whxitte / gixposed
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆37Updated 3 months ago
Alternatives and similar repositories for gixposed:
Users that are interested in gixposed are comparing it to the libraries listed below
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- ☆27Updated 9 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- ☆56Updated 7 months ago
- ☆37Updated 8 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 5 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆108Updated 3 months ago
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆31Updated last week
- ☆32Updated last week
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆110Updated 5 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆75Updated 5 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆87Updated 7 months ago
- ☆39Updated 8 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆171Updated 3 months ago
- Grep subdomains from web pages.☆42Updated last month
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆33Updated last month
- 🕵️ Email osint tool☆62Updated last year
- A fast subdomain takeover tool☆75Updated last year
- ☆51Updated 3 months ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆24Updated 2 months ago