whxitte / gixposedLinks
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆38Updated 6 months ago
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 5 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 6 months ago
- ☆27Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 6 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆22Updated 8 months ago
- ☆40Updated 11 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆30Updated 2 weeks ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆36Updated 3 weeks ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- ☆37Updated 3 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆64Updated 8 months ago
- ☆57Updated 10 months ago
- ☆29Updated 2 months ago
- ☆16Updated 11 months ago
- This repository contains the best fuzzing wordlist files☆34Updated 7 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Grep subdomains from web pages.☆42Updated 4 months ago
- CrlfiX☆19Updated 5 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆61Updated 4 months ago
- ☆16Updated 2 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 6 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆42Updated last month
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 8 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆113Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆155Updated last month
- ☆98Updated last month
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year