List (or plunder) private repos/gists to which a token has access, including those of other users
☆10Jan 29, 2022Updated 4 years ago
Alternatives and similar repositories for git-ls
Users that are interested in git-ls are comparing it to the libraries listed below
Sorting:
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 11 months ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Aug 24, 2020Updated 5 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 3 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 3 months ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Feb 13, 2023Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆300Nov 20, 2025Updated 3 months ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Jan 4, 2024Updated 2 years ago
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year