Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.
☆28Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Assorted tools for security-related task for git repositories☆58Apr 10, 2022Updated 3 years ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 5 years ago
- Continuous external monitoring and vulnerability scanning for organization assets☆15Jul 30, 2020Updated 5 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 3 months ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27May 6, 2021Updated 4 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Sep 13, 2016Updated 9 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- ☆36Apr 24, 2024Updated last year
- A listing of the most common vuln that you can link in your PoCs☆28Oct 27, 2018Updated 7 years ago
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- Decompiled source code of GhostCtrl. It ’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆12Nov 19, 2021Updated 4 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- ☆42Jun 23, 2024Updated last year
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Sep 10, 2025Updated 5 months ago
- Mixtures.info website source code.☆12Jan 28, 2025Updated last year
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- AARGH - An Arch Ricing Gentle Helper☆10Aug 22, 2025Updated 6 months ago
- ☆10Nov 28, 2021Updated 4 years ago