whxitte / gixposedLinks
Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers and security professionals quickly identify and remediate exposed sensitive informations in their codebases.
☆38Updated 7 months ago
Alternatives and similar repositories for gixposed
Users that are interested in gixposed are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last week
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆44Updated last month
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆52Updated 7 months ago
- ☆27Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 8 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆31Updated last month
- This repository contains the best fuzzing wordlist files☆34Updated 8 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 7 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Discovering Typo Squatting on your domains!☆71Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆27Updated 9 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆140Updated 4 months ago
- ☆24Updated last year
- Analyze Android native `.so` files☆40Updated last week
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆164Updated 2 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 7 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆191Updated last month
- SubOwner - A Simple tool check for subdomain takeovers.☆113Updated 9 months ago
- ☆102Updated 2 months ago
- ☆40Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated 7 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆55Updated 6 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆134Updated 6 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆42Updated last week
- 🕵️ Email osint tool☆62Updated last year
- Chrome extension tool for OSINT & Recon☆54Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆30Updated last month