Retrieve all mails of users related to a git repository, a git user or a git organization
☆58May 1, 2024Updated last year
Alternatives and similar repositories for glit
Users that are interested in glit are comparing it to the libraries listed below
Sorting:
- ☆23Jun 28, 2025Updated 8 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- Android deeplink misconfiguration detector and exploitation tool☆65Feb 22, 2026Updated last week
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- SEO es una herramienta de osint para un correo electronico.☆10Dec 2, 2022Updated 3 years ago
- CORPINT - Corporate / Business Intelligence☆58Aug 22, 2025Updated 6 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 10 months ago
- ☆10Jun 10, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- ☆18May 18, 2024Updated last year
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- Supertruder but better☆31Mar 10, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆36Apr 9, 2023Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆69Sep 25, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 3 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- ☆14Feb 17, 2022Updated 4 years ago
- The first and only (for now) Bulgarian OSINT tools list.☆22Mar 12, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆48Aug 26, 2025Updated 6 months ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- Get gmail alternate email and GAIA ID by gmail with API interface☆25Jul 16, 2023Updated 2 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆142Jun 27, 2023Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆40Dec 27, 2025Updated 2 months ago
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Jun 13, 2024Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago