holly-hacker / git-dumperLinks
A tool to dump exposed .git repositories
☆73Updated 6 months ago
Alternatives and similar repositories for git-dumper
Users that are interested in git-dumper are comparing it to the libraries listed below
Sorting:
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- Command line client for HackTheBox☆23Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆67Updated last year
- Automate converting webshells into reverse shells.☆71Updated this week
- Markov Model libraries, optimized for cracking-focused password generations.☆112Updated 4 years ago
- 🔗 A curated list of awesome Caido related projects☆45Updated 8 months ago
- Quickly find all identities someone has used on their Github commits☆16Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆69Updated last year
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆27Updated 5 months ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆130Updated 4 months ago
- WebSocket REPL for pentesters☆230Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆73Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 7 months ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 7 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- My new C2 framework☆40Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Unicode characters that will translate a single character to multiple characters in domain names or TLD's☆49Updated last year
- A powerful and delightful PHP WebShell☆65Updated 9 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- External recon toolkit☆53Updated 11 months ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆112Updated 6 months ago
- ☆18Updated last year