whxitte / gixposed
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆34Updated last month
Alternatives and similar repositories for gixposed:
Users that are interested in gixposed are comparing it to the libraries listed below
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆52Updated 3 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆37Updated 3 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆42Updated this week
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆47Updated 2 weeks ago
- ☆24Updated 2 months ago
- ☆57Updated 4 months ago
- ☆27Updated 6 months ago
- 🕵️ Email osint tool☆62Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 3 months ago
- ☆60Updated 8 months ago
- ☆36Updated 5 months ago
- ☆50Updated last month
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆15Updated 3 weeks ago
- Discovering Typo Squatting on your domains!☆63Updated 5 months ago
- This repository contains the best fuzzing wordlist files☆30Updated last month
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 2 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆56Updated last month
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆48Updated last week
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆92Updated last month
- SubOwner - A Simple tool check for subdomain takeovers.☆101Updated 3 months ago
- This is an AD pentest tools collection☆53Updated 6 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 6 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 7 months ago
- A collection of config files for linux focusing on hackthebox theme☆40Updated 3 weeks ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 8 months ago
- ☆20Updated this week
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated 11 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆57Updated 3 months ago