, macos, windows] lang: C++ tags: [clipboard] ================================================ FILE: weapons/ConfusedDotnet.yaml ================================================ --- name: ConfusedDotnet description: Tool to check for dependency confusion vulnerabilities in NuGet package management systems url: https://github.com/visma-prodsec/ConfusedDotnet category: tool type: Scanner platform: [windows] lang: C# tags: [dependency-confusion] ================================================ FILE: weapons/CorsMe.yaml ================================================ --- name: CorsMe description: 'Cross Origin Resource Sharing MisConfiguration Scanner ' url: https://github.com/Shivangx01b/CorsMe category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [cors] ================================================ FILE: weapons/Corsy.yaml ================================================ --- name: Corsy description: 'CORS Misconfiguration Scanner ' url: https://github.com/s0md3v/Corsy category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [cors] ================================================ FILE: weapons/CrackQL.yaml ================================================ --- name: CrackQL description: CrackQL is a GraphQL password brute-force and fuzzing utility. url: https://github.com/nicholasaleks/CrackQL category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/CyberChef.yaml ================================================ --- name: CyberChef description: 'The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis ' url: https://github.com/gchq/CyberChef category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/DNSDumpster.yaml ================================================ --- name: DNSDumpster description: ' Online dns recon & research, find & lookup dns records' url: https://dnsdumpster.com category: tool type: Recon platform: [linux, macos, windows] lang: tags: [dns, online] ================================================ FILE: weapons/DOMPurify.yaml ================================================ --- name: DOMPurify description: 'DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:' url: https://github.com/cure53/DOMPurify category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [xss] ================================================ FILE: weapons/DSSS.yaml ================================================ --- name: DSSS description: Damn Small SQLi Scanner url: https://github.com/stamparm/DSSS category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/Dark_Reader.yaml ================================================ --- name: Dark Reader description: Dark mode to any site url: https://github.com/darkreader/darkreader category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome] lang: TypeScript tags: [darkmode] ================================================ FILE: weapons/Dark_Reader_for_Safari.yaml ================================================ --- name: Dark Reader for Safari description: Dark mode to any site url: https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180 category: browser-addon type: Utils platform: [linux, macos, windows, safari] lang: tags: [] ================================================ FILE: weapons/Decoder-Improved.yaml ================================================ --- name: Decoder-Improved description: Improved decoder for Burp Suite url: https://github.com/nccgroup/Decoder-Improved category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/DeepViolet.yaml ================================================ --- name: DeepViolet description: Tool for introspection of SSL\TLS sessions url: https://github.com/spoofzu/DeepViolet category: tool type: Scanner platform: [linux, macos, windows] lang: Java tags: [ssl] ================================================ FILE: weapons/DirDar.yaml ================================================ --- name: DirDar description: DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it url: https://github.com/M4DM0e/DirDar category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [403] ================================================ FILE: weapons/DotGit.yaml ================================================ --- name: DotGit description: An extension for checking if .git is exposed in visited websites url: https://github.com/davtur19/DotGit category: browser-addon type: Recon platform: [linux, macos, windows, firefox, chrome] lang: JavaScript tags: [] ================================================ FILE: weapons/Dr. Watson.yaml ================================================ --- name: Dr. Watson description: Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information url: https://github.com/prodigysml/Dr.-Watson category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: Python tags: [param, subdomains] ================================================ FILE: weapons/EchoMirage.yaml ================================================ --- name: Echo Mirage description: A generic network proxy that uses DLL injection to capture and alter TCP traffic. url: https://sourceforge.net/projects/echomirage.oldbutgold.p/ category: tool type: Proxy platform: [windows] lang: tags: [mitmproxy] ================================================ FILE: weapons/Edit-This-Cookie.yaml ================================================ --- name: Edit-This-Cookie description: EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies url: https://github.com/ETCExtensions/Edit-This-Cookie category: browser-addon type: Utils platform: [linux, macos, windows, chrome] lang: JavaScript tags: [cookie] ================================================ FILE: weapons/Emissary.yaml ================================================ --- name: Emissary description: Send notifications on different channels such as Slack, Telegram, Discord etc. url: https://github.com/BountyStrike/Emissary category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [notify] ================================================ FILE: weapons/EvenBetter.yaml ================================================ --- name: EvenBetter description: EvenBetter is a frontend Caido plugin that makes the Caido experience even better url: https://github.com/bebiksior/EvenBetter category: tool-addon type: Utils platform: [linux, macos, windows, caido] lang: TypeScript tags: [encode, ssrf, darkmode] ================================================ FILE: weapons/EvenBetterExtensions.yaml ================================================ --- name: EvenBetterExtensions description: EvenBetterExtensions allows you to quicky install and keep updated Caido extensions. url: https://github.com/bebiksior/EvenBetterExtensions category: tool-addon type: Utils platform: [linux, macos, windows, caido] lang: TypeScript tags: [encode, ssrf, darkmode] ================================================ FILE: weapons/FavFreak.yaml ================================================ --- name: FavFreak description: 'Making Favicon.ico based Recon Great again ! ' url: https://github.com/devanshbatham/FavFreak category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Findsploit.yaml ================================================ --- name: Findsploit description: Find exploits in local and online databases instantly url: https://github.com/1N3/Findsploit category: tool type: Utils platform: [linux, macos, windows] lang: Shell tags: [exploit] ================================================ FILE: weapons/Firefox Multi-Account Containers.yaml ================================================ --- name: Firefox Multi-Account Containers description: Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs url: https://github.com/mozilla/multi-account-containers category: browser-addon type: Utils platform: [linux, macos, windows, firefox] lang: JavaScript tags: [] ================================================ FILE: weapons/FockCache.yaml ================================================ --- name: FockCache description: Minimalized Test Cache Poisoning url: https://github.com/tismayil/fockcache category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [cache-vuln] ================================================ FILE: weapons/GAP.yaml ================================================ --- name: GAP description: This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on. url: https://github.com/xnl-h4ck3r/GAP-Burp-Extension category: tool-addon type: Fuzzer platform: [linux, macos, windows, burpsuite] lang: Python tags: [param] ================================================ FILE: weapons/GQLSpection.yaml ================================================ --- name: GQLSpection description: parses GraphQL introspection schema and generates possible queries url: https://github.com/doyensec/GQLSpection category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/GadgetProbe.yaml ================================================ --- name: GadgetProbe description: Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths. url: https://github.com/BishopFox/GadgetProbe category: tool type: Utils platform: [linux, macos, windows] lang: Java tags: [deserialize] ================================================ FILE: weapons/Gf-Patterns.yaml ================================================ --- name: Gf-Patterns description: 'GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep ' url: https://github.com/1ndianl33t/Gf-Patterns category: tool type: Utils platform: [linux, macos, windows] lang: tags: ================================================ FILE: weapons/GitMiner.yaml ================================================ --- name: GitMiner description: 'Tool for advanced mining for content on Github ' url: https://github.com/UnkL4b/GitMiner category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Glorp.yaml ================================================ --- name: Glorp description: A CLI-based HTTP intercept and replay proxy url: https://github.com/denandz/glorp category: tool type: Proxy platform: [linux, macos, windows] lang: Go tags: [mitmproxy] ================================================ FILE: weapons/Glue.yaml ================================================ --- name: Glue description: Application Security Automation url: https://github.com/OWASP/glue category: tool type: Env platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/Gopherus.yaml ================================================ --- name: Gopherus description: 'This tool generates gopher link for exploiting SSRF and gaining RCE in various servers ' url: https://github.com/tarunkant/Gopherus category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [ssrf] ================================================ FILE: weapons/GraphQLmap.yaml ================================================ --- name: GraphQLmap description: GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. url: https://github.com/swisskyrepo/GraphQLmap category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/HRS.yaml ================================================ --- name: HRS description: HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020. url: https://github.com/SafeBreach-Labs/HRS category: tool type: Scanner platform: [linux, macos, windows] lang: Perl tags: [] ================================================ FILE: weapons/HTTPSignatures.yaml ================================================ --- name: HTTPSignatures description: A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft. url: https://github.com/nccgroup/HTTPSignatures category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/HUNT.yaml ================================================ --- name: HUNT description: Identifies common parameters vulnerable to certain vulnerability classes url: https://github.com/bugcrowd/HUNT category: tool-addon type: Recon platform: [linux, macos, windows, zap, burpsuite] lang: Kotlin tags: [param] ================================================ FILE: weapons/Hack-Tools.yaml ================================================ --- name: Hack-Tools description: The all-in-one Red Team extension for Web Pentester 🛠 url: https://github.com/LasCC/Hack-Tools category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome, safari] lang: TypeScript tags: [] ================================================ FILE: weapons/HostHunter.yaml ================================================ --- name: HostHunter description: Recon tool for discovering hostnames using OSINT techniques. url: https://github.com/SpiderLabs/HostHunter category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [osint] ================================================ FILE: weapons/Hunt3r.yaml ================================================ --- name: Hunt3r description: Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework url: https://github.com/EasyRecon/Hunt3r category: tool type: Recon platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/HydraRecon.yaml ================================================ --- name: HydraRecon description: All In One, Fast, Easy Recon Tool url: https://github.com/aufzayed/HydraRecon category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/IntruderPayloads.yaml ================================================ --- name: IntruderPayloads description: url: https://github.com/1N3/IntruderPayloads category: tool type: Utils platform: [linux, macos, windows, burpsuite] lang: BlitzBasic tags: [] ================================================ FILE: weapons/JSFScan.sh.yaml ================================================ --- name: JSFScan.sh description: 'Automation for javascript recon in bug bounty. ' url: https://github.com/KathanP19/JSFScan.sh category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [js-analysis] ================================================ FILE: weapons/LFISuite.yaml ================================================ --- name: LFISuite description: 'Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner ' url: https://github.com/D35m0nd142/LFISuite category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/LOXS.yaml ================================================ --- name: LOXS description: best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect url: https://github.com/coffinxp/loxs category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss, sqli, crlf, lfi, open-redirect] ================================================ FILE: weapons/Lepus.yaml ================================================ --- name: Lepus description: Subdomain finder url: https://github.com/gfek/Lepus category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [subdomains] ================================================ FILE: weapons/LinkFinder.yaml ================================================ --- name: LinkFinder description: 'A python script that finds endpoints in JavaScript files ' url: https://github.com/GerbenJavado/LinkFinder category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [js-analysis] ================================================ FILE: weapons/MM3_ProxySwitch.yaml ================================================ --- name: MM3 ProxySwitch description: Proxy Switch in Firefox and Chrome url: https://proxy-offline-browser.com/ProxySwitch/ category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome] lang: JavaScript tags: [] ================================================ FILE: weapons/NoSQLMap.yaml ================================================ --- name: NoSQLMap description: 'Automated NoSQL database enumeration and web application exploitation tool. ' url: https://github.com/codingo/NoSQLMap category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [nosqli] ================================================ FILE: weapons/NoXss.yaml ================================================ --- name: NoXss description: Faster xss scanner,support reflected-xss and dom-xss url: https://github.com/lwzSoviet/ category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/OneForAll.yaml ================================================ --- name: OneForAll description: 'OneForAll是一款功能强大的子域收集工具 ' url: https://github.com/shmilylty/OneForAll category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/OpenRedireX.yaml ================================================ --- name: OpenRedireX description: A Fuzzer for OpenRedirect issues url: https://github.com/devanshbatham/OpenRedireX category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Oralyzer.yaml ================================================ --- name: Oralyzer description: Open Redirection Analyzer url: https://github.com/r0075h3ll/Oralyzer category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Osmedeus.yaml ================================================ --- name: Osmedeus description: 'Fully automated offensive security framework for reconnaissance and vulnerability scanning ' url: https://github.com/j3ssie/Osmedeus category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/PPScan.yaml ================================================ --- name: PPScan description: Client Side Prototype Pollution Scanner url: https://github.com/msrkp/PPScan category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [prototypepollution, prototype-pollution] ================================================ FILE: weapons/ParamPamPam.yaml ================================================ --- name: ParamPamPam description: This tool for brute discover GET and POST parameters. url: https://github.com/Bo0oM/ParamPamPam category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [param, cache-vuln] ================================================ FILE: weapons/ParamSpider.yaml ================================================ --- name: ParamSpider description: 'Mining parameters from dark corners of Web Archives ' url: https://github.com/devanshbatham/ParamSpider category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [param] ================================================ FILE: weapons/ParamWizard.yaml ================================================ --- name: ParamWizard description: ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website. url: https://github.com/iamunixtz/ParamWizard category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [param] ================================================ FILE: weapons/Parth.yaml ================================================ --- name: Parth description: 'Heuristic Vulnerable Parameter Scanner ' url: https://github.com/s0md3v/Parth category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [param] ================================================ FILE: weapons/PayloadsAllTheThings.yaml ================================================ --- name: PayloadsAllTheThings description: 'A list of useful payloads and bypass for Web Application Security and Pentest/CTF ' url: https://github.com/swisskyrepo/PayloadsAllTheThings category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Phoenix.yaml ================================================ --- name: Phoenix description: hahwul's online tools url: https://www.hahwul.com/phoenix/ category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [online] ================================================ FILE: weapons/Photon.yaml ================================================ --- name: Photon description: 'Incredibly fast crawler designed for OSINT. ' url: https://github.com/s0md3v/Photon category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [osint, crawl] ================================================ FILE: weapons/PoC-in-GitHub.yaml ================================================ --- name: PoC-in-GitHub description: 📡 PoC auto collect from GitHub. Be careful malware. url: https://github.com/nomi-sec/PoC-in-GitHub category: tool type: Utils platform: [linux, macos, windows] lang: tags: [] ================================================ FILE: weapons/PwnFox.yaml ================================================ --- name: PwnFox description: Firefox/Burp extension that provide usefull tools for your security audit. url: https://github.com/yeswehack/PwnFox category: browser-addon type: Utils platform: [linux, macos, windows, firefox, burpsuite] lang: JavaScript tags: [] ================================================ FILE: weapons/PwnXSS.yaml ================================================ --- name: PwnXSS description: Vulnerability (XSS) scanner exploit url: https://github.com/pwn0sec/PwnXSS category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/REcollapse.yaml ================================================ --- name: REcollapse description: REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications url: https://github.com/0xacb/recollapse category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [fuzz] ================================================ FILE: weapons/Redcloud.yaml ================================================ --- name: Redcloud description: Automated Red Team Infrastructure deployement using Docker url: https://github.com/khast3x/Redcloud category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [infra] ================================================ FILE: weapons/RustScan.yaml ================================================ --- name: RustScan description: 'Faster Nmap Scanning with Rust ' url: https://github.com/brandonskerritt/RustScan category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [portscan] ================================================ FILE: weapons/S3Scanner.yaml ================================================ --- name: S3Scanner description: 'Scan for open AWS S3 buckets and dump the contents ' url: https://github.com/sa7mon/S3Scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [s3] ================================================ FILE: weapons/S3cret Scanner.yaml ================================================ --- name: S3cret Scanner description: Hunting For Secrets Uploaded To Public S3 Buckets url: https://github.com/Eilonh/s3crets_scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [s3] ================================================ FILE: weapons/SQLNinja.yaml ================================================ --- name: SQLNinja description: Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities. url: https://gitlab.com/kalilinux/packages/sqlninja category: tool type: Exploit platform: [linux, macos] lang: Perl tags: [sqli] ================================================ FILE: weapons/SQLiDetector.yaml ================================================ --- name: SQLiDetector description: Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases. url: https://github.com/eslam3kl/SQLiDetector category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/SSRFire.yaml ================================================ --- name: SSRFire description: An automated SSRF finder. Just give the domain name and your server and chill url: https://github.com/ksharinarayanan/SSRFire category: tool type: Fuzzer platform: [linux, macos] lang: Shell tags: [ssrf] ================================================ FILE: weapons/SSRFmap.yaml ================================================ --- name: SSRFmap description: 'Automatic SSRF fuzzer and exploitation tool ' url: https://github.com/swisskyrepo/SSRFmap category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [ssrf] ================================================ FILE: weapons/SSTImap.yaml ================================================ --- name: SSTImap description: Automatic SSTI detection tool with interactive interface url: https://github.com/vladko312/SSTImap category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [ssti] ================================================ FILE: weapons/STEWS.yaml ================================================ --- name: STEWS description: A Security Tool for Enumerating WebSockets url: https://github.com/PalindromeLabs/STEWS category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/SecLists.yaml ================================================ --- name: SecLists description: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. url: https://github.com/danielmiessler/SecLists category: tool type: Utils platform: [linux, macos, windows] lang: Txt tags: [wordlist, documents] ================================================ FILE: weapons/SecretFinder.yaml ================================================ --- name: SecretFinder description: 'SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files ' url: https://github.com/m4ll0k/SecretFinder category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/SecurityTrails.yaml ================================================ --- name: SecurityTrails description: ' Online dns / subdomain / recon tool' url: https://securitytrails.com category: tool type: Recon platform: [linux, macos, windows] lang: tags: [subdomains, online] ================================================ FILE: weapons/SequenceDiagram.yaml ================================================ --- name: SequenceDiagram description: Online tool for creating UML sequence diagrams url: https://sequencediagram.org category: tool type: Utils platform: [linux, macos, windows] lang: tags: [online] ================================================ FILE: weapons/SerializationDumper.yaml ================================================ --- name: SerializationDumper description: A tool to dump Java serialization streams in a more human readable form. url: https://github.com/NickstaDB/SerializationDumper category: tool type: Utils platform: [linux, macos, windows] lang: Java tags: [deserialize] ================================================ FILE: weapons/Shodan.yaml ================================================ --- name: Shodan description: " World's first search engine for Internet-connected devices" url: https://www.shodan.io/ category: tool type: Recon platform: [linux, macos, windows] lang: tags: [osint] ================================================ FILE: weapons/Silver.yaml ================================================ --- name: Silver description: 'Mass scan IPs for vulnerable services ' url: https://github.com/s0md3v/Silver category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [port] ================================================ FILE: weapons/Sn1per.yaml ================================================ --- name: Sn1per description: 'Automated pentest framework for offensive security experts ' url: https://github.com/1N3/Sn1per category: tool type: Exploit platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/Stepper.yaml ================================================ --- name: Stepper description: url: https://github.com/CoreyD97/Stepper category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/Striker.yaml ================================================ --- name: Striker description: 'Striker is an offensive information and vulnerability scanner. ' url: https://github.com/s0md3v/Striker category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/SubOver.yaml ================================================ --- name: SubOver description: A Powerful Subdomain Takeover Tool url: https://github.com/Ice3man543/SubOver category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, takeover] ================================================ FILE: weapons/Sublist3r.yaml ================================================ --- name: Sublist3r description: 'Fast subdomains enumeration tool for penetration testers ' url: https://github.com/aboul3la/Sublist3r category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [subdomains] ================================================ FILE: weapons/Taipan.yaml ================================================ --- name: Taipan description: Web application vulnerability scanner url: https://github.com/enkomio/Taipan category: tool type: Scanner platform: [linux, macos, windows] lang: tags: [] ================================================ FILE: weapons/TukTuk.yaml ================================================ --- name: TukTuk description: 'Tool for catching and logging different types of requests. ' url: https://github.com/ArturSS7/TukTuk category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [oast] ================================================ FILE: weapons/User-Agent_Switcher.yaml ================================================ --- name: User-Agent Switcher description: quick and easy way to switch between user-agents. url: https://addons.mozilla.org/ko/firefox/addon/user-agent-switcher-revived/ category: browser-addon type: Utils platform: [linux, macos, windows, firefox] lang: tags: [] ================================================ FILE: weapons/V3n0M-Scanner.yaml ================================================ --- name: V3n0M-Scanner description: Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns url: https://github.com/v3n0m-Scanner/V3n0M-Scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sqli, xss, lfi, rfi] ================================================ FILE: weapons/VHostScan.yaml ================================================ --- name: VHostScan description: 'A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages. ' url: https://github.com/codingo/VHostScan category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/Wayback_Machine.yaml ================================================ --- name: Wayback Machine description: History of website url: https://apps.apple.com/us/app/wayback-machine/id1472432422 category: browser-addon type: Recon platform: [linux, macos, windows, safari] lang: tags: [] ================================================ FILE: weapons/Web-Cache-Vulnerability-Scanner.yaml ================================================ --- name: Web-Cache-Vulnerability-Scanner description: Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/). url: https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [cache-vuln] ================================================ FILE: weapons/Web3 Decoder.yaml ================================================ --- name: Web3 Decoder description: Burp Extension for Web3 url: https://github.com/nccgroup/web3-decoder category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [web3] ================================================ FILE: weapons/XSRFProbe.yaml ================================================ --- name: XSRFProbe description: The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. url: https://github.com/0xInfection/XSRFProbe category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/XSS-Catcher.yaml ================================================ --- name: XSS-Catcher description: Find blind XSS but why not gather data while you're at it. url: https://github.com/daxAKAhackerman/XSS-Catcher category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [xss, blind-xss] ================================================ FILE: weapons/XSStrike.yaml ================================================ --- name: XSStrike description: 'Most advanced XSS scanner. ' url: https://github.com/s0md3v/XSStrike category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/XSpear.yaml ================================================ --- name: XSpear description: 'Powerfull XSS Scanning and Parameter analysis tool&gem ' url: https://github.com/hahwul/XSpear category: tool