One way to continuously monitor sensitive information that could be exposed on Github
☆173Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for GitMonitor
Users that are interested in GitMonitor are comparing it to the libraries listed below
Sorting:
- Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.☆1,410Feb 10, 2026Updated last month
- ☆46Mar 20, 2021Updated 5 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,549Mar 7, 2024Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆463Aug 21, 2023Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Offensive Security recon tool☆91Aug 27, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆417Nov 24, 2020Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- bingip2hosts is a Bing.com web scraper that discovers websites by IP address☆138May 3, 2022Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Jun 5, 2021Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Awesome cloud enumerator☆1,107Mar 9, 2025Updated last year
- ☆36Jan 22, 2025Updated last year
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Python script implementing the favicon hash trick to find subdomains.☆39Mar 28, 2023Updated 2 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Sep 12, 2021Updated 4 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆153Jun 25, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆320May 29, 2022Updated 3 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆257Aug 20, 2020Updated 5 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago