An information gathering tool to collect git commit emails in version control host services
☆152May 5, 2019Updated 6 years ago
Alternatives and similar repositories for Gitmails
Users that are interested in Gitmails are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Jan 21, 2019Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- Automated information gathering tool for pentest☆55Jul 7, 2016Updated 9 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- ☆526Sep 15, 2022Updated 3 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆418Feb 18, 2023Updated 3 years ago
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,142Oct 20, 2025Updated 5 months ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- network reconnaissance toolkit☆436Dec 17, 2018Updated 7 years ago
- Micro$oft Windows Hacking Pack☆525Mar 6, 2018Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆141Apr 29, 2020Updated 5 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429May 31, 2022Updated 3 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 8 years ago
- Yet Another MOnitoring Tool☆61Apr 21, 2018Updated 7 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 7 months ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆498Oct 2, 2021Updated 4 years ago
- A command-line network packet crafting and injection utility☆521Sep 29, 2023Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago