Web Security Tools
-
BurpSuite
Army-Knife/ALL: the BurpSuite project
-
jaeles
Army-Knife/SCAN: The Swiss Army knife for automated Web Application Testing
-
zaproxy
Army-Knife/ALL: The OWASP ZAP core project
-
OneForAll
Discovery/ALL: OneForAll是一款功能强大的子域收集工具
-
lazyrecon
Discovery/ALL: This script is intended to automate your reconnaissance process in an organized fashion
-
Photon
Discovery/CRAWL: Incredibly fast crawler designed for OSINT.
-
cc.py
Discovery/CRAWL: Extracting URLs of a specific target based on the results of "commoncrawl.org"
-
gospider
Discovery/CRAWL: Gospider - Fast web spider written in Go
-
hakrawler
Discovery/CRAWL: Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
-
DNSDumpster
Discovery/DNS: Online dns recon & research, find & lookup dns records
-
SecurityTrails
Discovery/DNS: Online dns / subdomain / recon tool
-
dnsprobe
Discovery/DNS: DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
-
hakrevdns
Discovery/DNS: Small, fast tool for performing reverse DNS lookups en masse.
-
shuffledns
Discovery/DNS: shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.
-
Amass
Discovery/DOMAIN: In-depth Attack Surface Mapping and Asset Discovery
-
Sublist3r
Discovery/DOMAIN: Fast subdomains enumeration tool for penetration testers
-
altdns
Discovery/DOMAIN: Generates permutations, alterations and mutations of subdomains and then resolves them
-
assetfinder
Discovery/DOMAIN: Find domains and subdomains related to a given domain
-
findomain
Discovery/DOMAIN: The fastest and cross-platform subdomain enumerator, do not waste your time.
-
knock
Discovery/DOMAIN: Knock Subdomain Scan
-
subfinder
Discovery/DOMAIN: Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
-
ParamSpider
Discovery/FUZZ: Mining parameters from dark corners of Web Archives
-
dirsearch
Discovery/FUZZ: Web path scanner
-
gobuster
Discovery/FUZZ: Directory/File, DNS and VHost busting tool written in Go
-
GitMiner
Discovery/GIT: Tool for advanced mining for content on Github
-
gitGraber
Discovery/GIT: gitGraber
-
github-search
Discovery/GIT: Tools to perform basic search on GitHub.
-
gitrob
Discovery/GIT: Reconnaissance tool for GitHub organizations
-
Arjun
Discovery/HTTP: HTTP parameter discovery suite.
-
Shodan
Discovery/PORT: World's first search engine for Internet-connected devices
-
masscan
Discovery/PORT: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
-
naabu
Discovery/PORT: A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
-
nmap
Discovery/PORT: Nmap - the Network Mapper. Github mirror of official SVN repository.
-
subjack
Discovery/TKOV: Subdomain Takeover tool written in Go
-
waybackurls
Discovery/URL: Fetch all the URLs that the Wayback Machine knows about for a domain
-
Silver
Discovery/VULN: Mass scan IPs for vulnerable services
-
httprobe
Fetch/TOM: Take a list of domains and probe for working HTTP and HTTPS servers
-
meg
Fetch/TOM: Fetch many paths for many hosts - without killing the hosts
-
websocket-connection-smuggler
Fetch/WSOCK: websocket-connection-smuggler
-
Corsy
Scanner/CORS: CORS Misconfiguration Scanner
-
Medusa
Scanner/FUZZ: Automatic Video Library Manager for TV Shows. It watches for new episodes of your favorite shows, and when they are posted it does its magic.
-
VHostScan
Scanner/FUZZ: A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
-
ffuf
Scanner/FUZZ: Fast web fuzzer written in Go
-
thc-hydra
Scanner/FUZZ: hydra
-
wfuzz
Scanner/FUZZ: Web application fuzzer
-
GraphQLmap
Scanner/GQL: GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
-
LFISuite
Scanner/LFI: Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
-
dotdotpwn
Scanner/LFI: DotDotPwn - The Directory Traversal Fuzzer
-
NoSQLMap
Scanner/NOSQL: Automated NoSQL database enumeration and web application exploitation tool.
-
Osmedeus
Scanner/RECON: Fully automated offensive security framework for reconnaissance and vulnerability scanning
-
Sn1per
Scanner/RECON: Automated pentest framework for offensive security experts
-
megplus
Scanner/RECON: Automated reconnaissance wrapper - TomNomNom's meg on steroids. [DEPRECATED]
-
S3Scanner
Scanner/S3: Scan for open AWS S3 buckets and dump the contents
-
SQLNinja
Scanner/SQL: SQL Injection scanner
-
sqlmap
Scanner/SQL: Automatic SQL injection and database takeover tool
-
a2sv
Scanner/SSL: Auto Scanning to SSL Vulnerability
-
testssl.sh
Scanner/SSL: Testing TLS/SSL encryption anywhere on any port
-
SSRFmap
Scanner/SSRF: Automatic SSRF fuzzer and exploitation tool
-
ssrf-sheriff
Scanner/SSRF: A simple SSRF-testing sheriff written in Go
-
wpscan
Scanner/WP: WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.
-
Striker
Scanner/WVS: Striker is an offensive information and vulnerability scanner.
-
arachni
Scanner/WVS: Web Application Security Scanner Framework
-
nikto
Scanner/WVS: Nikto web server scanner
-
rapidscan
Scanner/WVS: The Multi-Tool Web Vulnerability Scanner.
-
zap-cli
Scanner/WVS: A simple tool for interacting with OWASP ZAP from the commandline.
-
XSStrike
Scanner/XSS: Most advanced XSS scanner.
-
XSpear
Scanner/XSS: Powerfull XSS Scanning and Parameter analysis tool&gem
-
dalfox
Scanner/XSS: 力 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
-
ezXSS
Scanner/XSS: ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
-
xsser
Scanner/XSS: Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
-
CSP Evaluator
Utility/CSP: Online CSP Evaluator from google
-
Gf-Patterns
Utility/ENV: GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep
-
recon_profile
Utility/ENV: Recon profile (bash profile) for bugbounty
-
Phoenix
Utility/ETC: hahwul's online tools
-
fzf
Utility/FIND: A command-line fuzzy finder
-
SequenceDiagram
Utility/FLOW: Online tool for creating UML sequence diagrams
-
gf
Utility/GREP: A wrapper around grep, to help you grep for things
-
gron
Utility/JSON: Make JSON greppable!
-
PayloadsAllTheThings
Utility/PAYLOAD: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
s3reverse
Utility/S3: The format of various s3 buckets is convert in one format. for bugbounty and security testing.
-
gowitness
Utility/SHOT: gowitness - a golang, web screenshot utility using Chrome Headless
-
bountyplz
Utility/TEMPLATE: Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
-
template-generator
Utility/TEMPLATE: A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates.
-
anew
Utility/URL: A tool for adding new lines to files, skipping duplicates
-
burl
Utility/URL: A Broken-URL Checker
-
gau
Utility/URL: Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
-
hacks
Utility/URL: remove bad urls
-
qsreplace
Utility/URL: Accept URLs on stdin, replace all query string values with a user-supplied value
-
unfurl
Utility/URL: Pull out bits of URLs provided on stdin
-
Gopherus
Utility/VULN: This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
-
oxml_xxe
Utility/VULN: A tool for embedding XXE/XML exploits into different filetypes
-
pentest-tools
Utility/VULN: Custom pentesting tools
-
postMessage-tracker
Utility/VULN: A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon
-
ysoserial
Utility/VULN: A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
-
SecLists
Utility/WORD: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.