A simple command line tool to mass check targets for exposed .git directories.
- Check single target for exposed git directory
- Check multiple targets for exposed git directory
- Add option to dump exposed git directories
_ o _|_ |_ ._ _|_
(_| | |_ | | |_| | | |_
_|
Usage: githunt [options...]
Usage Examples:
githunt -url example.com
githunt -urls urls.txt -workers 100 -timeout 30s -output out.txt
Options:
Target:
-url check single url
-urls file containing multiple urls (one per line)
-path sets the path to .git config file (default: /.git/config)
Request:
-workers sets the desirable number of http workers (default: 50)
-cpus sets the maximum number of CPUs that can be utilized (default: available-1)
-timeout sets a time limit for requests, valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". (default: 15s)
General:
-output save vulnerable targets to a file
To install the command line program, use the following:
go get -v github.com/georlav/githunt/...
To build a local version, use the following:
go build -o githunt main.go
The MIT License (MIT) - see LICENSE.md
for more details