MattKeeley / gitscannerView external linksLinks
Tool for scanning domains for .git directories.
☆17Oct 2, 2023Updated 2 years ago
Alternatives and similar repositories for gitscanner
Users that are interested in gitscanner are comparing it to the libraries listed below
Sorting:
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Project documentation about the development, releasing, and maintenance of the Ubuntu Linux distribution.☆20Updated this week
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- This is a repo for our docker image of the kubelet binary.☆13Feb 4, 2026Updated last week
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆15Nov 11, 2024Updated last year
- Shared features of vscode-clangd and coc-clangd☆13Feb 3, 2026Updated last week
- ☆16Nov 23, 2021Updated 4 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 7 months ago
- ☆49Feb 11, 2023Updated 3 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 2 months ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Jul 15, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 2 months ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆26Apr 28, 2023Updated 2 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated 2 weeks ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆44Sep 19, 2025Updated 4 months ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Jul 11, 2023Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- CobaltStrike beacon written in golang☆27Apr 4, 2023Updated 2 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated 2 weeks ago
- Design + Code for kelsanford.design☆11Jul 1, 2015Updated 10 years ago
- ☆80Aug 2, 2023Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- ☆35Mar 28, 2025Updated 10 months ago
- Some handy scripts to collect hosts installed redis (using Shodan search engine) and exploit them☆33Sep 4, 2016Updated 9 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 2 years ago
- Exploit to dump ipmi hashes☆37Apr 21, 2023Updated 2 years ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Jun 23, 2025Updated 7 months ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Feb 14, 2025Updated 11 months ago
- ☆38Jan 7, 2025Updated last year
- Start here!☆11Feb 19, 2020Updated 5 years ago
- Python3 Script to Remove all Overlays Generated by Kometa.☆36Jan 1, 2026Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago