hahwul / WebHackersWeaponsLinks
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
☆4,063Updated 2 months ago
Alternatives and similar repositories for WebHackersWeapons
Users that are interested in WebHackersWeapons are comparing it to the libraries listed below
Sorting:
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,304Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,850Updated 10 months ago
- Collection of methodology and test case for various web vulnerabilities.☆6,414Updated 2 months ago
- A Workflow Engine for Offensive Security☆5,611Updated 2 weeks ago
- A curated list of amazingly awesome Burp Extensions☆3,198Updated 3 months ago
- HTTP parameter discovery suite.☆5,666Updated 3 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,164Updated 11 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,229Updated 8 months ago
- A collection of custom security tools for quick needs.☆3,211Updated 2 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,615Updated 3 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,151Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,374Updated 5 months ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,344Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,492Updated last week
- Rockyou for web fuzzing☆2,810Updated 2 weeks ago
- List of Awesome Red Teaming Resources☆7,262Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,316Updated last week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,524Updated 9 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,281Updated last year
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,727Updated 5 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,802Updated 3 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,095Updated 4 months ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆2,749Updated 11 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,191Updated 3 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,750Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,765Updated 11 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,428Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,243Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,100Updated last week
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,721Updated last year