type: Scanner platform: [linux, macos, windows] lang: Ruby tags: [xss] ================================================ FILE: weapons/XXEinjector.yaml ================================================ --- name: XXEinjector description: Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods. url: https://github.com/enjoiz/XXEinjector category: tool type: Exploit platform: [linux, macos, windows] lang: Ruby tags: [xxe] ================================================ FILE: weapons/XXExploiter.yaml ================================================ --- name: XXExploiter description: Tool to help exploit XXE vulnerabilities url: https://github.com/luisfontes19/xxexploiter category: tool type: Exploit platform: [linux, macos, windows] lang: TypeScript tags: [xxe] ================================================ FILE: weapons/XssPy.yaml ================================================ --- name: XssPy description: Web Application XSS Scanner url: https://github.com/faizann24/ category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/ZipBomb.yaml ================================================ --- name: ZipBomb description: A simple implementation of ZipBomb in Python url: https://github.com/abdulfatir/ZipBomb category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [zipbomb] ================================================ FILE: weapons/a2sv.yaml ================================================ --- name: a2sv description: 'Auto Scanning to SSL Vulnerability ' url: https://github.com/hahwul/a2sv category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [ssl] ================================================ FILE: weapons/altdns.yaml ================================================ --- name: altdns description: 'Generates permutations, alterations and mutations of subdomains and then resolves them ' url: https://github.com/infosec-au/altdns category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [dns, subdomains] ================================================ FILE: weapons/alterx.yaml ================================================ --- name: alterx description: Fast and customizable subdomain wordlist generator using DSL url: https://github.com/projectdiscovery/alterx category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, wordlist, permutation] ================================================ FILE: weapons/anew.yaml ================================================ --- name: anew description: A tool for adding new lines to files, skipping duplicates url: https://github.com/tomnomnom/anew category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/apkleaks.yaml ================================================ --- name: apkleaks description: 'Scanning APK file for URIs, endpoints & secrets. ' url: https://github.com/dwisiswant0/apkleaks category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [apk, url, endpoint] ================================================ FILE: weapons/aquatone.yaml ================================================ --- name: aquatone description: 'A Tool for Domain Flyovers ' url: https://github.com/michenriksen/aquatone category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [domain] ================================================ FILE: weapons/arachni.yaml ================================================ --- name: arachni description: 'Web Application Security Scanner Framework ' url: https://github.com/Arachni/arachni category: tool type: Scanner platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/argumentinjectionhammer.yaml ================================================ --- name: argumentinjectionhammer description: A Burp Extension designed to identify argument injection vulnerabilities. url: https://github.com/nccgroup/argumentinjectionhammer category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Python tags: [] ================================================ FILE: weapons/asnmap.yaml ================================================ --- name: asnmap description: Go CLI and Library for quickly mapping organization network ranges using ASN information url: https://github.com/projectdiscovery/asnmap category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [asn, network-mapping] ================================================ FILE: weapons/assetfinder.yaml ================================================ --- name: assetfinder description: 'Find domains and subdomains related to a given domain ' url: https://github.com/tomnomnom/assetfinder category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/attack-surface-detector-burp.yaml ================================================ --- name: attack-surface-detector-burp description: The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters url: https://github.com/secdec/attack-surface-detector-burp category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: Java tags: [endpoint, url, attack-surface] ================================================ FILE: weapons/attack-surface-detector-zap.yaml ================================================ --- name: attack-surface-detector-zap description: The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters url: https://github.com/secdec/attack-surface-detector-zap category: tool-addon type: Recon platform: [linux, macos, windows, zap] lang: Java tags: [endpoint, url, attack-surface] ================================================ FILE: weapons/autochrome.yaml ================================================ --- name: autochrome description: This tool downloads, installs, and configures a shiny new copy of Chromium. url: https://github.com/nccgroup/autochrome category: tool type: Utils platform: [linux, macos, windows] lang: HTML tags: [] ================================================ FILE: weapons/autopoisoner.yaml ================================================ --- name: autopoisoner description: Web cache poisoning vulnerability scanner. url: https://github.com/Th0h0/autopoisoner category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [cache-vuln] ================================================ FILE: weapons/axiom.yaml ================================================ --- name: axiom description: 'A dynamic infrastructure toolkit for red teamers and bug bounty hunters! ' url: https://github.com/pry0cc/axiom category: tool type: Army-Knife platform: [linux, macos, windows] lang: Shell tags: [infra] ================================================ FILE: weapons/bat.yaml ================================================ --- name: bat description: A cat(1) clone with wings. url: https://github.com/sharkdp/bat category: tool type: Utils platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/baudrillard-suite.yaml ================================================ --- name: Baudrillard Suite description: Cross-platform security research toolkit with OSINT aggregation, memory forensics, social engineering tools, steganography, and predictive threat modeling. url: https://github.com/bad-antics/baudrillard-suite category: tool type: Army-knife platform: [linux, macos, windows] lang: Python tags: [osint, recon, forensics, social-engineering, steganography] ================================================ FILE: weapons/bbot.yaml ================================================ --- name: bbot description: OSINT automation for hackers url: https://github.com/blacklanternsecurity/bbot category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [osint] ================================================ FILE: weapons/beef.yaml ================================================ --- name: beef description: The Browser Exploitation Framework Project url: https://github.com/beefproject/beef category: tool type: Exploit platform: [linux, macos, windows] lang: Ruby tags: [xss] ================================================ FILE: weapons/blackboxprotobuf.yaml ================================================ --- name: blackboxprotobuf description: Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition. url: https://github.com/nccgroup/blackboxprotobuf category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Python tags: [] ================================================ FILE: weapons/blistener.yaml ================================================ --- name: blistener description: Blind-XSS listener with payloads url: https://github.com/fyxme/blistener category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [xss, blind-xss] ================================================ FILE: weapons/boast.yaml ================================================ --- name: boast description: The BOAST Outpost for AppSec Testing (v0.1.0) url: https://github.com/marcoagner/boast category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [oast] ================================================ FILE: weapons/bountyplz.yaml ================================================ --- name: bountyplz description: 'Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported) ' url: https://github.com/fransr/bountyplz category: tool type: Utils platform: [linux, macos, windows] lang: Shell tags: [report] ================================================ FILE: weapons/bruteforce-lists.yaml ================================================ --- name: bruteforce-lists description: Some files for bruteforcing certain things. url: https://github.com/random-robbie/bruteforce-lists category: tool type: Utils platform: [linux, macos, windows] lang: Txt tags: [wordlist, documents] ================================================ FILE: weapons/burl.yaml ================================================ --- name: burl description: 'A Broken-URL Checker ' url: https://github.com/tomnomnom/burl category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/burp-exporter.yaml ================================================ --- name: burp-exporter description: url: https://github.com/artssec/burp-exporter category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Python tags: [] ================================================ FILE: weapons/burp-piper.yaml ================================================ --- name: burp-piper description: url: https://github.com/silentsignal/burp-piper category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Kotlin tags: [] ================================================ FILE: weapons/burp-retire-js.yaml ================================================ --- name: burp-retire-js description: url: https://github.com/h3xstream/burp-retire-js category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: JavaScript tags: [js-analysis] ================================================ FILE: weapons/burp-send-to.yaml ================================================ --- name: burp-send-to description: url: https://github.com/bytebutcher/burp-send-to category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/c-jwt-cracker.yaml ================================================ --- name: c-jwt-cracker description: 'JWT brute force cracker written in C ' url: https://github.com/brendan-rius/c-jwt-cracker category: tool type: Fuzzer platform: [linux, macos, windows] lang: C tags: [jwt] ================================================ FILE: weapons/caido.yaml ================================================ --- name: Caido description: A lightweight web security auditing toolkit url: https://caido.io category: tool type: Proxy platform: [linux, macos, windows, caido] lang: Rust tags: [mitmproxy] ================================================ FILE: weapons/caidope.yaml ================================================ --- name: caidope description: caidope - caido plugin url: https://github.com/skitttles-berry/caidope category: tool-addon type: Utils platform: [linux, macos, windows, caido] lang: TypeScript tags: [] ================================================ FILE: weapons/can-i-take-over-xyz.yaml ================================================ --- name: can-i-take-over-xyz description: '"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.' url: https://github.com/EdOverflow/can-i-take-over-xyz category: tool type: Utils platform: [linux, macos, windows] lang: tags: [] ================================================ FILE: weapons/cariddi.yaml ================================================ --- name: cariddi description: Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more url: https://github.com/edoardottt/cariddi category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [crawl] ================================================ FILE: weapons/cc.py.yaml ================================================ --- name: cc.py description: 'Extracting URLs of a specific target based on the results of "commoncrawl.org" ' url: https://github.com/si9int/cc.py category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [url] ================================================ FILE: weapons/cent.yaml ================================================ --- name: cent description: Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place. url: https://github.com/xm1k3/cent category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [nuclei-templates] ================================================ FILE: weapons/cf-check.yaml ================================================ --- name: cf-check description: 'Cloudflare Checker written in Go ' url: https://github.com/dwisiswant0/cf-check category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/chaos-client.yaml ================================================ --- name: chaos-client description: 'Go client to communicate with Chaos DNS API. ' url: https://github.com/projectdiscovery/chaos-client category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/clairvoyance.yaml ================================================ --- name: Clairvoyance description: Obtain GraphQL API schema even if the introspection is disabled url: https://github.com/nikitastupin/clairvoyance category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/clear-cache.yaml ================================================ --- name: clear-cache description: Add-on to clear browser cache with a single click or via the F9 key. url: https://github.com/TenSoja/clear-cache category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome] lang: JavaScript tags: [] ================================================ FILE: weapons/cloud-audit.yaml ================================================ --- name: cloud-audit description: Fast, opinionated AWS security scanner with Terraform remediation and attack chain detection url: https://github.com/gebalamariusz/cloud-audit category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [aws, cloud, security, terraform] ================================================ FILE: weapons/cloudlist.yaml ================================================ --- name: cloudlist description: Cloudlist is a tool for listing Assets from multiple Cloud Providers url: https://github.com/projectdiscovery/cloudlist category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [cloud, asset-discovery] ================================================ FILE: weapons/collaborator-everywhere.yaml ================================================ --- name: collaborator-everywhere description: url: https://github.com/PortSwigger/collaborator-everywhere category: tool-addon type: Scanner platform: [linux, macos, windows, burpsuite] lang: Java tags: [oast] ================================================ FILE: weapons/commix.yaml ================================================ --- name: commix description: Automated All-in-One OS Command Injection Exploitation Tool. url: https://github.com/commixproject/commix