A tool library for searching your leaked sourcecode on github
☆19Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for gitleak
Users that are interested in gitleak are comparing it to the libraries listed below
Sorting:
- IPFS☆16Apr 4, 2018Updated 7 years ago
- Collect Apple ID's straight from Apple's Login Form☆21Mar 15, 2017Updated 9 years ago
- Process CSV and TSV files with SQL.☆13May 27, 2022Updated 3 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Docker image for building MongoDB for Linux from source.☆12Mar 4, 2026Updated 2 weeks ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- ☆10Jun 17, 2017Updated 8 years ago
- Skeleton repo for setting up flask + travis-ci + unittests + db migrations with Google App Engine!☆11May 12, 2015Updated 10 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- Helm charts repository☆11Mar 22, 2024Updated 2 years ago
- A simple bot that open chests for you.☆14Nov 3, 2018Updated 7 years ago
- A tool to spider Github or search URLs for various information leaks☆33May 22, 2023Updated 2 years ago
- exifprobe☆13Jul 11, 2022Updated 3 years ago
- A Fediverse phrase bot inspired by YouTube videos and urban legends about the Deep Web.☆11Jun 4, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Talk on folds & unfolds (and combinations) for general algebraic data types☆12Aug 6, 2013Updated 12 years ago
- ☆13Dec 15, 2025Updated 3 months ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Social media profile aggregator for node.js☆23Jul 30, 2014Updated 11 years ago
- CLI utility to download from webshare.cz☆11Mar 13, 2024Updated 2 years ago
- Maltego transform for OpenDNS Investigate API☆12Jan 6, 2015Updated 11 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- It's an experiment based on 09 KDD paper, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs☆10Jan 8, 2019Updated 7 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Simple checker for ok.ru partial private data disclosure☆13Oct 5, 2023Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- all about coding☆10Updated this week
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Social Network Profile crawler scripts and Web App: this is evil☆13Apr 6, 2022Updated 3 years ago