Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates shares, recursively scans files with regex/keyword rules, highlights matched tokens on screen, and exports clean ASCII tables. Supports DOCX/PDF/legacy Office and depth limits.
☆67Oct 20, 2025Updated 5 months ago
Alternatives and similar repositories for secrets_find0r
Users that are interested in secrets_find0r are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- ☆19Sep 1, 2025Updated 6 months ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆214Mar 4, 2026Updated 3 weeks ago
- ☆16Jul 20, 2025Updated 8 months ago
- ☆12Feb 20, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆22Apr 11, 2025Updated 11 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Oct 24, 2025Updated 5 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated last month
- AI agent whose purpose is to conduct vulnerability tests on LLMs from SAP AI Core or from local deployments, or models from HuggingFace. …☆43Mar 21, 2026Updated last week
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- ☆108Feb 14, 2026Updated last month
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆18Jun 9, 2023Updated 2 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- ☆120May 29, 2025Updated 10 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆135Nov 14, 2025Updated 4 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated last month
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆71Feb 17, 2026Updated last month
- Nginx real-time monitoring☆12Nov 20, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- My collection of Bookmarks☆13Dec 29, 2025Updated 3 months ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 7 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Mar 10, 2025Updated last year
- SyncToy, but brought up-to-date with a Fluent design and a nod to the past.☆12May 14, 2024Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year