josehelps / git-wild-huntLinks
A tool to hunt for credentials in github wild AKA git*hunt
☆294Updated 2 years ago
Alternatives and similar repositories for git-wild-hunt
Users that are interested in git-wild-hunt are comparing it to the libraries listed below
Sorting:
- Find cloud assets that no one wants exposed 🔎 ☁️☆345Updated 4 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆645Updated this week
- An automated target reconnaissance pipeline.☆435Updated 2 years ago
- Search exposed EBS volumes for secrets☆298Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆519Updated 2 years ago
- ☆561Updated 4 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆622Updated last year
- A modular OSINT honeypot for blue teamers☆334Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆750Updated 8 months ago
- gather gather gather☆581Updated 2 months ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- FestIn - Open S3 Bucket Scanner☆234Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆625Updated 2 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆647Updated 6 years ago
- These are the regexes that power truffleHog☆218Updated 2 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆249Updated 2 weeks ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆401Updated 4 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆251Updated 4 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 4 months ago
- ☆334Updated 2 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆560Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆267Updated 6 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago