https://github.com/p0dalirius/mercurial-scm-extract
A tool to extract and dump files of mercurial SCM exposed on a web server.
https://github.com/p0dalirius/mercurial-scm-extract
exposed extract mercurial scm vulnerability web
Last synced: 3 months ago
JSON representation
A tool to extract and dump files of mercurial SCM exposed on a web server.
- Host: GitHub
- URL: https://github.com/p0dalirius/mercurial-scm-extract
- Owner: p0dalirius
- Created: 2023-02-11T14:39:00.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2025-01-31T14:00:11.000Z (8 months ago)
- Last Synced: 2025-04-06T18:22:45.621Z (6 months ago)
- Topics: exposed, extract, mercurial, scm, vulnerability, web
- Language: Python
- Homepage: https://podalirius.net/
- Size: 352 KB
- Stars: 10
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README

A tool to extract and dump files of mercurial SCM exposed on a web server.
![]()
![]()
![]()
## Features
- [x] Extracts files of mercurial SCM exposed on a web server.
- [x] Dump project files and .hg/ files locally.## Usage
```
$ ./mercurial-scm-extract.py -h
mercurial-scm-extract.py v1.1 - by Remi GASCOU (Podalirius)usage: mercurial-scm-extract.py [-h] -u URL -d DIR [-k] [-v]
options:
-h, --help show this help message and exit
-u URL, --url URL Target URL.
-d DIR, --dir DIR Directory where to save dumped files.
-k, --insecure Allow insecure server connections when using SSL (default: False)
-v, --verbose Verbose mode. (default: False)
```## Example

## Contributing
Pull requests are welcome. Feel free to open an issue if you want to add other features.