☆89Feb 11, 2022Updated 4 years ago
Alternatives and similar repositories for gitbleed_tools
Users that are interested in gitbleed_tools are comparing it to the libraries listed below
Sorting:
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- ☆73Nov 22, 2021Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Python resource library for creating security related tooling☆79Jul 11, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- This is a MD5 password/passphrase brute force tool☆10Mar 13, 2021Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- ☆36Apr 24, 2024Updated last year
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 6 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Github dorking tool☆136Mar 12, 2022Updated 4 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated this week
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- ☆28Jun 2, 2021Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago