Scan for secrets in dangling commits on GitHub using GH Archive data.
☆470Jul 3, 2025Updated 9 months ago
Alternatives and similar repositories for force-push-scanner
Users that are interested in force-push-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆160Mar 5, 2026Updated last month
- ☆40Nov 24, 2025Updated 4 months ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 11 months ago
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆57Nov 6, 2025Updated 5 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Apr 10, 2026Updated last week
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- ☆16Jan 9, 2025Updated last year
- UUID issues for Burp Suite☆54Jun 2, 2022Updated 3 years ago
- Fast and accurate OSS secret scanner with live validation and blast radius mapping. 800+ rules. Scans code, Git, CI, cloud, and SaaS.☆903Updated this week
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Mar 2, 2022Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆227Jul 24, 2025Updated 8 months ago
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated 2 months ago
- ☆24Mar 2, 2026Updated last month
- Permanently disable EDRs as local admin☆130Dec 19, 2025Updated 4 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 6 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆413Aug 18, 2025Updated 8 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆153Nov 14, 2025Updated 5 months ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated last year
- This is a repo for our docker image of the kubelet binary.☆14Updated this week
- Shared features of vscode-clangd and coc-clangd☆13Apr 10, 2026Updated last week
- ☆11May 16, 2024Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆228Apr 14, 2025Updated last year
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆256Mar 30, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Differential testing framework for HTTP implementations☆928Jan 21, 2026Updated 2 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆50Oct 15, 2024Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,384Aug 6, 2025Updated 8 months ago
- jxscout superpowers JavaScript analysis for security researchers☆450Apr 12, 2026Updated last week
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,176Updated this week
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆66Apr 25, 2025Updated 11 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆45Sep 22, 2024Updated last year