HackBar
A browser extension for Penetration Testing
HackBar란 무엇입니까?
HackBar은(는) 0140454에 의해 개발된 Chrome 확장 프로그램으로, 주요 기능은 "A browser extension for Penetration Testing"입니다.
확장 프로그램 스크린샷
HackBar 확장 프로그램 CRX 파일 다운로드
크롬 확장 프로그램을 crx 형식으로 다운로드하여 브라우저에 수동으로 설치하거나 crx 파일을 친구들과 공유하여 쉽게 크롬 확장 프로그램을 설치하세요.
확장 프로그램 사용 설명서
## Contributor - 0140454 - GitHub: https://github.com/0140454 - lebr0nli - GitHub: https://github.com/lebr0nli - boylin0 - GitHub: https://github.com/boylin0 - HSwift - GitHub: https://github.com/HSwift ## How to open it? 1. Open "Developer tools" (Press F12 or Ctrl+Shift+I) 2. Switch to "HackBar" tab 3. Enjoy it ## Features * Load * From tab (default) * From cURL command * Supported * HTTP methods * GET * POST * application/x-www-form-urlencoded * multipart/form-data * application/json * Request editing mode * Basic * Raw * Custom payload * For more information, please visit https://github.com/0140454/hackbar/blob/master/README.md * Auto Test * Common paths (Wordlist from dirsearch included) * SQLi * Dump all database names (MySQL, PostgreSQL) * Dump tables from database (MySQL, PostgreSQL) * Dump columns from database (MySQL, PostgreSQL) * Union select statement (MySQL, PostgreSQL) * Error-based injection statement (MySQL, PostgreSQL) * Dump in one shot payload (MySQL) * Reference: https://github.com/swisskyrepo/PayloadsAllTheThings * Dump current query payload (MySQL) * Reference: https://github.com/swisskyrepo/PayloadsAllTheThings * Space to Inline comment * XSS * Vue.js XSS payloads * Angular.js XSS payloads for strict CSP * Some snippets for CTF * Html encode/decode with hex/dec/entity name * String.fromCharCode encode/decode * LFI * PHP wrapper - Base64 * SSRF * AWS - IAM role name * SSTI * Jinja2 SSTI * Flask RCE Reference: https://twitter.com/realgam3/status/1184747565415358469 * Java SSTI * Shell * Python reverse shell cheatsheet * bash reverse shell cheatsheet * nc reverse shell cheatsheet * php reverse shell/web shell cheatsheet * Encoding * URL encode/decode * Base64 encode/decode * Hexadecimal encode/decode * Unicode encode/decode * Escape ASCII to hex/oct format * Hashing * MD5 * SHA1 * SHA256 * SHA384 * SHA512 ## Shortcuts * Load * Default: Alt + A * Split * Default: Alt + S * Execute * Default: Alt + X * Switch request editing mode * Default: Alt + M ## Third-party Libraries For more information, please visit https://github.com/0140454/hackbar#third-party-libraries
확장 프로그램 기본 정보
이름 | HackBar |
ID | ginpbkfigcoaokgflihfhhmglmbchinc |
공식 URL | https://chromewebstore.google.com/detail/hackbar/ginpbkfigcoaokgflihfhhmglmbchinc |
설명 | A browser extension for Penetration Testing |
파일 크기 | 1.55 MB |
설치 횟수 | 70,000 |
현재 버전 | 1.2.4 |
최근 업데이트 | 2024-02-26 |
출시 날짜 | 2020-05-29 |
평점 | 4.17/5 총 48 개의 평점 |
개발자 | 0140454 |
이메일 | [email protected] |
결제 유형 | free |
확장 프로그램 웹 사이트 | https://github.com/0140454/hackbar |
지원되는 언어 | en |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "name": "HackBar", "version": "1.2.4", "description": "A browser extension for Penetration Testing", "devtools_page": "devtools.html", "icons": { "128": "icon.png" }, "content_security_policy": { "extension_pages": "script-src 'self' 'wasm-unsafe-eval'; object-src 'self';" }, "permissions": [ "storage", "scripting", "webRequest", "declarativeNetRequest" ], "host_permissions": [ "*:\/\/*\/*" ], "web_accessible_resources": [ { "resources": [ "payloads\/*" ], "matches": [ "*:\/\/*\/*" ] } ], "commands": { "load_url": { "suggested_key": { "default": "Alt+A" }, "description": "Trigger 'Load'" }, "split_url": { "suggested_key": { "default": "Alt+S" }, "description": "Trigger 'Split'" }, "execute_url": { "suggested_key": { "default": "Alt+X" }, "description": "Trigger 'Execute'" }, "switch_mode": { "suggested_key": { "default": "Alt+M" }, "description": "Switch between 'Basic' and 'Raw' mode" } }, "manifest_version": 3, "background": { "service_worker": "background.js" }, "minimum_chrome_version": "107" } |