Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github dorks can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc.This list is supposed to be useful performing pen-testing of systems.
☆21Aug 11, 2024Updated last year
Alternatives and similar repositories for github-recon
Users that are interested in github-recon are comparing it to the libraries listed below
Sorting:
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- This tool live-monitors specified Telegram channels for messages that contain certain keywords and forwards them to a private channel.☆38Oct 14, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Raven is a powerful and customizable web crawler written in Go.☆41Sep 3, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- It automates the generation of search queries to discover exposed resources such as sensitive files, admin panels, open directories, and …☆76Updated this week
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Feb 12, 2026Updated 2 weeks ago
- ☆17Jun 14, 2023Updated 2 years ago
- ☆20Nov 28, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 4 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆170Jan 20, 2026Updated last month
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆24Nov 15, 2024Updated last year
- ☆18Nov 8, 2025Updated 3 months ago
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆52Jul 17, 2025Updated 7 months ago
- ☆20Sep 24, 2025Updated 5 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- ☆18Dec 23, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆49Apr 27, 2023Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- ☆13Oct 14, 2025Updated 4 months ago