category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [exploit] ================================================ FILE: weapons/community-scripts.yaml ================================================ --- name: community-scripts description: url: https://github.com/zaproxy/community-scripts category: tool-addon type: Utils platform: [linux, macos, windows, zap] lang: JavaScript tags: [] ================================================ FILE: weapons/confused.yaml ================================================ --- name: confused description: Tool to check for dependency confusion vulnerabilities in multiple package management systems url: https://github.com/visma-prodsec/confused category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [dependency-confusion] ================================================ FILE: weapons/cookie-quick-manager.yaml ================================================ --- name: cookie-quick-manager description: An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox. url: https://github.com/ysard/cookie-quick-manager category: browser-addon type: Utils platform: [linux, macos, windows, firefox] lang: JavaScript tags: [cookie] ================================================ FILE: weapons/corsair_scan.yaml ================================================ --- name: corsair_scan description: Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS). url: https://github.com/Santandersecurityresearch/corsair_scan category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [cors] ================================================ FILE: weapons/crawlergo.yaml ================================================ --- name: crawlergo description: A powerful browser crawler for web vulnerability scanners url: https://github.com/Qianlitp/crawlergo category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [crawl] ================================================ FILE: weapons/crimson.yaml ================================================ --- name: Crimson description: Web Application Security Testing automation. url: https://github.com/Karmaz95/crimson category: tool type: Env platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/crlfuzz.yaml ================================================ --- name: crlfuzz description: 'A fast tool to scan CRLF vulnerability written in Go ' url: https://github.com/dwisiswant0/crlfuzz category: tool type: Fuzzer platform: [linux, macos, windows] lang: Shell tags: [crlf] ================================================ FILE: weapons/csp-auditor.yaml ================================================ --- name: csp-auditor description: url: https://github.com/GoSecure/csp-auditor category: tool-addon type: Scanner platform: [linux, macos, windows, zap, burpsuite] lang: Java tags: [csp] ================================================ FILE: weapons/csprecon.yaml ================================================ --- name: csprecon description: Discover new target domains using Content Security Policy url: https://github.com/edoardottt/csprecon category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [csp] ================================================ FILE: weapons/curl.yaml ================================================ --- name: curl description: A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features url: https://github.com/curl/curl category: tool type: Utils platform: [linux, macos, windows] lang: C tags: [] ================================================ FILE: weapons/dalfox.yaml ================================================ --- name: dalfox description: 🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation. url: https://github.com/hahwul/dalfox category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [xss] ================================================ FILE: weapons/deadfinder.yaml ================================================ --- name: DeadFinder description: Find dead-links (broken links) url: https://github.com/hahwul/deadfinder category: tool type: Scanner platform: [linux, macos, windows] lang: Ruby tags: [broken-link] ================================================ FILE: weapons/deadlinks.yaml ================================================ --- name: deadlinks description: Health checks for your documentation links. url: https://github.com/butuzov/deadlinks category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [broken-link] ================================================ FILE: weapons/deadsniper.yaml ================================================ --- name: Deadsniper description: A fast, specialized dead-link checker url: https://github.com/port19x/deadsniper category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [broken-link] ================================================ FILE: weapons/dependency-confusion-scanner.yaml ================================================ --- name: dependency-confusion-scanner description: This small repo is meant to scan Github's repositories for potential Dependency confusion vulnerabilities. url: https://github.com/Yaniv-git/dependency-confusion-scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [dependency-confusion] ================================================ FILE: weapons/depenfusion.yaml ================================================ --- name: depenfusion description: A powerful pentesting tool for detecting and exploiting dependency confusion vulnerabilities in Node.js projects url: https://github.com/benjamin-mauss/depenfusion category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [dependency-confusion] ================================================ FILE: weapons/difftastic.yaml ================================================ --- name: difftastic description: a structural diff that understands syntax url: https://github.com/Wilfred/difftastic category: tool type: Utils platform: [linux, macos, windows] lang: Rust tags: [diff] ================================================ FILE: weapons/dirsearch.yaml ================================================ --- name: dirsearch description: 'Web path scanner ' url: https://github.com/maurosoria/dirsearch category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/ditto.yaml ================================================ --- name: ditto description: A tool for IDN homograph attacks and detection. url: https://github.com/evilsocket/ditto category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/dmut.yaml ================================================ --- name: dmut description: A tool to perform permutations, mutations and alteration of subdomains in golang. url: https://github.com/bp0lr/dmut category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/dnsobserver.yaml ================================================ --- name: dnsobserver description: "A handy DNS service written in Go to aid in the detection of several\ \ types of blind vulnerabilities. It monitors a pentester's server for out-of-band\ \ DNS interactions and sends lookup notifications via Slack. " url: https://github.com/allyomalley/dnsobserver category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [oast, dns] ================================================ FILE: weapons/dnsprobe.yaml ================================================ --- name: dnsprobe description: 'DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers. ' url: https://github.com/projectdiscovery/dnsprobe category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [dns] ================================================ FILE: weapons/dnsvalidator.yaml ================================================ --- name: dnsvalidator description: Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses. url: https://github.com/vortexau/dnsvalidator category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [dns] ================================================ FILE: weapons/dnsx.yaml ================================================ --- name: dnsx description: dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers. url: https://github.com/projectdiscovery/dnsx category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [dns] ================================================ FILE: weapons/docem.yaml ================================================ --- name: docem description: Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids) url: https://github.com/whitel1st/docem category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [xxe, xss] ================================================ FILE: weapons/domdig.yaml ================================================ --- name: domdig description: 'DOM XSS scanner for Single Page Applications ' url: https://github.com/fcavallarin/domdig category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [xss] ================================================ FILE: weapons/domloggerpp.yaml ================================================ --- name: DOMLogger++ description: A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations. url: https://github.com/kevin-mizu/domloggerpp category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome] lang: JavaScript tags: [dom, xss] ================================================ FILE: weapons/dontgo403.yaml ================================================ --- name: dontgo403 description: Tool to bypass 40X response codes. url: https://github.com/devploit/dontgo403 category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [403] ================================================ FILE: weapons/dotdotpwn.yaml ================================================ --- name: dotdotpwn description: 'DotDotPwn - The Directory Traversal Fuzzer ' url: https://github.com/wireghoul/dotdotpwn category: tool type: Fuzzer platform: [linux, macos, windows] lang: Perl tags: [path-traversal] ================================================ FILE: weapons/dsieve.yaml ================================================ --- name: dsieve description: Filter and enrich a list of subdomains by level url: https://github.com/trickest/dsieve category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/eoyc.yaml ================================================ --- name: eoyc description: Encoding Only Your Choices url: https://github.com/hahwul/eoyc category: tool type: Utils platform: [linux, macos, windows] lang: Crystal tags: [encode] ================================================ FILE: weapons/eval_villain.yaml ================================================ --- name: eval_villain description: A Firefox Web Extension to improve the discovery of DOM XSS. url: https://github.com/swoops/eval_villain category: browser-addon type: Utils platform: [linux, macos, windows, firefox, zap] lang: JavaScript tags: [xss] ================================================ FILE: weapons/evil-proxy.yaml ================================================ --- name: EvilProxy description: A ruby http/https proxy to do EVIL things. url: https://github.com/bbtfr/evil-proxy category: tool type: Proxy platform: [linux, macos, windows] lang: Ruby tags: [mitmproxy] ================================================ FILE: weapons/ezXSS.yaml ================================================ --- name: ezXSS description: 'ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. ' url: https://github.com/ssl/ezXSS category: tool type: Utils platform: [linux, macos, windows] lang: PHP tags: [xss, blind-xss] ================================================ FILE: weapons/favirecon.yaml ================================================ --- name: favirecon description: Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services. url: https://github.com/edoardottt/favirecon category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [favicon] ================================================ FILE: weapons/femida.yaml ================================================ --- name: femida description: url: https://github.com/wish-i-was/femida category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Python tags: [] ================================================ FILE: weapons/feroxbuster.yaml ================================================ --- name: feroxbuster description: A fast, simple, recursive content discovery tool written in Rust. url: https://github.com/epi052/feroxbuster category: tool type: Fuzzer platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/fff.yaml ================================================ --- name: fff description: The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly. url: https://github.com/tomnomnom/fff category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/ffuf.yaml ================================================ --- name: ffuf description: 'Fast web fuzzer written in Go ' url: https://github.com/ffuf/ffuf category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/fhc.yaml ================================================ --- name: fhc description: Fast HTTP Checker. url: https://github.com/Edu4rdSHL/fhc category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/findom-xss.yaml ================================================ --- name: findom-xss description: 'A fast DOM based XSS vulnerability scanner with simplicity. ' url: https://github.com/dwisiswant0/findom-xss category: tool type: Scanner platform: [linux, macos, windows] lang: Shell tags: [xss] ================================================ FILE: weapons/findomain.yaml ================================================ --- name: findomain description: 'The fastest and cross-platform subdomain enumerator, do not waste your time. ' url: https://github.com/Edu4rdSHL/findomain category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [subdomains] ================================================ FILE: weapons/firefox-container-proxy.yaml ================================================ --- name: firefox-container-proxy description: Assign a proxy to a Firefox container url: https://github.com/bekh6ex/firefox-container-proxy category: browser-addon type: Utils platform: [linux, macos, windows, firefox] lang: JavaScript tags: [] ================================================ FILE: weapons/fuzzparam.yaml ================================================ --- name: fuzzparam description: A fast go based param miner to fuzz possible parameters a URL can have. url: https://github.com/0xsapra/fuzzparam category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [param] ================================================ FILE: weapons/fzf.yaml ================================================ --- name: fzf description: A command-line fuzzy finder url: https://github.com/junegunn/fzf category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/gRPC-Pentest-Suite.yaml ================================================ --- name: gRPC-Web Pentest Suite description: gRPC-Pentest-Suite is set of tools for pentesting / hacking gRPC Web (gRPC-Web) applications. url: https://github.com/nxenon/grpc-pentest-suite category: tool-addon type: Utils platform: [burpsuite, linux, macos, windows] lang: Python tags: [gRPC-Web] ================================================ FILE: weapons/gau.yaml ================================================ --- name: gau description: Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. url: https://github.com/lc/gau category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/gauplus.yaml ================================================ --- name: gauplus description: A modified version of gau for personal usage. Support workers, proxies and some extra things. url: https://github.com/bp0lr/gauplus category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/gee.yaml ================================================ --- name: gee description: 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go url: https://github.com/hahwul/gee category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/getJS.yaml ================================================ --- name: getJS description: A tool to fastly get all javascript sources/files url: https://github.com/003random/getJS category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [js-analysis] ================================================ FILE: weapons/gf.yaml ================================================ --- name: gf description: 'A wrapper around grep, to help you grep for things ' url: https://github.com/tomnomnom/gf category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/ghauri.yaml ================================================ --- name: ghauri description: An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws url: https://github.com/r0oth3x49/ghauri category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/gitGraber.yaml ================================================ --- name: gitGraber description: 'gitGraber ' url: https://github.com/hisxo/gitGraber category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/github-endpoints.yaml ================================================ --- name: github-endpoints description: Find endpoints on GitHub. url: https://github.com/gwen001/github-endpoints category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/github-regexp.yaml ================================================ --- name: github-regexp description: Basically a regexp over a GitHub search. url: https://github.com/gwen001/github-regexp category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/github-search.yaml ================================================ --- name: github-search description: 'Tools to perform basic search on GitHub. ' url: https://github.com/gwen001/github-search category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/github-subdomains.yaml ================================================ --- name: github-subdomains description: Find subdomains on GitHub url: https://github.com/gwen001/github-subdomains category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/gitleaks.yaml ================================================ --- name: gitleaks description: Scan git repos (or files) for secrets using regex and entropy 🔑 url: https://github.com/zricethezav/gitleaks category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/gitls.yaml ================================================ --- name: gitls description: Listing git repository from URL/User/Org url: https://github.com/hahwul/gitls category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/gitrob.yaml ================================================ --- name: gitrob description: 'Reconnaissance tool for GitHub organizations ' url: https://github.com/michenriksen/gitrob category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/go-dork.yaml ================================================ --- name: go-dork description: 'The fastest dork scanner written in Go. ' url: https://github.com/dwisiswant0/go-dork category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/gobuster.yaml ================================================ --- name: gobuster description: 'Directory/File, DNS and VHost busting tool written in Go ' url: https://github.com/OJ/gobuster category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/godeclutter.yaml ================================================ --- name: godeclutter description: Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans. url: https://github.com/c3l3si4n/godeclutter category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/gospider.yaml ================================================ --- name: gospider description: 'Gospider - Fast web spider written in Go ' url: https://github.com/jaeles-project/gospider category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [crawl] ================================================ FILE: weapons/gotator.yaml ================================================ --- name: gotator description: Gotator is a tool to generate DNS wordlists through permutations. url: https://github.com/Josue87/gotator category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/gotestwaf.yaml ================================================ --- name: gotestwaf description: An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses url: https://github.com/wallarm/gotestwaf category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/goverview.yaml ================================================ --- name: goverview description: goverview - Get an overview of the list of URLs url: https://github.com/j3ssie/goverview category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/gowitness.yaml ================================================ --- name: gowitness description: '🔍 gowitness - a golang, web screenshot utility using Chrome Headless ' url: https://github.com/sensepost/gowitness category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/graphql-voyager.yaml ================================================ --- name: graphql-voyager description: '🛰️ Represent any GraphQL API as an interactive graph ' url: https://github.com/APIs-guru/graphql-voyager category: tool type: Utils platform: [linux, macos, windows] lang: TypeScript tags: [graphql] ================================================ FILE: weapons/graphw00f.yaml ================================================ --- name: graphw00f description: GraphQL Server Engine Fingerprinting utility url: https://github.com/dolevf/graphw00f category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [graphql] ================================================ FILE: weapons/grc.yaml ================================================ --- name: grc description: generic colouriser url: https://github.com/garabik/grc category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/grex.yaml ================================================ --- name: grex description: A command-line tool and library for generating regular expressions from user-provided test cases url: https://github.com/pemistahl/grex category: tool type: Utils platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/gron.yaml ================================================ --- name: gron description: Make JSON greppable! url: https://github.com/tomnomnom/gron category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [json] ================================================ FILE: weapons/gxss.yaml ================================================ --- name: gxss description: Blind XSS service alerting over slack or email url: https://github.com/rverton/gxss category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [xss, blind-xss] ================================================ FILE: weapons/h2csmuggler.yaml ================================================ --- name: h2csmuggler description: HTTP Request Smuggling Detection Tool url: https://github.com/assetnote/h2csmuggler category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [smuggle] ================================================ FILE: weapons/h2spacex.yaml ================================================ --- name: h2spacex description: HTTP/2 Single Packet Attack low level library based on Scapy url: https://github.com/nxenon/h2spacex category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [race-condition] ================================================ FILE: weapons/hacks.yaml ================================================ --- name: hacks description: 'A collection of hacks and one-off scripts ' url: https://github.com/tomnomnom/hacks category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/hakcheckurl.yaml ================================================ --- name: hakcheckurl description: Takes a list of URLs and returns their HTTP response codes url: https://github.com/hakluke/hakcheckurl category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/hakrawler.yaml ================================================ --- name: hakrawler description: 'Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application ' url: https://github.com/hakluke/hakrawler category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [crawl] ================================================ FILE: weapons/hakrevdns.yaml ================================================ --- name: hakrevdns description: 'Small, fast tool for performing reverse DNS lookups en masse. ' url: https://github.com/hakluke/hakrevdns category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/haktrails.yaml ================================================ --- name: haktrails description: Golang client for querying SecurityTrails API data url: https://github.com/hakluke/haktrails category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/hashcat.yaml ================================================ --- name: hashcat description: "World's fastest and most advanced password recovery utility " url: https://github.com/hashcat/hashcat/ category: tool type: Fuzzer platform: [linux, macos, windows] lang: C tags: [] ================================================ FILE: weapons/hbxss.yaml ================================================ --- name: hbxss description: Security test tool for Blind XSS url: https://github.com/hahwul/hbxss category: tool type: Utils platform: [linux, macos, windows] lang: Ruby tags: [xss, blind-xss] ================================================ FILE: weapons/headerpwn.yaml ================================================ --- name: headerpwn description: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers url: https://github.com/devanshbatham/headerpwn category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [header] ================================================ FILE: weapons/headi.yaml ================================================ --- name: headi description: Customisable and automated HTTP header injection url: https://github.com/mlcsec/headi category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [header] ================================================ FILE: weapons/hetty.yaml ================================================ --- name: hetty description: Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community. url: https://github.com/dstotijn/hetty category: tool type: Proxy platform: [linux, macos, windows] lang: Go tags: [mitmproxy] ================================================ FILE: weapons/hinject.yaml ================================================ --- name: hinject description: 'Host Header Injection Checker ' url: https://github.com/dwisiswant0/hinject category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [header] ================================================ FILE: weapons/hoppscotch.yaml ================================================ --- name: hoppscotch description: Open source API development ecosystem url: https://github.com/hoppscotch/hoppscotch category: tool type: Utils platform: [linux, macos, windows] lang: TypeScript tags: [http] ================================================ FILE: weapons/htcat.yaml ================================================ --- name: htcat description: 'Parallel and Pipelined HTTP GET Utility ' url: https://github.com/htcat/htcat category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/http-request-smuggler.yaml ================================================ --- name: http-request-smuggler description: url: https://github.com/PortSwigger/http-request-smuggler category: tool-addon type: Scanner platform: [linux, macos, windows, burpsuite] lang: Java tags: [smuggle] ================================================ FILE: weapons/http-request-smuggling.yaml ================================================ --- name: http-request-smuggling description: HTTP Request Smuggling Detection Tool url: https://github.com/anshumanpattnaik/http-request-smuggling category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/http-script-generator.yaml ================================================ --- name: http-script-generator description: url: https://github.com/h3xstream/http-script-generator category: tool-addon type: Utils platform: [linux, macos, windows, zap, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/http2smugl.yaml ================================================ --- name: http2smugl description: This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server. url: https://github.com/neex/http2smugl category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/httpie.yaml ================================================ --- name: httpie description: modern, user-friendly command-line HTTP client for the API era url: https://github.com/httpie/httpie category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [http] ================================================ FILE: weapons/httprobe.yaml ================================================ --- name: httprobe description: 'Take a list of domains and probe for working HTTP and HTTPS servers ' url: https://github.com/tomnomnom/httprobe category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/httptoolkit.yaml ================================================ --- name: httptoolkit description: HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac url: https://github.com/httptoolkit/httptoolkit category: tool type: Utils platform: [linux, macos, windows] lang: tags: [] ================================================ FILE: weapons/httpx.yaml ================================================ --- name: httpx description: 'httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. ' url: https://github.com/projectdiscovery/httpx category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/hurl.yaml ================================================ --- name: hurl description: Hurl, run and test HTTP requests. url: https://github.com/Orange-OpenSource/hurl category: tool type: Utils platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/inql.yaml ================================================ --- name: inql description: url: https://github.com/doyensec/inql category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Python tags: [] ================================================ FILE: weapons/interactsh.yaml ================================================ --- name: interactsh description: An OOB interaction gathering server and client library url: https://github.com/projectdiscovery/interactsh category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [oast] ================================================ FILE: weapons/intrigue-core.yaml ================================================ --- name: intrigue-core description: 'Discover Your Attack Surface ' url: https://github.com/intrigueio/intrigue-core category: tool type: Recon platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/jaeles.yaml ================================================ --- name: jaeles description: 'The Swiss Army knife for automated Web Application Testing ' url: https://github.com/jaeles-project/jaeles category: tool type: Army-Knife platform: [linux, macos, windows] lang: Go tags: [live-audit] ================================================ FILE: weapons/jsfuck.yaml ================================================ --- name: jsfuck description: Write any JavaScript with 6 Characters url: https://github.com/aemkei/jsfuck category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [xss] ================================================ FILE: weapons/jsluice.yaml ================================================ --- name: jsluice description: Extract URLs, paths, secrets, and other interesting bits from JavaScript url: https://github.com/BishopFox/jsluice category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [js-analysis] ================================================ FILE: weapons/jsonwebtoken.github.io.yaml ================================================ --- name: jsonwebtoken.github.io description: JWT En/Decode and Verify url: https://github.com/jsonwebtoken/jsonwebtoken.github.io category: browser-addon type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [jwt] ================================================ FILE: weapons/jsprime.yaml ================================================ --- name: jsprime description: a javascript static security analysis tool url: https://github.com/dpnishant/jsprime category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [js-analysis] ================================================ FILE: weapons/jwt-cracker.yaml ================================================ --- name: jwt-cracker description: 'Simple HS256 JWT token brute force cracker ' url: https://github.com/lmammino/jwt-cracker category: tool type: Fuzzer platform: [linux, macos, windows] lang: JavaScript tags: [jwt] ================================================ FILE: weapons/jwt-hack.yaml ================================================ --- name: jwt-hack description: 🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce) url: https://github.com/hahwul/jwt-hack category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [jwt] ================================================ FILE: weapons/jwt_tool.yaml ================================================ --- name: jwt_tool description: A toolkit for testing, tweaking and cracking JSON Web Tokens url: https://github.com/ticarpi/jwt_tool category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [jwt, authentication] ================================================ FILE: weapons/katana.yaml ================================================ --- name: katana description: A next-generation crawling and spidering framework. url: https://github.com/projectdiscovery/katana category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [crawl] ================================================ FILE: weapons/kiterunner.yaml ================================================ --- name: kiterunner description: Contextual Content Discovery Tool url: https://github.com/assetnote/kiterunner category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/knife.yaml ================================================ --- name: knife description: A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅 url: https://github.com/bit4woo/knife category: tool-addon type: Utils platform: [linux, macos, windows] lang: Java tags: [] ================================================ FILE: weapons/knock.yaml ================================================ --- name: knock description: 'Knock Subdomain Scan ' url: https://github.com/guelfoweb/knock category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [subdomains] ================================================ FILE: weapons/lazyrecon.yaml ================================================ --- name: lazyrecon description: 'This script is intended to automate your reconnaissance process in an organized fashion ' url: https://github.com/nahamsec/lazyrecon category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/liffy.yaml ================================================ --- name: Liffy description: Local file inclusion exploitation tool url: https://github.com/mzfr/liffy category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [lfi] ================================================ FILE: weapons/longtongue.yaml ================================================ --- name: longtongue description: Customized Password/Passphrase List inputting Target Info url: https://github.com/edoardottt/longtongue category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/mapcidr.yaml ================================================ --- name: mapcidr description: Utility program to perform multiple operations for a given subnet/CIDR ranges url: https://github.com/projectdiscovery/mapcidr category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [cidr, network, ip-manipulation] ================================================ FILE: weapons/masscan.yaml ================================================ --- name: masscan description: 'TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. ' url: https://github.com/robertdavidgraham/masscan category: tool type: Recon platform: [linux, macos, windows] lang: C tags: [portscan] ================================================ FILE: weapons/medusa.yaml ================================================ --- name: medusa description: 'Fastest recursive HTTP fuzzer, like a Ferrari. ' url: https://github.com/riza/medusa category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/meg.yaml ================================================ --- name: meg description: 'Fetch many paths for many hosts - without killing the hosts ' url: https://github.com/tomnomnom/meg category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/megplus.yaml ================================================ --- name: megplus description: "Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED] " url: https://github.com/EdOverflow/megplus category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/metasploit.yaml ================================================ --- name: Metasploit description: The world’s most used penetration testing framework url: https://github.com/rapid7/metasploit-framework category: tool type: Army-Knife platform: [linux, macos, windows] lang: Ruby tags: [pentest] ================================================ FILE: weapons/missing-cve-nuclei-templates.yaml ================================================ --- name: missing-cve-nuclei-templates description: Weekly updated list of missing CVEs in nuclei templates official repository url: https://github.com/edoardottt/missing-cve-nuclei-templates category: tool type: Utils platform: [linux, macos, windows] lang: Txt tags: [nuclei-templates] ================================================ FILE: weapons/mitmproxy.yaml ================================================ --- name: mitmproxy description: An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. url: https://github.com/mitmproxy/mitmproxy category: tool type: Proxy platform: [linux, macos, windows] lang: Python tags: [mitmproxy] ================================================ FILE: weapons/mubeng.yaml ================================================ --- name: mubeng description: An incredibly fast proxy checker & IP rotator with ease. url: https://github.com/kitabisa/mubeng category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: ================================================ FILE: weapons/naabu.yaml ================================================ --- name: naabu description: 'A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests ' url: https://github.com/projectdiscovery/naabu category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [portscan] ================================================ FILE: weapons/neonmarker.yaml ================================================ --- name: Neonmarker description: url: https://github.com/kingthorin/neonmarker category: tool-addon type: utils platform: [linux, macos, windows, zap] lang: Java tags: [] ================================================ FILE: weapons/nikto.yaml ================================================ --- name: nikto description: 'Nikto web server scanner ' url: https://github.com/sullo/nikto category: tool type: Scanner platform: [linux, macos, windows] lang: Perl tags: [] ================================================ FILE: weapons/nmap.yaml ================================================ --- name: nmap description: 'Nmap - the Network Mapper. Github mirror of official SVN repository. ' url: https://github.com/nmap/nmap category: tool type: Scanner platform: [linux, macos, windows] lang: C tags: [portscan] ================================================ FILE: weapons/noir.yaml ================================================ --- name: noir description: Attack surface detector that identifies endpoints by static analysis url: https://github.com/noir-cr/noir category: tool type: Recon platform: [linux, macos] lang: Crystal tags: [endpoint, url, attack-surface] ================================================ FILE: weapons/nosqli.yaml ================================================ --- name: nosqli description: NoSql Injection CLI tool url: https://github.com/Charlie-belmer/nosqli category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [nosqli] ================================================ FILE: weapons/notebook.yaml ================================================ --- name: notebook description: Notebook Caido Plugin url: https://github.com/caido-community/notebook category: tool-addon type: Utils platform: [linux, macos, windows, caido] lang: TypeScript tags: [note] ================================================ FILE: weapons/nuclei-templates.yaml ================================================ --- name: nuclei-templates description: Community curated list of templates for the nuclei engine to find security vulnerabilities. url: https://github.com/projectdiscovery/nuclei-templates category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [nuclei-templates] ================================================ FILE: weapons/nuclei-wordfence-cve.yaml ================================================ --- name: nuclei-wordfence-cve description: Every single day new templates are added to this repo based on updates on Wordfence.com url: https://github.com/topscoder/nuclei-wordfence-cve category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [nuclei-templates] ================================================ FILE: weapons/nuclei.yaml ================================================ --- name: nuclei description: 'Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use. ' url: https://github.com/projectdiscovery/nuclei category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: ================================================ FILE: weapons/ob_hacky_slack.yaml ================================================ --- name: ob_hacky_slack description: Hacky Slack - a bash script that sends beautiful messages to Slack url: https://github.com/openbridge/ob_hacky_slack category: tool type: Utils platform: [linux, macos, windows] lang: Shell tags: [notify] ================================================ FILE: weapons/of-CORS.yaml ================================================ --- name: of-CORS description: Identifying and exploiting CORS misconfigurations on the internal networks url: https://github.com/trufflesecurity/of-CORS category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [cors] ================================================ FILE: weapons/osv-scanner.yaml ================================================ --- name: osv-scanner description: Vulnerability scanner which uses the OSV database to find vulnerabilities in open source projects url: https://github.com/google/osv-scanner category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [vulnerability-scanner, dependency-scanning] ================================================ FILE: weapons/owasp-zap-jwt-addon.yaml ================================================ --- name: owasp-zap-jwt-addon description: url: https://github.com/SasanLabs/owasp-zap-jwt-addon category: tool-addon type: utils platform: [linux, macos, windows, zap] lang: Java tags: [jwt] ================================================ FILE: weapons/owasp-zap-maplocal-addon.yaml ================================================ --- name: Map Local description: ZAP add-on which allows mapping of responses to content of a chosen local file. url: https://github.com/Keindel/owasp-zap-maplocal-addon category: tool-addon type: Utils platform: [linux, macos, windows, zap] lang: Java tags: [] ================================================ FILE: weapons/oxml_xxe.yaml ================================================ --- name: oxml_xxe description: 'A tool for embedding XXE/XML exploits into different filetypes ' url: https://github.com/BuffaloWill/oxml_xxe category: tool type: Utils platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/pagodo.yaml ================================================ --- name: pagodo description: pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching url: https://github.com/opsdisk/pagodo category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/param-miner.yaml ================================================ --- name: param-miner description: Param Miner url: https://github.com/PortSwigger/param-miner category: tool-addon type: Fuzzer platform: [linux, macos, windows, burpsuite] lang: Java tags: [param, cache-vuln] ================================================ FILE: weapons/parameth.yaml ================================================ --- name: parameth description: This tool can be used to brute discover GET and POST parameters url: https://github.com/maK-/parameth category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/pcap-burp.yaml ================================================ --- name: pcap-burp description: Pcap importer for Burp url: https://github.com/nccgroup/pcap-burp category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/pdtm.yaml ================================================ --- name: pdtm description: ProjectDiscovery's Open Source Tool Manager url: https://github.com/projectdiscovery/pdtm category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [package-manager, tools-management] ================================================ FILE: weapons/pentest-env.yaml ================================================ --- name: pentest-env description: Pentest environment deployer (kali linux + targets) using vagrant and chef. url: https://github.com/Sliim/pentest-env category: tool type: Env platform: [linux, macos, windows] lang: Ruby tags: [pentest] ================================================ FILE: weapons/pentest-tools.yaml ================================================ --- name: pentest-tools description: 'Custom pentesting tools ' url: https://github.com/gwen001/pentest-tools category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/pet.yaml ================================================ --- name: pet description: Simple command-line snippet manager, written in Go. url: https://github.com/knqyf263/pet category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/plution.yaml ================================================ --- name: plution description: Prototype pollution scanner using headless chrome url: https://github.com/raverrr/plution category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [prototypepollution, prototype-pollution] ================================================ FILE: weapons/postMessage-tracker.yaml ================================================ --- name: postMessage-tracker description: A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon url: https://github.com/fransr/postMessage-tracker category: browser-addon type: Utils platform: [linux, macos, windows, chrome] lang: JavaScript tags: [js-analysis] ================================================ FILE: weapons/ppfuzz.yaml ================================================ --- name: ppfuzz description: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 