whxitte / gixposedLinks
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆37Updated last year
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated 3 weeks ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- ☆27Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- ☆41Updated last year
- Discovering Typo Squatting on your domains!☆80Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆166Updated 10 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Updated last year
- ☆22Updated 10 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 3 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 9 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- ☆146Updated 7 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- ☆95Updated 9 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 4 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Analyze Android native `.so` files☆118Updated 5 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- ☆24Updated 2 years ago
- 🕵️ Email osint tool☆64Updated 2 years ago