A tool to hunt for credentials in github wild AKA git*hunt
☆299Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for git-wild-hunt
Users that are interested in git-wild-hunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.☆1,410Feb 10, 2026Updated last month
- ☆198Jan 18, 2023Updated 3 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆844Feb 23, 2026Updated last month
- Monitoring GitHub for sensitive data shared publicly☆65Dec 20, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated 2 months ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Jun 8, 2025Updated 9 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- ☆332Dec 8, 2022Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Sep 12, 2021Updated 4 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,947Feb 28, 2025Updated last year
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆200Sep 25, 2021Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 6 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- ☆126Sep 2, 2019Updated 6 years ago
- A Docker container for remote penetration testing.☆139Mar 16, 2021Updated 5 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆107Aug 4, 2020Updated 5 years ago
- Finding exposed secrets and personal data in GitLab☆200Nov 18, 2024Updated last year
- ☆46Mar 20, 2021Updated 5 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The best FUD Crypter to make your .exe Trojan fully Undetectable from all AV's and protections☆19Oct 14, 2025Updated 5 months ago
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, …☆163Apr 22, 2021Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago