internetwache / GitToolsLinks
A repository with 3 tools for pwn'ing websites with .git repositories available
☆4,111Updated 2 years ago
Alternatives and similar repositories for GitTools
Users that are interested in GitTools are comparing it to the libraries listed below
Sorting:
- A Tool for Domain Flyovers☆5,891Updated 3 years ago
- A tool to dump a git repository from a website☆2,383Updated 4 months ago
- File upload vulnerability scanner and exploitation tool.☆3,284Updated 7 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,585Updated 2 weeks ago
- HTTP parameter discovery suite.☆5,990Updated 10 months ago
- Knock Subdomain Scan☆4,112Updated 2 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,879Updated 4 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,104Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,496Updated 10 months ago
- Web application fuzzer☆6,366Updated last year
- A python script that finds endpoints in JavaScript files☆4,234Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,771Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,818Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,211Updated 4 months ago
- Potentially dangerous files☆3,257Updated 4 months ago
- A container repository for my public web hacks!☆2,018Updated 3 years ago
- CeWL is a Custom Word List Generator☆2,519Updated 2 months ago
- DNS Enumeration Script☆2,917Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool☆5,573Updated 2 weeks ago
- NSE script based on Vulners.com API☆3,360Updated 3 months ago
- A curated list of amazingly awesome Burp Extensions☆3,340Updated 10 months ago
- Weaponized web shell☆3,461Updated 3 months ago
- Linux privilege escalation auditing tool☆6,338Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,893Updated 3 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,076Updated 2 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,827Updated 7 months ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,695Updated 3 months ago
- Monitor linux processes without root permissions☆5,823Updated 2 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,450Updated 4 months ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,483Updated 3 years ago