holly-hacker / git-dumperLinks
A tool to dump exposed .git repositories
☆74Updated 7 months ago
Alternatives and similar repositories for git-dumper
Users that are interested in git-dumper are comparing it to the libraries listed below
Sorting:
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆27Updated 6 months ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Automate converting webshells into reverse shells.☆72Updated last week
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆70Updated 2 years ago
- Quickly find all identities someone has used on their Github commits☆17Updated last year
- Unicode characters that will translate a single character to multiple characters in domain names or TLD's☆50Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆41Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- 🔗 A curated list of awesome Caido related projects☆46Updated 10 months ago
- Command line client for HackTheBox☆25Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 10 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆129Updated 5 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆131Updated last month
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆65Updated 2 years ago
- Curated list of categorized User Agents☆109Updated last week
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 8 months ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- My new C2 framework☆40Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆47Updated last year
- External recon toolkit☆54Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year