Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.
☆22Jan 10, 2022Updated 4 years ago
Alternatives and similar repositories for GIT-HUNTER
Users that are interested in GIT-HUNTER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Jan 7, 2026Updated 2 months ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- 🔒 Password Exposed Helper Function - Check if a password has been exposed in a data breach.☆222Mar 1, 2026Updated 3 weeks ago
- The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing w…☆17Feb 5, 2024Updated 2 years ago
- 503925365条微博个壬信息惨遭扫爆,an网售价不到20元人民币!本工具可以帮恁查询恁的微博账号是否中招☆30Oct 1, 2020Updated 5 years ago
- A python program to exploit android through ADB☆17Apr 30, 2021Updated 4 years ago
- Catalog of security breaches☆24Mar 15, 2025Updated last year
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository for my FlipperZero JavaScript apps☆26Apr 11, 2024Updated last year
- Read text messages in the android phone inbox.☆13Jun 27, 2021Updated 4 years ago
- PoC code for stealing the WiFi password of a network with a Lovebox IOT device connected☆13May 12, 2022Updated 3 years ago
- FB-HACKER☆13Apr 2, 2023Updated 2 years ago
- ☆11Mar 5, 2020Updated 6 years ago
- God's Eye - [GUI] Email, IP and Nickname OSINT & Password breach hunting tool.☆65Apr 30, 2022Updated 3 years ago
- Script to download, build, and install the most recent libplist, libusbmuxd, libimobiledevice, libirecovery, idevicerestore, usbmuxd, lib…☆11Feb 16, 2026Updated last month
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 6 years ago
- 🌟 **Phone Number Details Extractor Code** Uncover phone number mysteries effortlessly! This Python code, powered by phonenumbers, revea…☆16Mar 2, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- A simple Ransomware Generator☆53Oct 5, 2024Updated last year
- Password leak analysis program☆16Oct 1, 2022Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆45May 27, 2024Updated last year
- An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidel…☆49Mar 17, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Compromised SSH servers and scraped mirror sites leaked scripts intended for malicious use.☆134Oct 15, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- ip-tracker live-location phone-tracker ip-tracker-adress live-location-tracker live-hacking☆20Feb 17, 2024Updated 2 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago