Logo update

master
swisskyrepo 2016-12-27 17:01:52 +01:00
parent 707ca384ac
commit c15e76fc63
6 changed files with 14 additions and 8 deletions

View File

Before

Width:  |  Height:  |  Size: 16 KiB

After

Width:  |  Height:  |  Size: 16 KiB

BIN
Plugin/icons/icon128.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 64 KiB

BIN
Plugin/icons/icon16.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 KiB

BIN
Plugin/icons/icon48.png Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.1 KiB

View File

@ -7,10 +7,15 @@
"version": "1.0",
"browser_action": {
"default_icon": "icon.png",
"default_icon": "icons/icon.png",
"default_popup": "popup.html"
},
"icons": { "16": "icons/icon16.png",
"48": "icons/icon48.png",
"128": "icons/icon128.png"
},
// Permissions of the extension
"permissions": [
"activeTab",

View File

@ -9,13 +9,6 @@ Currently it scans for:
**Warnings :** Do not use this extension for illegal purpose, the main goal of it is to simplify the life of bug hunters. It's a BETA version, many improvements will come don't worry
## New features
- Detect if the server is up
- Start/Stop button
- New XSS vectors, work in different contexts (JS var, JS function, inside HTML tag, outside HTML tag)
- Basic page to list the vulnerabilities URL and TYPE
- Time based SQLi scanner using polyglot vectors (MySQL, SQLite, Oracle, Postgresql, SQL Server)
## Install
You need to install and configure the server, it uses ghost and flask with gunicorn
```
@ -41,6 +34,14 @@ var config_server = "http://127.0.0.1:8000";
```
4 - Browse the internet !
## New features
- Detect if the server is up
- Start/Stop button
- New XSS vectors, work in different contexts (JS var, JS function, inside HTML tag, outside HTML tag)
- Basic page to list the vulnerabilities URL and TYPE
- Time based SQLi scanner using polyglot vectors (MySQL, SQLite, Oracle, Postgresql, SQL Server)
- New logo for the plugin
## TODO - Work in progress
- Should detect target in source code.. (list of targets, then launch scan)
- Should detect and work with POST requests