dvcs-ripper Logo

dvcs-ripper

0
Free
Visit Website

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ... It can rip repositories even when directory browsing is turned off. Make sure to position yourself in an empty directory where you want repositories to be downloaded/cloned. Requirements: - Perl - Perl modules: required: LWP, IO::Socket::SSL - For newer SVN: DBD::SQlite and DBI - For faster GIT: Parallel::ForkManager, Redis and Algorithm::Combinatorics - (D)VCS client of what you want to rip (cvs, svn, git, hg, bzr, ...) Requirements on Debian/Ubuntu: You can easily install perl requirements: - sudo apt-get install perl libio-socket-ssl-perl libdbd-sqlite3-perl libclass-dbi-perl libio-all-lwp-perl Optional requirements (faster git rip): - sudo apt-get install libparallel-forkmanager-perl libredis-perl libalgorithm-combinatorics-perl And if you need all clients supported: - sudo apt-get install cvs subversion git bzr mercurial Docker: In case you just want the docker version, it is available at: https://github.com/kost/docker-webscan/tree/master/alpine-dvcs-ripper Just say something like: docker run --rm -it -v /path/to/host/work:/work:rw k0st/alpine-dripper rip-git.pl -v -u http://www.example.org/.git

FEATURES

ALTERNATIVES

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

A PoC tool for generating Excel files with embedded macros without using Excel.

A tool for performing hash length extension attacks against multiple hashing algorithms.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

Alpha release of External C2 framework for Cobalt Strike with enhanced data channels.

A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

Tool for attacking Active Directory environments through SQL Server access.

PINNED