chaudharyarjun / RepoReaper
RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their subdomains.
☆33Updated 10 months ago
Alternatives and similar repositories for RepoReaper:
Users that are interested in RepoReaper are comparing it to the libraries listed below
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Find subdomains by searching public certificate records☆14Updated 7 months ago
- Manage attack surface data on Elasticsearch☆21Updated last year
- ☆27Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆16Updated 9 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 5 months ago
- ☆16Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- Tool for scanning domains for .git directories.☆12Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆14Updated last year
- ☆16Updated last month
- ☆24Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 4 months ago
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- ☆51Updated last month
- Tomcat backdoor based on CS blog☆27Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- OSED Practice binary☆24Updated last year
- Searching .evtx logs for remote connections☆24Updated last year
- Lexmark CVE-2023-26067☆23Updated last year
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year