RepoReaper - An Automated Tool Crafted To Meticulously Scan And Identify Exposed .Git Repositories Within Specified Domains And Their Subdomains
RepoReaper is a precision tool designed to automate the identification of exposed .git
repositories across a list of domains and subdomains. By processing a user-provided text file with domain names, RepoReaper systematically checks each for publicly accessible .git
files. This enables rapid assessment and protection against information leaks, making RepoReaper an essential resource for security teams and web developers.
- Automated scanning of domains and subdomains for exposed
.git
repositories. - Streamlines the detection of sensitive data exposures.
- User-friendly command-line interface.
- Ideal for security audits and Bug Bounty.
Installation
Clone the repository and install the required dependencies:
git clone https://github.com/YourUsername/RepoReaper.gitcd RepoReaperpip install -r requirements.txtchmod +x RepoReaper.py
Usage
RepoReaper is executed from the command line and will prompt for the path to a file containing a list of domains or subdomains to be scanned.
To start RepoReaper, simply run:
./RepoReaper.py orpython3 RepoReaper.py
Upon execution, RepoReaper will ask for the path to the file containing the domains or subdomains: Enter the path of the file containing domains
Provide the path to your text file when prompted. The file should contain one domain or subdomain per line, like so:
example.comsubdomain.example.comanotherdomain.com
RepoReaper will then proceed to scan the provided domains or subdomains for exposed .git repositories and report its findings.
Disclaimer
This tool is intended for educational purposes and security research only. The user assumes all responsibility for any damages or misuse resulting from its use.
Source: www.kitploit.com