Search .git folders for emails and URL's that should otherwise be hidden
☆33Mar 7, 2021Updated 5 years ago
Alternatives and similar repositories for GitRekt
Users that are interested in GitRekt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- These asshats like to steal without credit (XSxZR, CoAntics, SnagsxCO, XVooky)☆16Oct 25, 2022Updated 3 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Kali Linux Bugs & Problems Automatic Fix Script☆12Sep 14, 2017Updated 8 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- World's most Powerful and Advanced Cross Site Scripting Software☆28Jan 5, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated 2 months ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆21Sep 24, 2024Updated last year
- Python-automated program for finding and exploiting arbitrage opportunities in international currency exchange market using high frequenc…☆16Oct 27, 2021Updated 4 years ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆13May 8, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆17Aug 12, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Jun 8, 2021Updated 4 years ago
- RTTTL txt files that will work with the FIipperZero Music Player☆20Sep 24, 2024Updated last year
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆25Nov 21, 2020Updated 5 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- GZip HTTP Bombing in Python for everyone☆43Oct 18, 2017Updated 8 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- OSINT tool to guess and verify the email address of a person from information such as firstname, middlename, lastname, username...☆75Jan 28, 2024Updated 2 years ago
- Rust on the Quansheng UV-K5 Radio☆10Jul 9, 2024Updated last year