url: https://github.com/dwisiswant0/ppfuzz category: tool type: Fuzzer platform: [linux, macos, windows] lang: Rust tags: [prototypepollution, prototype-pollution] ================================================ FILE: weapons/pphack.yaml ================================================ --- name: pphack description: The Most Advanced Client-Side Prototype Pollution Scanner url: https://github.com/edoardottt/pphack category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [prototypepollution, prototype-pollution] ================================================ FILE: weapons/ppmap.yaml ================================================ --- name: ppmap description: A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets. url: https://github.com/kleiton0x00/ppmap category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [prototypepollution, prototype-pollution] ================================================ FILE: weapons/proxify.yaml ================================================ --- name: proxify description: Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay url: https://github.com/projectdiscovery/proxify category: tool type: Proxy platform: [linux, macos, windows] lang: Go tags: [mitmproxy] ================================================ FILE: weapons/puredns.yaml ================================================ --- name: puredns description: Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries. url: https://github.com/d3mondev/puredns category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, dns] ================================================ FILE: weapons/pwncat.yaml ================================================ --- name: pwncat description: 'pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE) ' url: https://github.com/cytopia/pwncat category: tool type: Utils platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/qsreplace.yaml ================================================ --- name: qsreplace description: 'Accept URLs on stdin, replace all query string values with a user-supplied value ' url: https://github.com/tomnomnom/qsreplace category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/quickjack.yaml ================================================ --- name: quickjack description: Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks. url: https://github.com/samyk/quickjack category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/race-the-web.yaml ================================================ --- name: race-the-web description: Tests for race conditions in web applications by sending out a user-specified number of requests to a target URL (or URLs) simultaneously, and then compares the responses from the server for uniqueness. url: https://github.com/TheHackerDev/race-the-web category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [race-condition] ================================================ FILE: weapons/rapidscan.yaml ================================================ --- name: rapidscan description: 'The Multi-Tool Web Vulnerability Scanner. ' url: https://github.com/skavngr/rapidscan category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/recon_profile.yaml ================================================ --- name: recon_profile description: 'Recon profile (bash profile) for bugbounty ' url: https://github.com/nahamsec/recon_profile category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/reconftw.yaml ================================================ --- name: reconftw description: reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities url: https://github.com/six2dez/reconftw category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [] ================================================ FILE: weapons/reflect.yaml ================================================ --- name: reflect description: url: https://github.com/cak/reflect category: tool-addon type: Utils platform: [linux, macos, windows, zap] lang: Kotlin tags: [] ================================================ FILE: weapons/reflected-parameters.yaml ================================================ --- name: reflected-parameters description: url: https://github.com/PortSwigger/reflected-parameters category: tool-addon type: Recon platform: [linux, macos, windows, burpsuite] lang: Java tags: [param] ================================================ FILE: weapons/rengine.yaml ================================================ --- name: rengine description: 'reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information. ' url: https://github.com/yogeshojha/rengine category: tool type: Recon platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/rep.yaml ================================================ --- name: rep description: Chrome DevTools extension for capturing, modifying, and replaying HTTP requests with AI-powered security analysis url: https://github.com/repplus/rep category: browser-addon type: Proxy platform: [chrome] lang: JavaScript tags: [http, repeater] ================================================ FILE: weapons/reverse-shell-generator.yaml ================================================ --- name: reverse-shell-generator description: Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs) url: https://github.com/0dayCTF/reverse-shell-generator category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [payload] ================================================ FILE: weapons/ronin.yaml ================================================ --- name: Ronin description: Free and Open Source Ruby Toolkit for Security Research and Development url: https://ronin-rb.dev category: tool type: Army-knife platform: [linux, macos, windows] lang: Ruby tags: [pentest, crawl, recon, exploit] ================================================ FILE: weapons/ropr.yaml ================================================ --- name: ropr description: A blazing fast™ multithreaded ROP Gadget finder. ropper url: https://github.com/Ben-Lichtman/ropr category: tool type: Exploit platform: [linux, macos, windows] lang: Rust tags: [rop] ================================================ FILE: weapons/rusolver.yaml ================================================ --- name: rusolver description: Fast and accurate DNS resolver. url: https://github.com/Edu4rdSHL/rusolver category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [dns] ================================================ FILE: weapons/s3reverse.yaml ================================================ --- name: s3reverse description: 'The format of various s3 buckets is convert in one format. for bugbounty and security testing. ' url: https://github.com/hahwul/s3reverse category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [s3] ================================================ FILE: weapons/safecopy.yaml ================================================ --- name: safecopy description: url: https://github.com/yashrs/safecopy category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [] ================================================ FILE: weapons/scan4all.yaml ================================================ --- name: scan4all description: Official repository vuls Scan url: https://github.com/hktalent/scan4all category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/scilla.yaml ================================================ --- name: scilla description: 🏴‍☠️ Information Gathering tool 🏴‍☠️ dns/subdomain/port enumeration url: https://github.com/edoardottt/scilla category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, dns, port] ================================================ FILE: weapons/security-crawl-maze.yaml ================================================ --- name: security-crawl-maze description: Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document. url: https://github.com/google/security-crawl-maze category: tool type: Utils platform: [linux, macos, windows] lang: HTML tags: [crawl] ================================================ FILE: weapons/security-research-pocs.yaml ================================================ --- name: security-research-pocs description: Proof-of-concept codes created as part of security research done by Google Security Team. url: https://github.com/google/security-research-pocs category: tool type: Utils platform: [linux, macos, windows] lang: C++ tags: [] ================================================ FILE: weapons/semgrep.yaml ================================================ --- name: semgrep description: Lightweight static analysis for many languages. Find bug variants with patterns that look like source code. url: https://github.com/semgrep/semgrep category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sast, code-analysis] ================================================ FILE: weapons/shosubgo.yaml ================================================ --- name: shosubgo description: Small tool to Grab subdomains using Shodan api. url: https://github.com/incogbyte/shosubgo category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/shuffledns.yaml ================================================ --- name: shuffledns description: 'shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support. ' url: https://github.com/projectdiscovery/shuffledns category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [dns] ================================================ FILE: weapons/singularity.yaml ================================================ --- name: singularity description: A DNS rebinding attack framework. url: https://github.com/nccgroup/singularity category: tool type: Exploit platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/slackcat.yaml ================================================ --- name: slackcat description: CLI utility to post files and command output to slack url: https://github.com/bcicen/slackcat category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [notify] ================================================ FILE: weapons/smap.yaml ================================================ --- name: Smap description: a drop-in replacement for Nmap powered by shodan.io url: https://github.com/s0md3v/smap/ category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [port] ================================================ FILE: weapons/smugglefuzz.yaml ================================================ --- name: SmuggleFuzz description: A rapid HTTP downgrade smuggling scanner written in Go. url: https://github.com/Moopinger/smugglefuzz/ category: tool type: Fuzzer platform: [linux, macos, windows] lang: Go tags: [smuggle, fuzz] ================================================ FILE: weapons/smuggler.yaml ================================================ --- name: smuggler description: 'Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 ' url: https://github.com/defparam/smuggler category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [smuggle] ================================================ FILE: weapons/smugglex.yaml ================================================ --- name: smugglex description: Rust-powered HTTP Request Smuggling Scanner url: https://github.com/hahwul/smugglex category: tool type: Scanner platform: [linux, macos, windows] lang: Rust tags: [smuggle] ================================================ FILE: weapons/sn0int.yaml ================================================ --- name: sn0int description: Semi-automatic OSINT framework and package manager url: https://github.com/kpcyrd/sn0int category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [osint] ================================================ FILE: weapons/spiderfoot.yaml ================================================ --- name: spiderfoot description: SpiderFoot automates OSINT collection so that you can focus on analysis. url: https://github.com/smicallef/spiderfoot category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [osint] ================================================ FILE: weapons/sqliv.yaml ================================================ --- name: sqliv description: massive SQL injection vulnerability scanner url: https://github.com/the-robot/sqliv category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/sqlmap.yaml ================================================ --- name: sqlmap description: Automatic SQL injection and database takeover tool url: https://github.com/sqlmapproject/sqlmap category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [sqli] ================================================ FILE: weapons/ssrf-sheriff.yaml ================================================ --- name: ssrf-sheriff description: 'A simple SSRF-testing sheriff written in Go ' url: https://github.com/teknogeek/ssrf-sheriff category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [ssrf] ================================================ FILE: weapons/sub404.yaml ================================================ --- name: Sub404 description: A python tool to check subdomain takeover vulnerability url: https://github.com/r3curs1v3-pr0xy/sub404 category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, takeover] ================================================ FILE: weapons/subbrute.yaml ================================================ --- name: SubBrute description: https://github.com/TheRook/subbrute url: https://github.com/aboul3la/Sublist3r category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [subdomains] ================================================ FILE: weapons/subfinder.yaml ================================================ --- name: subfinder description: 'Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. ' url: https://github.com/projectdiscovery/subfinder category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/subgen.yaml ================================================ --- name: subgen description: A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver! url: https://github.com/pry0cc/subgen category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains] ================================================ FILE: weapons/subjack.yaml ================================================ --- name: subjack description: 'Subdomain Takeover tool written in Go ' url: https://github.com/haccer/subjack category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, takeover] ================================================ FILE: weapons/subjs.yaml ================================================ --- name: subjs description: Fetches javascript file from a list of URLS or subdomains. url: https://github.com/lc/subjs category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url, subdomains] ================================================ FILE: weapons/subs_all.yaml ================================================ --- name: subs_all description: 'Subdomain Enumeration Wordlist. 8956437 unique words. Updated. ' url: https://github.com/emadshanab/subs_all category: tool type: Recon platform: [linux, macos, windows] lang: tags: [subdomains] ================================================ FILE: weapons/subzy.yaml ================================================ --- name: subzy description: Subdomain takeover vulnerability checker url: https://github.com/LukaSikic/subzy category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [subdomains, takeover] ================================================ FILE: weapons/sudomy.yaml ================================================ --- name: Sudomy description: subdomain enumeration tool to collect subdomains and analyzing domains url: https://github.com/screetsec/Sudomy category: tool type: Recon platform: [linux, macos, windows] lang: Shell tags: [subdomains] ================================================ FILE: weapons/taborator.yaml ================================================ --- name: taborator description: url: https://github.com/hackvertor/taborator category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Java tags: [oast] ================================================ FILE: weapons/template-generator.yaml ================================================ --- name: template-generator description: 'A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates. ' url: https://github.com/fransr/template-generator category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/testssl.sh.yaml ================================================ --- name: testssl.sh description: 'Testing TLS/SSL encryption anywhere on any port ' url: https://github.com/drwetter/testssl.sh category: tool type: Scanner platform: [linux, macos, windows] lang: Shell tags: [ssl] ================================================ FILE: weapons/thc-hydra.yaml ================================================ --- name: thc-hydra description: 'hydra ' url: https://github.com/vanhauser-thc/thc-hydra category: tool type: Fuzzer platform: [linux, macos, windows] lang: C tags: [] ================================================ FILE: weapons/tiscripts.yaml ================================================ --- name: tiscripts description: Turbo Intruder Scripts url: https://github.com/defparam/tiscripts category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/tlsx.yaml ================================================ --- name: tlsx description: Fast and configurable TLS grabber focused on TLS based data collection url: https://github.com/projectdiscovery/tlsx category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [ssl, tls, certificates] ================================================ FILE: weapons/toxssin.yaml ================================================ --- name: toxssin description: An XSS exploitation command-line interface and payload generator. url: https://github.com/t3l3machus/toxssin category: tool type: Exploit platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/tplmap.yaml ================================================ --- name: tplmap description: Server-Side Template Injection and Code Injection Detection and Exploitation Tool url: https://github.com/epinna/tplmap category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/trivy.yaml ================================================ --- name: trivy description: Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more url: https://github.com/aquasecurity/trivy category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [vulnerability-scanner, container-security, sbom] ================================================ FILE: weapons/trufflehog.yaml ================================================ --- name: trufflehog description: Find and verify credentials in git repositories, filesystems, and S3 buckets url: https://github.com/trufflesecurity/trufflehog category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [secret-scanning, credentials] ================================================ FILE: weapons/turbo-intruder.yaml ================================================ --- name: turbo-intruder description: url: https://github.com/PortSwigger/turbo-intruder category: tool-addon type: Utils platform: [linux, macos, windows, burpsuite] lang: Kotlin tags: [] ================================================ FILE: weapons/uncover.yaml ================================================ --- name: uncover description: Quickly discover exposed hosts on the internet using multiple search engine. url: https://github.com/projectdiscovery/uncover category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/unfurl.yaml ================================================ --- name: unfurl description: 'Pull out bits of URLs provided on stdin ' url: https://github.com/tomnomnom/unfurl category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/urlgrab.yaml ================================================ --- name: urlgrab description: 'A golang utility to spider through a website searching for additional links. ' url: https://github.com/IAmStoxe/urlgrab category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/urlhunter.yaml ================================================ --- name: urlhunter description: a recon tool that allows searching on URLs that are exposed via shortener services url: https://github.com/utkusen/urlhunter category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/urlprobe.yaml ================================================ --- name: urlprobe description: 'Urls status code & content length checker ' url: https://github.com/1ndianl33t/urlprobe category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/uro.yaml ================================================ --- name: uro description: declutters url lists for crawling/pentesting url: https://github.com/s0md3v/uro category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [url] ================================================ FILE: weapons/urx.yaml ================================================ --- name: urx description: Extracts URLs from OSINT Archives for Security Insights url: https://github.com/hahwul/urx category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [url] ================================================ FILE: weapons/wapiti.yaml ================================================ --- name: wapiti description: Web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications. url: https://github.com/wapiti-scanner/wapiti category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [vulnerability-scanner, web-scanner] ================================================ FILE: weapons/waybackurls.yaml ================================================ --- name: waybackurls description: 'Fetch all the URLs that the Wayback Machine knows about for a domain ' url: https://github.com/tomnomnom/waybackurls category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/waymore.yaml ================================================ --- name: waymore description: Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X! url: https://github.com/xnl-h4ck3r/waymore category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [url] ================================================ FILE: weapons/weaponised-XSS-payloads.yaml ================================================ --- name: weaponised-XSS-payloads description: XSS payloads designed to turn alert(1) into P1 url: https://github.com/hakluke/weaponised-XSS-payloads category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [xss, documents] ================================================ FILE: weapons/web_cache_poison.yaml ================================================ --- name: web_cache_poison description: web cache poison - Top 1 web hacking technique of 2019 url: https://github.com/fngoo/web_cache_poison category: tool type: Scanner platform: [linux, macos, windows] lang: Shell tags: [cache-vuln] ================================================ FILE: weapons/websocket-connection-smuggler.yaml ================================================ --- name: websocket-connection-smuggler description: websocket-connection-smuggler url: https://github.com/hahwul/websocket-connection-smuggler category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [smuggle] ================================================ FILE: weapons/wfuzz.yaml ================================================ --- name: wfuzz description: 'Web application fuzzer ' url: https://github.com/xmendez/wfuzz category: tool type: Fuzzer platform: [linux, macos, windows] lang: Python tags: [] ================================================ FILE: weapons/wprecon.yaml ================================================ --- name: wprecon description: Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go. url: https://github.com/blackcrw/wprecon category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/wpscan.yaml ================================================ --- name: wpscan description: 'WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. ' url: https://github.com/wpscanteam/wpscan category: tool type: Scanner platform: [linux, macos, windows] lang: Ruby tags: [] ================================================ FILE: weapons/ws-smuggler.yaml ================================================ --- name: ws-smuggler description: WebSocket Connection Smuggler url: https://github.com/hahwul/ws-smuggler category: tool type: Scanner platform: [linux, macos, windows] lang: Go tags: [smuggle] ================================================ FILE: weapons/wssip.yaml ================================================ --- name: wssip description: Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa. url: https://github.com/nccgroup/wssip category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/wuzz.yaml ================================================ --- name: wuzz description: 'Interactive cli tool for HTTP inspection ' url: https://github.com/asciimoo/wuzz category: tool type: Utils platform: [linux, macos, windows] lang: Go tags: [http] ================================================ FILE: weapons/x8.yaml ================================================ --- name: x8 description: Hidden parameters discovery suite url: https://github.com/Sh1Yo/x8 category: tool type: Recon platform: [linux, macos, windows] lang: Rust tags: [] ================================================ FILE: weapons/xless.yaml ================================================ --- name: xless description: The Serverless Blind XSS App url: https://github.com/mazen160/xless category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [xss, blind-xss] ================================================ FILE: weapons/xnLinkFinder.yaml ================================================ --- name: xnLinkFinder description: A python tool used to discover endpoints (and potential parameters) for a given target url: https://github.com/xnl-h4ck3r/xnLinkFinder category: tool type: Recon platform: [linux, macos, windows] lang: Python tags: [js-analysis] ================================================ FILE: weapons/xsinator.com.yaml ================================================ --- name: xsinator.com description: XS-Leak Browser Test Suite url: https://github.com/RUB-NDS/xsinator.com category: tool type: Scanner platform: [linux, macos, windows] lang: JavaScript tags: [] ================================================ FILE: weapons/xss-cheatsheet-data.yaml ================================================ --- name: xss-cheatsheet-data description: 'This repository contains all the XSS cheatsheet data to allow contributions from the community. ' url: https://github.com/PortSwigger/xss-cheatsheet-data category: tool type: Utils platform: [linux, macos, windows] lang: tags: [xss] ================================================ FILE: weapons/xsscrapy.yaml ================================================ --- name: xsscrapy description: "XSS/SQLi spider. Give it a URL and it'll test every link it finds for\ \ XSS and some SQLi. " url: https://github.com/DanMcInerney/xsscrapy category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/xsser.yaml ================================================ --- name: xsser description: 'Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. ' url: https://github.com/epsylon/xsser category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/xssor2.yaml ================================================ --- name: xssor2 description: XSS'OR - Hack with JavaScript. url: https://github.com/evilcos/xssor2 category: tool type: Utils platform: [linux, macos, windows] lang: JavaScript tags: [xss] ================================================ FILE: weapons/xsssniper.yaml ================================================ --- name: xsssniper description: An automatic XSS discovery tool url: https://github.com/gbrindisi/xsssniper category: tool type: Scanner platform: [linux, macos, windows] lang: Python tags: [xss] ================================================ FILE: weapons/xurlfind3r.yaml ================================================ --- name: xurlfind3r description: A command-line utility designed to discover URLs for a given domain in a simple, efficient way. url: https://github.com/hueristiq/xurlfind3r category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [url] ================================================ FILE: weapons/xxeserv.yaml ================================================ --- name: xxeserv description: A mini webserver with FTP support for XXE payloads url: https://github.com/staaldraad/xxeserv category: tool type: Exploit platform: [linux, macos, windows] lang: Go tags: [] ================================================ FILE: weapons/ysoserial.net.yaml ================================================ --- name: ysoserial.net description: 'Deserialization payload generator for a variety of .NET formatters ' url: https://github.com/pwntester/ysoserial.net category: tool type: Utils platform: [linux, macos, windows] lang: C# tags: [deserialize] ================================================ FILE: weapons/ysoserial.yaml ================================================ --- name: ysoserial description: 'A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. ' url: https://github.com/frohoff/ysoserial category: tool type: Utils platform: [linux, macos, windows] lang: Java tags: [deserialize] ================================================ FILE: weapons/zap-browser-extension.yaml ================================================ --- name: ZAP Browser Extension description: A browser extension which allows ZAP to interact directly with the browser. url: https://github.com/zaproxy/browser-extension/ category: browser-addon type: Utils platform: [linux, macos, windows, firefox, chrome, zap] lang: TypeScript tags: [browser-record] ================================================ FILE: weapons/zap-cli.yaml ================================================ --- name: zap-cli description: 'A simple tool for interacting with OWASP ZAP from the commandline. ' url: https://github.com/Grunny/zap-cli category: tool type: Scanner platform: [linux, macos, windows, zap] lang: Python tags: [] ================================================ FILE: weapons/zap-hud.yaml ================================================ --- name: zap-hud description: url: https://github.com/zaproxy/zap-hud category: tool-addon type: Utils platform: [linux, macos, windows, zap] lang: Java tags: [] ================================================ FILE: weapons/zaproxy.yaml ================================================ --- name: ZAP description: The ZAP core project url: https://github.com/zaproxy/zaproxy category: tool type: Army-Knife platform: [linux, macos, windows, zap] lang: Java tags: [mitmproxy, live-audit, crawl] ================================================ FILE: weapons/zdns.yaml ================================================ --- name: zdns description: Fast CLI DNS Lookup Tool url: https://github.com/zmap/zdns category: tool type: Recon platform: [linux, macos, windows] lang: Go tags: [dns] ================================================ FILE: weapons/zip-bomb.yaml ================================================ --- name: zip-bomb description: Create a ZIPBomb for a given uncompressed size (flat and nested modes). url: https://github.com/damianrusinek/zip-bomb category: tool type: Utils platform: [linux, macos, windows] lang: Python tags: [zipbomb]