UnkL4b / GitMinerView external linksLinks
Tool for advanced mining for content on Github
☆2,154Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for GitMiner
Users that are interested in GitMiner are comparing it to the libraries listed below
Sorting:
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- Reconnaissance tool for GitHub organizations☆6,135Sep 20, 2022Updated 3 years ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,143Jun 25, 2019Updated 6 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,502Jan 21, 2020Updated 6 years ago
- Searching sensitive files and contents in GitHub associated to company name or other key words☆604Nov 26, 2020Updated 5 years ago
- 动态多线程敏感信息泄露检测工具☆1,142Dec 17, 2016Updated 9 years ago
- GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)☆2,039May 21, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,218Nov 20, 2025Updated 2 months ago
- Web application fuzzer☆6,411Jan 21, 2026Updated 3 weeks ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,117Apr 21, 2024Updated last year
- Git All the Payloads! A collection of web attack payloads.☆3,891May 15, 2023Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,897Sep 27, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,386Jan 12, 2026Updated last month
- Command line utility for searching and downloading exploits☆1,811Sep 10, 2025Updated 5 months ago
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- Source Code Security Audit (源代码安全审计)☆3,188Sep 16, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,468Jan 9, 2025Updated last year
- A python script that finds endpoints in JavaScript files☆4,280Apr 13, 2024Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,802Aug 2, 2024Updated last year
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,270Sep 4, 2022Updated 3 years ago
- Find leaked secrets via github search☆3,133Oct 5, 2025Updated 4 months ago
- Know the dangers of credential reuse attacks.☆2,087Dec 9, 2025Updated 2 months ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,798Jan 19, 2020Updated 6 years ago
- A tool to dump the login password from the current linux user☆4,079Sep 5, 2025Updated 5 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- ☆2,315Dec 8, 2023Updated 2 years ago
- Knock Subdomain Scan☆4,131Oct 26, 2025Updated 3 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,910Apr 13, 2022Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,152Mar 6, 2025Updated 11 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,605Oct 4, 2024Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,028Feb 5, 2021Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,513Apr 9, 2024Updated last year
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago