This is a collection of tools that I use during web application penetration tests. A lot of these exist elsewhere and I mainly made this repository as an exercise and I use it in most of my engagements.
Below is a summary of some of the included tools and documentation
- HTTP-SHC - HTTP security headers checks
- Web-Comment-Scrape - Scrapes a page for HTML and JS comments
- HTTP-Scan - Makes HTTP requests from targets file and logs responses
- Site-Map-Enum - Enumeration of site maps identified during web application tests
- SSL-TLS - This was just an exercise with Python for me - use SSLScan for this type of testing
- TimedUserEnum - A WIP, PoC for analyzing timed server responses for valid/invalid usernames of web apps
- AutoWeb - Automate the first day of web application penetration test
- CORSAudit - This tool checks for CORS-related security issues
- UA-Util - HTTP header User-Agent Utility (randomizing for evasion, etc)
- Dredgeon - Dredges through a file looking for potential web-related sensitive information.
- BurpExportURIs - Extract URIs from Burp Suite's project files.
This is a set of wordlists that I have generated over the years of web application penetration testing.
- Wordlists - Collection of all wordlists
- WWWordlist - This tool scrapes a page and generates a word list