Scan for secrets in dangling commits on GitHub using GH Archive data.
☆465Jul 3, 2025Updated 8 months ago
Alternatives and similar repositories for force-push-scanner
Users that are interested in force-push-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Mar 5, 2026Updated 3 weeks ago
- ☆39Nov 24, 2025Updated 4 months ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆56Nov 6, 2025Updated 4 months ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆123Mar 18, 2026Updated last week
- ☆17Jan 9, 2025Updated last year
- Kingfisher is a blazingly fast and highly accurate tool for secret detection and live validation across files, Git repos, GitHub, GitLab,…☆875Updated this week
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆227Jul 24, 2025Updated 8 months ago
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- ☆23Mar 2, 2026Updated 3 weeks ago
- Permanently disable EDRs as local admin☆128Dec 19, 2025Updated 3 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 9 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆403Aug 18, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆149Nov 14, 2025Updated 4 months ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated last year
- This is a repo for our docker image of the kubelet binary.☆14Mar 20, 2026Updated last week
- Shared features of vscode-clangd and coc-clangd☆13Mar 1, 2026Updated 3 weeks ago
- ☆11May 16, 2024Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆228Apr 14, 2025Updated 11 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆249Dec 8, 2025Updated 3 months ago
- Differential testing framework for HTTP implementations☆929Jan 21, 2026Updated 2 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆50Oct 15, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,366Aug 6, 2025Updated 7 months ago
- ☆174Updated this week
- jxscout superpowers JavaScript analysis for security researchers☆440Feb 15, 2026Updated last month
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆356Updated this week
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,153Updated this week
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆124Jul 19, 2025Updated 8 months ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 11 months ago