whxitte / gixposedLinks
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆37Updated last year
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last month
- ☆27Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- ☆42Updated last year
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆35Updated 4 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- Discovering Typo Squatting on your domains!☆81Updated last year
- ☆23Updated 10 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 10 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- ☆148Updated 8 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- CrlfiX☆21Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- Chrome extension tool for OSINT & Recon☆57Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- ☆24Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago