liamg / gitjackerLinks
🔪 Leak git repositories from misconfigured websites
☆1,572Updated 2 years ago
Alternatives and similar repositories for gitjacker
Users that are interested in gitjacker are comparing it to the libraries listed below
Sorting:
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,595Updated 5 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,397Updated 10 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,568Updated 3 months ago
- A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.☆1,813Updated last year
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,123Updated 2 weeks ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,359Updated 3 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,513Updated last year
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,492Updated 2 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,178Updated last year
- Reverse proxies cheatsheet☆1,822Updated last year
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,240Updated 8 months ago
- The Swiss Army knife for automated Web Application Testing☆2,256Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,775Updated last year
- Mass scan IPs for vulnerable services☆1,036Updated 3 years ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,766Updated 6 months ago
- Subdomain Takeover tool written in Go☆1,981Updated last year
- GitHub recon tool leveraging Code Search API. Scans for exposed API keys across all of GitHub, not just known repos and orgs. Support for…☆1,316Updated this week
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,449Updated this week
- Fetch information about a public Google document.☆905Updated last year
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,365Updated 4 years ago
- Storage Explorer - Publicly open storage viewer (Amazon S3 Bucket, Azure Blob, FTP server, HTTP Index Of/)☆446Updated last year
- CORS Misconfiguration Scanner☆1,441Updated 2 years ago
- A fast tool to scan CRLF vulnerability written in Go☆1,446Updated 3 weeks ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆2,194Updated last year
- A wrapper around grep, to help you grep for things☆1,965Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,406Updated 3 weeks ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,153Updated 4 years ago
- CrackQ: A Python Hashcat cracking queue system☆937Updated 9 months ago