shogunlab / GitformantLinks
OSINT tool for discovering confidential data leaked on Github.
☆50Updated last year
Alternatives and similar repositories for Gitformant
Users that are interested in Gitformant are comparing it to the libraries listed below
Sorting:
- Fraud prevention tool☆28Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- recon-ng modules for Censys☆37Updated last year
- ☆33Updated 5 months ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆26Updated 7 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- Automatically run and save ffuf scans for multiple IPs☆79Updated last year
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Collect OSINT from git repositories☆20Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- ☆33Updated 4 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- S3 bucket enumerator☆30Updated 6 years ago
- Code to check AWS S3 buckets☆17Updated 7 years ago
- Wordlists for intelligent directory brute-forcing☆31Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- ☆29Updated 2 years ago