Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.
☆28Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Continuous external monitoring and vulnerability scanning for organization assets☆15Jul 30, 2020Updated 5 years ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 5 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 3 months ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27May 6, 2021Updated 4 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Cookie Crumbles: Breaking and Fixing Web Session Integrity☆24Aug 9, 2023Updated 2 years ago
- Advanced Reconnaissance Framework — Google Chrome extension☆29Mar 4, 2016Updated 10 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Apr 8, 2022Updated 3 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- Monitoring GitHub for sensitive data shared publicly☆65Dec 20, 2021Updated 4 years ago
- ☆36Apr 24, 2024Updated last year
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- A listing of the most common vuln that you can link in your PoCs☆28Oct 27, 2018Updated 7 years ago
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- AARGH - An Arch Ricing Gentle Helper☆10Aug 22, 2025Updated 6 months ago
- ☆10Nov 28, 2021Updated 4 years ago