Assorted tools for security-related task for git repositories
☆58Apr 10, 2022Updated 3 years ago
Alternatives and similar repositories for git
Users that are interested in git are comparing it to the libraries listed below
Sorting:
- Docker container for Zachary Rice Gitleaks☆20Aug 16, 2019Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Oct 24, 2022Updated 3 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- HTTP parameter discovery suite.☆93Apr 16, 2020Updated 5 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Domain availbility checker☆39Mar 7, 2021Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Nov 8, 2017Updated 8 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- ☆11Jun 19, 2024Updated last year
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Credentials Checking Framework☆53Feb 8, 2023Updated 3 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆47Feb 15, 2020Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Sep 25, 2019Updated 6 years ago
- A tool which scrapes public github repositories for common naming conventions in variables, folders and files☆296Jun 3, 2024Updated last year
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Apr 22, 2017Updated 8 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Automatically export CloudSQL databases to Google Cloud Storage☆10May 19, 2025Updated 9 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- All known and unknown public POC's for wordpress themes and plugins☆79Jun 23, 2021Updated 4 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago