Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github dorks can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc.This list is supposed to be useful performing pen-testing of systems.
☆21Aug 11, 2024Updated last year
Alternatives and similar repositories for github-recon
Users that are interested in github-recon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆33Sep 15, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- ☆27Feb 10, 2026Updated 2 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Apr 27, 2023Updated 3 years ago
- Web Penetration Testing Course Materials☆31May 13, 2024Updated last year
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆26Nov 15, 2024Updated last year
- Some files for bruteforcing certain things.☆27Jul 12, 2021Updated 4 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Encode or decode base64 or base32 using a custom alphabet☆12Jan 29, 2019Updated 7 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆15Jan 18, 2025Updated last year
- ☆63Aug 22, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- system-expert-detect-malwares☆11Oct 22, 2024Updated last year
- This is a challenge made for NexTrace CTF, Malware Analysis case☆12Oct 21, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Human Emotion Detection through various deep learning techniques , including using diverse model architectures, Transfer learning , Trans…☆12Dec 4, 2024Updated last year
- This tool live-monitors specified Telegram channels for messages that contain certain keywords and forwards them to a private channel.☆38Oct 14, 2024Updated last year
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 6 years ago
- ☆13Dec 1, 2024Updated last year
- A custom implementation of OpenAI's GPT-2(124M) from scratch, following the paper "Language Models are Unsupervised Multitask Learners".W…☆11Apr 10, 2025Updated last year
- Divalent siRNA for prion disease☆18Mar 11, 2026Updated last month
- ☆14Sep 18, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 4 years ago
- Portfolio inspired from nest js official website using React and Material UI☆13Dec 14, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- This Malware is an application for MalwareEvasionTechniques repo .I used in it Registery staging in two modes R/W and I combined it with …☆16Sep 14, 2024Updated last year
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆15Dec 29, 2024Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year