TheCl0n3r : Tool To Download & Manage Your Git Repositories

TheCl0n3r will allow you to download and manage your git repositories. About 90% of the penetration testing tools used in my experience can be found primarily on github. The aim of this was to make it easier to download, update and delete these git repositories. If moving to a new testing system, make it simpler to transfer the same tool set being used.

Usage

Search Github

Listing Currently Installed Tools

Build GO Binaries & Install Python Tools

Features

  • Download repos
  • Updates repos
  • Deletes repos
  • Search github repos
  • Install Go & Python tools.
  • Keeps everything orgainzed
  • Includes some basic tools to get started

Quick Setup

  • If you already have a list of tools in you are using just add it to the tool_list.txt file inside the TheCl0n3r directory then: “python3 thecl0n3r.py -d”
  • When moving to a new system just copy over the tool_list.txt file and re-download… Cake 😉

Requirements

  • Python3
  • Pipenv
  • GO
  • Github Access Token

Install Pipenv

Install GO

Installation

git clone https://github.com/an00byss/TheCl0n3r
cd TheCl0n3r
pip3 install -r requirements.txt
python3 thecl0n3r.py

Note

Must add Github Access Token to “api_token” variable.

R K

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

18 hours ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

2 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

2 days ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

3 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

3 days ago