Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates shares, recursively scans files with regex/keyword rules, highlights matched tokens on screen, and exports clean ASCII tables. Supports DOCX/PDF/legacy Office and depth limits.
☆70Oct 20, 2025Updated 5 months ago
Alternatives and similar repositories for secrets_find0r
Users that are interested in secrets_find0r are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- ☆19Sep 1, 2025Updated 7 months ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆217Mar 4, 2026Updated last month
- ☆16Jul 20, 2025Updated 8 months ago
- ☆12Feb 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Apr 11, 2025Updated last year
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated 2 weeks ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆104Feb 25, 2026Updated last month
- AI agent whose purpose is to conduct vulnerability tests on LLMs from SAP AI Core or from local deployments, or models from HuggingFace. …☆43Updated this week
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- ☆108Feb 14, 2026Updated 2 months ago
- List of modern .appex-based Quick Look Previewer extensions compatible with macOS 15 Sequoia and beyond. No deprecated quicklook qlgenera…☆49Feb 9, 2026Updated 2 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Keyboard-driven terminal workspace for Intune administration. Query the Microsoft Graph API visually, browse 100+ built-in queries across…☆25Apr 12, 2026Updated last week
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 5 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- ☆120May 29, 2025Updated 10 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆137Mar 31, 2026Updated 2 weeks ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- My collection of Bookmarks☆13Dec 29, 2025Updated 3 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆72Feb 17, 2026Updated 2 months ago
- ☆16Aug 25, 2025Updated 7 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆108Mar 10, 2025Updated last year
- SyncToy, but brought up-to-date with a Fluent design and a nod to the past.☆12May 14, 2024Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year