Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ... It can rip repositories even when directory browsing is turned off. Make sure to position yourself in an empty directory where you want repositories to be downloaded/cloned. Requirements: - Perl - Perl modules: required: LWP, IO::Socket::SSL - For newer SVN: DBD::SQlite and DBI - For faster GIT: Parallel::ForkManager, Redis and Algorithm::Combinatorics - (D)VCS client of what you want to rip (cvs, svn, git, hg, bzr, ...) Requirements on Debian/Ubuntu: You can easily install perl requirements: - sudo apt-get install perl libio-socket-ssl-perl libdbd-sqlite3-perl libclass-dbi-perl libio-all-lwp-perl Optional requirements (faster git rip): - sudo apt-get install libparallel-forkmanager-perl libredis-perl libalgorithm-combinatorics-perl And if you need all clients supported: - sudo apt-get install cvs subversion git bzr mercurial Docker: In case you just want the docker version, it is available at: https://github.com/kost/docker-webscan/tree/master/alpine-dvcs-ripper Just say something like: docker run --rm -it -v /path/to/host/work:/work:rw k0st/alpine-dripper rip-git.pl -v -u http://www.example.org/.git
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
A digital archive of the internet, allowing users to capture and browse archived web pages.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
Interactive online malware sandbox for real-time analysis and threat intelligence
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.