josehelps / git-wild-hunt
A tool to hunt for credentials in github wild AKA git*hunt
β293Updated 2 years ago
Alternatives and similar repositories for git-wild-hunt:
Users that are interested in git-wild-hunt are comparing it to the libraries listed below
- Find cloud assets that no one wants exposed π βοΈβ338Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automationβ616Updated 9 months ago
- β559Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions β From Manual Testing to Security Automation"β350Updated 4 years ago
- An automated target reconnaissance pipeline.β429Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.β508Updated last year
- automated web assets enumeration & scanning [DEPRECATED]β288Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.β381Updated 4 years ago
- Search exposed EBS volumes for secretsβ297Updated last year
- β379Updated 2 weeks ago
- Collection of scripts & fingerprinting tricks for Shodan.ioβ254Updated 4 years ago
- β244Updated 8 months ago
- Convolutional neural network for analyzing pentest screenshotsβ1,088Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes β¦β256Updated 2 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β745Updated 5 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.β396Updated 4 years ago
- gather gather gatherβ573Updated last week
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.β619Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger toolβ265Updated 2 years ago
- LinkedIn reconnaissance toolβ51Updated 3 years ago
- β333Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploitsβ162Updated last week
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.β243Updated last week
- Yar is a tool for plunderin' organizations, users and/or repositories.β236Updated 4 years ago
- Network Pivoting Toolkitβ440Updated last year
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security profβ¦β413Updated 4 years ago
- Awesome cloud enumeratorβ982Updated last week
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.β266Updated last month
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.β557Updated 2 years ago