Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆39Dec 13, 2024Updated last year
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- Taaza is a full stack website project. It is a responsive restaurant website which also provides online services related to a restaurant.…☆75May 4, 2024Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 4 months ago
- ☆13Apr 14, 2024Updated 2 years ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RF-modulated high fidelity laser microphone and keystroke sniffer☆90Oct 17, 2024Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆55Mar 11, 2025Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 10 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆40Dec 13, 2024Updated last year
- ☆11Jul 19, 2023Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Collection of Facebook Bug Bounty Writeups☆31Sep 16, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆165Oct 11, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Mar 26, 2022Updated 4 years ago
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆15Dec 13, 2024Updated last year
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆16Oct 16, 2024Updated last year
- A fake DNS server for malware analysis written in Python3☆10Aug 14, 2022Updated 3 years ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆89Feb 5, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 10 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆87Feb 22, 2025Updated last year
- This is a multipurpose tool which is useful in networking or network hacking.☆87Apr 15, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 免杀木马样本☆106Oct 11, 2025Updated 7 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆181Jan 9, 2026Updated 4 months ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆91Feb 3, 2024Updated 2 years ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Embed a payload inside a PNG file☆371Oct 24, 2024Updated last year