shubhamshubhankar / DumpTheGitView external linksLinks
DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.
☆87Jun 3, 2019Updated 6 years ago
Alternatives and similar repositories for DumpTheGit
Users that are interested in DumpTheGit are comparing it to the libraries listed below
Sorting:
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 4 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Automated SonarQube☆70Jun 3, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- A tool to find sensitive keys and passwords in Travis logs☆140Jun 27, 2021Updated 4 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Apr 3, 2020Updated 5 years ago