melvinsh / vcsmapView external linksLinks
vcsmap is a plugin-based tool to scan public version control systems for sensitive information.
☆142Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for vcsmap
Users that are interested in vcsmap are comparing it to the libraries listed below
Sorting:
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Status bar application for OS X to toggle the state of the system HTTP/HTTPS proxy.☆25Aug 31, 2021Updated 4 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 6 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- The Credential Mapper☆450Dec 1, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Nov 8, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆952Jan 12, 2023Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆562Aug 25, 2022Updated 3 years ago
- A command line tool for creating malicious outlook rules☆165Dec 11, 2018Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,218Nov 20, 2025Updated 2 months ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Mar 30, 2017Updated 8 years ago
- detectem - detect software and its version on websites.☆157Mar 25, 2021Updated 4 years ago