Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.
☆28Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Assorted tools for security-related task for git repositories☆58Apr 10, 2022Updated 3 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A CLI-based intercepting TLS proxy for TCP☆19Aug 31, 2022Updated 3 years ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 4 months ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated last month
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Reverse engineers GQL Schema and generates template payloads☆46Apr 5, 2019Updated 6 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- ☆42Jun 23, 2024Updated last year
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Advanced Reconnaissance Framework — Google Chrome extension☆30Mar 4, 2016Updated 10 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- This is a branch of the sysbench project, including changes from the MariaDB project☆11Sep 14, 2017Updated 8 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Aug 5, 2022Updated 3 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- ☆46Sep 10, 2020Updated 5 years ago
- Command and Control server on Slack☆29Jan 30, 2019Updated 7 years ago
- A Node.js module that helps users create, find, and join "events" such as a multiplayer game. You may think of this as a matchmaking lob…☆15Jul 28, 2025Updated 7 months ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- Sample code for "Reflections on trusting trust" by Ken Thompson☆13May 19, 2018Updated 7 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago