Retrieve all mails of users related to a git repository, a git user or a git organization
☆57May 1, 2024Updated last year
Alternatives and similar repositories for glit
Users that are interested in glit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SEO es una herramienta de osint para un correo electronico.☆10Dec 2, 2022Updated 3 years ago
- CORPINT - Corporate / Business Intelligence☆58Aug 22, 2025Updated 7 months ago
- Android deeplink misconfiguration detector and exploitation tool☆76Feb 22, 2026Updated last month
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 9 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- Supertruder but better☆31Mar 10, 2023Updated 3 years ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆37Apr 9, 2023Updated 3 years ago
- ☆23Jun 28, 2025Updated 9 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- Zehef is an osint tool to track emails☆997Nov 13, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- Private api to get session cookie of google account, login by email, password and some recovery option☆14Jan 8, 2019Updated 7 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- Get gmail alternate email and GAIA ID by gmail with API interface☆25Jul 16, 2023Updated 2 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆50Aug 26, 2025Updated 7 months ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆17Mar 13, 2024Updated 2 years ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 4 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- hostagram osint tool Instagram | hostagram 1.4☆110Mar 28, 2026Updated 2 weeks ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Turn your Kali Linux machine into a fully-functional 5 GHz WiFi Router☆12Nov 26, 2025Updated 4 months ago
- Collections of tools and methods created to aid in OSINT collection☆24Sep 17, 2022Updated 3 years ago