whxitte / gixposed
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆37Updated 3 months ago
Alternatives and similar repositories for gixposed:
Users that are interested in gixposed are comparing it to the libraries listed below
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- ☆27Updated 9 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- Grep subdomains from web pages.☆42Updated last month
- ☆56Updated 7 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆108Updated 3 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆33Updated last month
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- 🕵️ Email osint tool☆62Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆29Updated 3 weeks ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 10 months ago
- ☆37Updated 8 months ago
- A Powerful Recon Engine☆61Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆110Updated 5 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆58Updated 5 months ago
- ☆23Updated this week
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 5 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated last month
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆31Updated last week
- Automated way to extract juicy info with subfinder and waybackurls☆31Updated this week
- ☆45Updated 3 weeks ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 3 months ago