peterjaric / archaeologitLinks
Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.
☆142Updated 6 years ago
Alternatives and similar repositories for archaeologit
Users that are interested in archaeologit are comparing it to the libraries listed below
Sorting:
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆148Updated 2 months ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆306Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆93Updated 6 years ago
- A search engine for content shared publicly via cloud storage services☆100Updated last year
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Some tools to automate recon - 003random☆294Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Takes ip range, Scan all open SSL Certs, Grab Cnames☆112Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Tools to gather subdomains from Bug Bounty programs☆64Updated 7 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆122Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆221Updated 3 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated 2 years ago