whxitte / gixposedLinks
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆39Updated 9 months ago
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago
- ☆27Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 9 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 9 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 10 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆56Updated 2 months ago
- ☆40Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆73Updated 11 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Updated 11 months ago
- This repository contains the best fuzzing wordlist files☆34Updated 10 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆50Updated 3 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆33Updated 3 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 9 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated 11 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆71Updated 5 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆176Updated last week
- ☆127Updated 4 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆27Updated last week
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Analyze Android native `.so` files☆81Updated 2 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Grep subdomains from web pages.☆44Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- Discovering Typo Squatting on your domains!☆73Updated last year