Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ... It can rip repositories even when directory browsing is turned off. Make sure to position yourself in an empty directory where you want repositories to be downloaded/cloned. Requirements: - Perl - Perl modules: required: LWP, IO::Socket::SSL - For newer SVN: DBD::SQlite and DBI - For faster GIT: Parallel::ForkManager, Redis and Algorithm::Combinatorics - (D)VCS client of what you want to rip (cvs, svn, git, hg, bzr, ...) Requirements on Debian/Ubuntu: You can easily install perl requirements: - sudo apt-get install perl libio-socket-ssl-perl libdbd-sqlite3-perl libclass-dbi-perl libio-all-lwp-perl Optional requirements (faster git rip): - sudo apt-get install libparallel-forkmanager-perl libredis-perl libalgorithm-combinatorics-perl And if you need all clients supported: - sudo apt-get install cvs subversion git bzr mercurial Docker: In case you just want the docker version, it is available at: https://github.com/kost/docker-webscan/tree/master/alpine-dvcs-ripper Just say something like: docker run --rm -it -v /path/to/host/work:/work:rw k0st/alpine-dripper rip-git.pl -v -u http://www.example.org/.git
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A C#-based Command and Control Framework for remote access and control of compromised systems.
Preparation process for participating in the Pacific Rim CCDC 2015.
An open-source penetration testing framework for social engineering with custom attack vectors.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
A wargaming network for penetration testers to practice their skills in a realistic environment.
RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.
A Linux-based environment for penetration testing and vulnerability exploitation
Create a vulnerable active directory for testing various Active Directory attacks.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.