Git Scanner Framework Logo

Git Scanner Framework

0
Free
Visit Website

This tool can scan websites with open .git repositories for Bug Hunting/ Pentesting Purposes and can dump the content of the .git repositories from webservers that found from the scanning method. This tool works with the provided Single target or Mass Target from a file list. Installation: - git clone https://github.com/HightechSec/git-scanner - cd git-scanner - bash gitscanner.sh Or you can install in your system like this: - git clone https://github.com/HightechSec/git-scanner - cd git-scanner - sudo cp gitscanner.sh /usr/bin/gitscanner && sudo chmod +x /usr/bin/gitscanner - $ gitscanner Usage Menu's: - Menu 1 is for scanning and dumping git repositories from a provided file that contains the list of the target URL or a provided single target URL. - Menu 2 is for scanning only git repositories from a provided file that contains the list of the target URL or a provided single target URL. - Menu 3 is for dumping only the git repositories from a provided file that contains a list of the target URL or a provided single target URL. This will work for the Maybe Vuln Results or sometimes with a repository that had directory listing disabled or maybe had a 403 Error Response.

FEATURES

ALTERNATIVES

A collection of SQL injection cheat sheets for various databases

CSET is a free software tool for identifying vulnerabilities in enterprise and industrial control cyber systems.

Automate the search for Exploits and Vulnerabilities in important databases.

A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

A collection of 132 exploits added to Packet Storm in April 2024

A tool that assesses AWS accounts for subdomain hijacking vulnerabilities in Route53 and CloudFront configurations.

A collection of real-world scenarios to evaluate command injection detection and exploitation abilities