holly-hacker / git-dumperLinks
A tool to dump exposed .git repositories
☆70Updated last month
Alternatives and similar repositories for git-dumper
Users that are interested in git-dumper are comparing it to the libraries listed below
Sorting:
- Command line client for HackTheBox☆22Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆65Updated last year
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆7Updated last year
- My new C2 framework☆40Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆62Updated 2 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆27Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- Using Discord as a C2 - Proof of Concept☆60Updated 2 years ago
- External recon toolkit☆50Updated 6 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆24Updated last week
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 6 months ago
- Unicode characters that will translate a single character to multiple characters in domain names or TLD's☆42Updated 7 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆104Updated last month
- 🔗 A curated list of awesome Caido related projects☆40Updated 3 months ago
- ☆74Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆57Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated 11 months ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year