Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories
☆11Sep 26, 2024Updated last year
Alternatives and similar repositories for Git-eXposed
Users that are interested in Git-eXposed are comparing it to the libraries listed below
Sorting:
- ☆12Nov 13, 2024Updated last year
- ☆20Nov 28, 2024Updated last year
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- gxsuid is a powerful tool for interacting with Instagram profiles. It offers comprehensive functionalities such as searching by user ID o…☆27Sep 30, 2024Updated last year
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- 「🔑」Discord Brute Force Token☆10Mar 15, 2021Updated 5 years ago
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 4 months ago
- Wolfy AV Bypasser☆30Feb 8, 2023Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Este script é uma ferramenta em Python projetada para automatizar a avaliação de segurança de APIs. Ele utiliza a especificação OpenAPI p…☆24Jan 28, 2025Updated last year
- C++ header-only reasoning library☆16Jul 11, 2024Updated last year
- C++ header-only exact synthesis library☆17Jan 18, 2023Updated 3 years ago
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆19Jul 31, 2024Updated last year
- 「💉」XSS Payload List☆45Feb 26, 2023Updated 3 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- ☆15Oct 7, 2016Updated 9 years ago
- Script hecho en bash para realizar ataque de fuerza bruta contra el fichero xmlrpc.php de WordPress☆13May 5, 2023Updated 2 years ago
- An IP-XACT DOM for IEEE 1685-2014 in Python.☆31Feb 23, 2026Updated 3 weeks ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated last month
- ☆28Nov 10, 2020Updated 5 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated 11 months ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- C++ parsing library for simple formats used in logic synthesis and formal verification☆40Jun 28, 2024Updated last year
- This tool provides detailed analysis of changes between iOS firmware versions and their potential impact on device functionality.☆13Nov 4, 2024Updated last year
- Bibi-Bird is a SQL Injection Automation tool.☆37Feb 20, 2026Updated last month
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆24Jul 19, 2025Updated 8 months ago
- 「🍯」Simple low-interaction honeypot with FTP, Telnet and Web☆12Dec 7, 2024Updated last year
- C++ command shell library☆54Sep 30, 2024Updated last year
- Restores firmware and filesystem to iPhone/iPod Touch☆11Jun 7, 2010Updated 15 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- ☆11May 6, 2024Updated last year
- An Xposed Module which can recognize, parse verification code and copy it to clipboard when a new message arrives . / 识别短信验证码的Xposed模块,并…☆10Jan 5, 2019Updated 7 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year