Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.
☆22Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for GIT-HUNTER
Users that are interested in GIT-HUNTER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 个壬数扌居捡漏网站,适用于 尻尻 / 京東 / 庆丰哦不顺丰 / 维傅☆18Dec 1, 2020Updated 5 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 4 months ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing w…☆20Feb 5, 2024Updated 2 years ago
- ☆25Nov 20, 2023Updated 2 years ago
- A python program to exploit android through ADB☆17Apr 30, 2021Updated 5 years ago
- Check Have I Been Pwned and see if it's time for you to change passwords.☆138Mar 27, 2026Updated last month
- This project is a modification of Openra1n to fully boot jailbreak on iOS 15 - 16.5.1 . with the help of Palera1n's code, this project no…☆13Jul 27, 2023Updated 2 years ago
- A .NET Standard library for pentesting web apps against credential stuffing attacks.☆59Dec 21, 2021Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Curated list of data leaks around the world☆85Jul 19, 2022Updated 3 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- ☆11Mar 5, 2020Updated 6 years ago
- God's Eye - [GUI] Email, IP and Nickname OSINT & Password breach hunting tool.☆66Apr 30, 2022Updated 4 years ago
- Script to download, build, and install the most recent libplist, libusbmuxd, libimobiledevice, libirecovery, idevicerestore, usbmuxd, lib…☆11Feb 16, 2026Updated 2 months ago
- PoC code for stealing the WiFi password of a network with a Lovebox IOT device connected☆14May 12, 2022Updated 3 years ago
- Python3 script to dump breach data from Dehashed☆43Jun 30, 2025Updated 10 months ago
- A simple Ransomware Generator☆52Oct 5, 2024Updated last year
- ⚖️ R code to scrape the DoJ Capitol Breach Cases and daily data files of said scraped info via GH actions☆24Nov 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Password leak analysis program☆16Oct 1, 2022Updated 3 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- yet another distribution for jailbreaking A7-A11 iOS devices with checkra1n☆16Sep 3, 2024Updated last year
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆45May 27, 2024Updated last year
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidel…☆50Apr 27, 2026Updated last week
- 🔒 Laravel validation rule that checks if a password has been exposed in a data breach.☆88Feb 16, 2026Updated 2 months ago
- domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once w…☆71Jan 16, 2025Updated last year
- This repository presents a proof-of-concept of CVE-2024-23897☆17Apr 16, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Bypass iCloud☆13Dec 9, 2023Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- ☆15Feb 18, 2023Updated 3 years ago
- ip-tracker live-location phone-tracker ip-tracker-adress live-location-tracker live-hacking☆21Feb 17, 2024Updated 2 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago
- A web3 authentication service on IPFS gateway☆20Oct 12, 2024Updated last year