peterjaric / archaeologit
Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.
☆142Updated 6 years ago
Alternatives and similar repositories for archaeologit:
Users that are interested in archaeologit are comparing it to the libraries listed below
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆146Updated 2 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆304Updated 6 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆155Updated 9 months ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆91Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆221Updated 2 years ago
- secretz, minimizing the large attack surface of Travis CI☆325Updated 2 years ago
- Takes ip range, Scan all open SSL Certs, Grab Cnames☆112Updated 6 years ago
- ☆160Updated 7 years ago
- Amazon S3 bucket spelunking!☆85Updated 7 years ago
- A Python3 based single-file subdomain enumerator☆90Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆271Updated last year
- ☆274Updated 3 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- An Entropy-Based Link Vulnerability Tool☆61Updated 7 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆100Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆121Updated 6 years ago
- Some tools to automate recon - 003random☆296Updated 6 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- ☆326Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago